Video surveillance equipment
IDIS America, the regional headquarters of South Korean security technology innovator, IDIS, announces Emily’s Place, as the first recipient of a comprehensive donation of company’s award-winning technology as part of its ‘Create a Better World’ campaign. The campaign, announced at the 2019 ISC West security show in April, is designed to support and better empower community organisations, the facility’s mission of providing long-term, multi-faceted care and support...
An interim Federal Acquisition Rule (FAR) detailing how the U.S. Federal government will implement a ban on government use of video surveillance products from Chinese manufacturers has been released just days before the August 13, 2019, deadline for the ban to take effect. The interim rule will take effect immediately; it notes there are "urgent and compelling reasons… to promulgate this interim rule without prior opportunity for public comment". After the interim rule is published in th...
The Dallmeier 5000 series single sensor cameras are equipped with a new encoder technology. The new versions of the dome, IR and fisheye cameras support H.265 HEVC (High Efficiency Video Coding) and offer improved object classification with camera-based, AI-enhanced Video Content Analysis (VCA). H.265 compression By its nature, the constantly improving resolution of video images demands high bandwidths and large amounts of memory. With the new generation H.265 encoder in the Dallmeier cameras,...
Antaira Technologies is a developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications and is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the LMP-1802G-SFP and LMX-1802G-SFP Series. Antaira’s LMP-1802G-SFP and LMX-1802G-SFP series are industrial-grade equipment that is Ethernet ready to fulfil various markets’ edge-level networking applications in harsh and o...
Matrix, global manufacturer of enterprise-grade Telecom and Security solutions, is the first company to get TEC certificate under Mandatory Testing and Certification of Telecom Equipment (MTCTE) launched by TEC, Govt. of India. Mr Ganesh Jivani, Managing Director of Matrix was honored with the TEC certificate from Mr. Anshu Prakash, Secretary Telecom, Government of India at an event organised by TEC at Sanchar Bhavan, New Delhi. IP-PBX and VoIP phones “Having been a global provider of I...
Honeywell announces the release of 30 Series IP Cameras, a new suite of video cameras that strengthens building safety and security through advanced analytics and secure channel encryption. The Honeywell 30 Series IP cameras are designed for use as part of video systems that comply with U.S. government procurement standards instituted under the John S. McCain National Defence Authorisation Act for Fiscal Year 2019 (NDAA Section 889). With the new cameras, end users can also benefit from lower t...
The sound of bar staff yelling ‘who’s next?’ on a busy Saturday night is set to become a thing of the past, thanks to the launch of the world’s first A.I. powered bar. The ‘A.I. Bar’, which has been developed by British data science product company DataSparQ, helps make ordering in busy boozers easier, faster and fairer by using the latest facial recognition technology to put punters in an “intelligently virtual” queue. Led to a reduction in serving times Before and after data revealed there was an overall reduction in serving times as well, equivalent to more than 1,600 pints poured over a year to the average UK pub, thanks to the ordering process being more efficient. That’s the time equivalent of a potential 78 million additional pints poured a year, if the UK’s 48 thousand pubs used the A.I Bar technology. The ‘A.I. Bar’ Software-as-a-Service product will cost landlords from just £199 a month and works by simply using a standard webcam, display screen and Internet connection.The ‘A.I. Bar’ Software-as-a-Service product works by simply using a standard webcam, display screen and Internet connection AI-powered ID checks It speeds up ID checks, if a customer looks under 25, the system will prompt them to have their I.D. ready or let bar staff know if they’ve already been checked. The new tech is hoping to reverse the current epidemic of pub closures – a recent study conducted by The Campaign for Real Ale revealed that an average of 14 pubs are calling last orders for the final time every week in the UK. The A.I. Bar enables bars and pubs to work smarter not harder by providing vital data including orders per hour to help them understand their demand and throughput margins, optimising their staffing requirements to make then more efficient and ultimately more profitable. Scalable solution John Wyllie, Managing Director, DataSparQ said: “Queuing is a part of British life that we all have to endure – but we wanted to do something to improve the experience. “It’s the uncertainty of waiting times alongside queue jumpers that’s adversely affecting consumer behaviours in bars and pubs. The A.I. Bar ensures it’s a hassle free, first come, first served system that makes ordering drinks more convenient for both drinkers and bar staff alike. “We are in talks with drinks companies and pub chain owners to roll out the technology nationwide in the next 12 months. The system can be installed anywhere and is scalable – so we are expecting it to start in bars and progress into music festivals and beyond.” Preventing queue jumpers Unfortunately, queuing is an inevitable part of drinking in bars and pubs. DataSparQ research has revealed that Brits spend more than two months during a lifetime queuing for their favourite drinks. A survey of 2000 drinkers commissioned by DataSparQ has revealed that the biggest gripe for British boozers is people pushing in at queues, with eight out of ten drinkers saying it’s their number one turn-off in bars and pubs. Poor queuing etiquette was closely followed by long queues, with more than three quarters of punters revealing they’ve walked out of a pub or bar due to long queues. When asked if they would stay in a pub and order if they knew exactly how long the wait to be served was, nearly two thirds of those asked said they wouldHowever, when asked if they would stay in a pub and order if they knew exactly how long the wait to be served was, nearly two thirds of those asked said they would. The A.I. Bar gives customers this clarity. The innovative queuing system will also help to make ordering drinks in packed bars feel less intimidating for customers by themselves. More than half the participants asked said that they have felt intimidated when ordering solo in busy bars. Reveller Katherine Rees said: “I always hate it when I’m in at the bar and groups of rowdy guys push in front of me. I shouldn’t have to get into a confrontation with strangers just to order a drink. With this new technology that’s something I never have to worry about again, my only problem now is choosing what to drink!” Potential long term benefits Long-time London publican Andrew Archer, who has been involved in the development process said “The true benefits to bars and pubs will be longer term. You’ll obviously decrease serve time through faster ID checks and not messing around arguing over who to serve next. People will know how long they must wait and won’t get queue barged. In a competitive market such as bars, having an edge on customer experience will help to encourage repeat business.” Additional functionality, which is currently being developed, includes the ability for customers to re-order their drinks while still in the queue. The tech memorises drinkers’ orders and reacts to simple hand signals if there are any changes. Another additional feature will include the “FaceTab” – a mechanism that visually adds people to a bar tab, only allowing certain faces to order against that tab.
Limitless Security launches a new fixed cost managed solution for the housebuilding and construction industries. This fully managed service takes away the headaches and hassles involved in installing, managing and maintaining security equipment on building sites. It will enable housebuilders to reduce the incidence of break-ins, theft and vandalism whilst maintaining and managing the costs of security within acceptable limits. Managed security solution This fully managed security solution includes detection, monitoring and response This fully managed security solution includes detection, monitoring and response using a SIA-licensed security guarding service. It covers everything from risk assessment, the supply, installation and management of all equipment, including Limitless Security’s battery operated VIDAR motion detectors with integrated image verification. Also provided are site security signage, documentation of any events for evidential purposes and the provision of information to responding agencies. “Our new service challenges the industry perception that the price of security may outweigh the cost of an intruder event. This is understandable when the costs of traditional manned guarding contracts and CCTV installations are taken into account,” said Adam Lees, Managing Director of Limitless Security. Fully managed service “We developed this fully managed service to meet the needs of housebuilders as it provides a complete solution for a single, fixed monthly cost to make budgeting easier and eliminate any unexpected additional charges.” Limitless Security monitors all installations around the clock from its Monitoring Centre which reacts and responds immediately should a security event occur. When required, SIA-licensed security guards are directed to an event location and VIDAR captured images can be sent to their smartphones or tablets to assist with identification.
The 2019 editions of Shanghai Intelligent Building Technology (SIBT) and Shanghai Smart Home Technology (SSHT) will be held from 3 ‒ 5 September at the Shanghai New International Expo Centre (SNIEC). Spurred by the fast development of China’s intelligent building, Internet of Things (IoT) and Artificial Intelligence (AI) sectors, the two exhibitions are close to capacity as there has been strong demand from exhibitors to participate at the shows. Smart neighbourhoods The total exhibition space is also expected to reach a record of over 28,750 sqm The concurrently held trade fairs are expected to attract over 280 renowned businesses from China and overseas, and welcome a similar number to last year’s 29,423 professional visitors. The total exhibition space is also expected to reach a record of over 28,750 sqm. Fairgoers to SIBT and SSHT will not only be treated to the usual array of smart home and building technologies and solutions, but will once again be able to visit the returning Parking China fair, while a debut ‘Shanghai Smart Office Technology’ (SSOT) feature zone will add yet another element to these growing group of exhibitions. Covering key topics such as IoT, AI, big data, robots, smart offices, smart parking, home security, HVAC, energy conservation, 5G, smart neighbourhoods and smart cities, fairgoers and exhibitors alike can benefit from a one-stop market and purchasing platform which positively bring together multiple different industries. Smart parking industries On the development of SIBT, Ms Lucia Wong, Deputy General Manager of Messe Frankfurt (HK) Co Ltd said: “As SIBT welcomes its 13th edition, I must express my sincere gratitude for the unwavering support from the industry. Devoted to demonstrating cutting-edge technology and innovative products, we are looking forward to highlighting new market trends and welcoming fairgoers this September.” Ms Wong also shared her optimism on the fifth edition of SSHT, stating: “The fairs have grown alongside the market. By exploring advanced technology and top-tier products, we strive to promote the widespread implementation of smart homes.” In line with recent policies implemented by China, green building and renewable energy initiatives are being promoted in different parts of the country, while intelligent buildings have also become a common sight across cities. China’s IoT capabilities are also developing rapidly which extends to the smart building, smart office and smart parking industries. Cross-industry cooperation Over 280 exhibitors from multiple sectors will congregate at the shows As 5G and AI technology continue to improve, smart home is now more than a fictional concept but a lifestyle that is gradually taking over traditional homes. Full smart home implementation are expected to soar in popularity with sensors becoming the epicentre of smart homes. With the rapid development of 5G technology and the enhanced applicability of AIoT and IoT operation systems, the future of home industry will be brimming with exciting possibilities. With both fairs placing a strong emphasis on ‘AI+IoT’, SIBT and SSHT will work in synergy to bring together IoT and smart building suppliers, encouraging cross-industry cooperation and communication. Over 280 exhibitors from multiple sectors will congregate at the shows including Schneider, Hisense, Ezviz, Ave Leelen, ANJUBAO, Dnake, Legrand China, SUREN, ORVIBO, Baiwei, FANTEM, HaiLin, Shuncom, KNX, EnOcean, Crodigy, A-OK, wistarmotor, HDL, Grandland, Daming Laffey, UIOT, Eastsoft, Savekey, Wintom Sun-shade, Auxdio, Sonos, aminasound, D&M, Cinemaster, Levoice, Elite, Changsha Yidai, Ningbo Hope, Bao Feng Cinema, WTi Group, ALCATEL, Dongguan Taitron, and more. Smart control systems Selected exhibitors and their innovations include: HDL - HDL showcases integrated smart control systems, one-stop solutions and equipment. New products on display include the multipurpose S10 touch screen and other smart panels. Ezviz - Concentrating on the safety-related aspects of smart living and technology, the company will demonstrate its intelligent air quality sensor with remote access and history function, as well as its video recorder with internet-connection, 360° high-speed rotation, intelligent human detection, acoustic location, and other functions. Legrand China - Legrand China will offer visitors a multitude of new smart home appliances and systems, including intelligent switches for window blinds, switch modules, gateways, smart plugs, wireless IR transmitters, controllers, and door and window detectors. FANTEM - The latest upgrade to its home system, OOMI3.0, is a stability solution for wireless connections in mansions and duplexes. Targeting the needs of families and those that require large-scale systems, it supports scenario settings with the use of multiple gateways. CTTL-Terminal Labs summit forum envisions smart living Every edition of SIBT and SSHT introduces cutting-edge industry technology through a diverse programme of concurrent events. This year, SIBT will be collaborating with CTTL-Terminal Lab under the China Academy of Information and Communications Technology (CAICT) to present forums on smart cities, neighbourhoods and buildings. Under CAICT, CTTL-Terminals Lab specialises in ICT development research, product standards and testing, and new ICT development research, offering all-round support for related industries. Led by the lab, this year’s forum will introduce a number of renowned speakers to discuss their latest research on industry trends and innovative new technology. Smart office solutions A new ‘Smart Office’ zone will debut this year to explore the growing market demand for smart office solutions. The zone will highlight a number of technologies and solutions that provide optimal performance for office facilities using IoT and connected technology. The show will explore improved urban parking resource management and better parking eco-systems in buildings The smart parking sector will also be under the spotlight as the Parking China fair will once again be held concurrently to provide a high-level international platform for smart parking solutions in cities. To help the industry thrive, the show will explore improved urban parking resource management and better parking eco-systems in buildings. SIBT is organised by Guangzhou Guangya Messe Frankfurt Co Ltd, Shanghai Hongshan Exhibition Service Co Ltd, China Council for the Promotion of International Trade – Shanghai Pudong Sub-Branch, and The Intelligent Engineering Branch of China Exploration & Design Association. Building technology exhibitions The organisers of SSHT are Guangzhou Guangya Messe Frankfurt Co Ltd, Shanghai Hongshan Exhibition Service Co Ltd, China Council for the Promotion of International Trade – Shanghai Pudong Sub-Branch, and China Smart Home Industry Alliance. The two fairs will be held from 3 – 5 September 2019 at Shanghai New International Expo Centre in China. SIBT and SSHT are both headed by the biennial Light + Building event in Frankfurt, Germany. The fair will be held once every two years. The next edition will be held from 8 -13 March, 2020. Messe Frankfurt also organises a series of light and building technology exhibitions in Asia including Guangzhou Electrical Building Technology, Guangzhou International Lighting Exhibition and Shanghai International Lighting Fair. The company's light and building technology fairs also extend to markets in Argentina, India, Thailand, Russia, the UAE and other countries and regions.
barox Kommunikation AG, the manufacturer of IT switches designed specifically for the demands of video networks, releases a DMS SNMP Siemens Siveillance VMS plug-in that allows installers and end-users to take full advantage of Siveillance VMS software control. The new plug-in supports the entire portfolio of barox switches, which are designed for the high data throughout of video networks, and Jumbo frames of up to 9600Bytes at 100Mbps. Real-time active monitoring The new Siemens Siveillance plug-in enables real-time active monitoring of connected cameras/devices Available free of charge from barox, supplied as a download link or on a memory stick, the new Siemens Siveillance plug-in enables real-time active monitoring of connected cameras/devices, active monitoring of PoE, PoE performance and power management. Eliminating the need for a separate network management installation and offering invaluable network information, the integrated barox Siemens Siveillance graphical interface allows installers and operators to monitor an entire video network via a live graphical overview of network topology. Using the barox Siemens Siviellance VMS plug-in, system diagnostic data showing the status of cameras and switches permits the fast pinpointing of network and device issues. For example, if a network camera fails to respond, the plug-in enables any device to be selected and re-booted. Assess edge devices Being able to see live PoE usage on each port makes it easy to diagnose errors and outages remotely, allowing the new plug-in to enable barox network switches to act as ‘health centres,’ to assess edge devices and automatically generate a tree diagram with all network devices shown. In this way, operators can always have sight of which cameras are connected and operational In this way, operators can always have sight of which cameras are connected and operational. This is a particularly useful function, as surveillance cameras behave differently to other types of IP devices, with changing power demands due to shutter activation, pan & tilt motor drives, heaters or IR illuminators, etc. An essential IP network tool, the barox Siveillance plug-in helps installers and system operators to proactively identify and respond to camera degeneration, or to automatically reset frozen cameras by interrupting their PoE, to force a reboot. Supporting professional installers Where barox Active Camera Tracking automatically pings a camera that fails to respond to its PoE being taken away for reboot, fault logging flags-up the issue, allowing the proactive pinpointing of network and device issues. “With the new Siemens Siveillance VMS plug-in, barox are leading the way in IP network management, supporting professional installers to reduce their equipment replacement costs and keep network downtime to an absolute minimum,” says Rudolf Rohr, barox Co-founder & Managing partner. “barox designs all of its products to support the specialist requirements of video surveillance networks, and helping installers to save costs by minimising network set-up time and avoidable service journeys to site is part of that ethos.”
Marking its European debut, Northrop Grumman Corporation’s Firebird product line will be showcased at the Royal International Air Tattoo at RAF Fairford, in the United Kingdom, July 19-21. The company is also announcing signed agreements with Tenax Aerospace and Grand Sky Development Company, LLC (‘Grand Sky’) for rights to purchase Firebird, the company’s new, optionally piloted intelligence, surveillance, and reconnaissance (ISR) aircraft system. Unmanned aerial vehicle Firebird is designed to deliver critical ISR capability to meet customer mission needs “Flexibility, whether in cockpit configuration, payloads, or in owning and purchasing Firebird, is at the core of what makes this aircraft such an attractive ISR option for government partners and private industry,” said Brian Chappel, vice president, autonomous systems, Northrop Grumman. “Having flown over two dozen sensors on Firebird’s proven architecture, we are ready to offer Firebird to a wide range of nations, U.S. government and civilian agencies, and businesses with critical data collection needs.” Northrop Grumman’s Firebird product line delivers medium altitude, long endurance multi-mission flexibility and an unbeatable value. Available in manned, autonomous and optionally piloted configurations, Firebird is designed to deliver critical ISR capability to meet customer mission needs. Grand Sky is the nation’s first commercial unmanned aerial vehicle testing and training center. Located in Grand Forks, North Dakota, Grand Sky is home to one of Northrop Grumman’s North Dakota locations. Meeting critical information Tenax Aerospace is a provider of special mission aircraft and related aviation services to the U.S. government and commercial customers. Both companies see Firebird as meeting critical information gaps for their businesses. “We are excited to bring Firebird to Grand Sky and to utilise its long-endurance and variable payload capabilities for commercial customers. Our goal is to support energy infrastructure monitoring and humanitarian and disaster relief operations by leveraging Firebird’s range, altitude and endurance,” said Thomas Swoyer Jr., president and partner with Grand Sky. “We see the incredible efficiencies to be gained in the market with technology like Firebird, enabling affordable data gathering on a scale not previously available to the commercial market space.” Extremely affordable price Firebird provides a unique flexibility and responsiveness that we feel is essential for the critical missions" “Firebird allows Tenax Aerospace to bring industry leading adaptability and flexibility in data collection at an extremely affordable price point to meet the needs of our sophisticated U.S. government and global security customers,” said Tom Foley, chairman, Tenax Aerospace. “Firebird provides a unique flexibility and responsiveness that we feel is essential for the critical missions we support today and in the future.” Firebird is equipped with wide band Line-of-Sight (LoS) and/or Beyond-Line-of-Sight (BLoS) data links, onboard storage and accessible processing for rapid data exploitation to ensure timely completion of missions for industry and government customers. Tailored mission suitability The system’s unique design allows sensors to be changed rapidly as plug-and-play devices, reducing first time payload integration time from months to days and enabling rapid field changes in less than an hour to increase operational availability and tailored mission suitability. Firebird delivers 30-plus hours of endurance and up to 25,000 feet, providing customers near real-time actionable intelligence. Northrop Grumman is a global security company providing innovative systems, products and solutions in autonomous systems, cyber, C4ISR, space, strike, and logistics and modernisation to customers worldwide.
Hikvision, global supplier of innovative video surveillance products and solutions, has released a new Thermal Bi-spectrum Deep Learning Turret Camera, which will bring enhanced capabilities of indoor fire detection, including an advanced temperature anomaly alarm and visual warning. This new cost-effective camera (DS-2TD1217/V1 Series) reduces the risks of fire and property loss. Thermal Bi-spectrum DL Turret Hikvision’s Thermal Bi-spectrum Deep Learning Turret Camera supports fire detection using high-quality internal hardware components to capture images using both visible light and infrared light, also called “bi-spectrum” image technology. The bi-spectrum image technology creates a picture-in-picture preview and image fusion The bi-spectrum image technology creates a picture-in-picture preview and image fusion, which can capture what caused the alarm and help personnel to check the situation quickly. It monitors through only one channel, reducing bandwidth and simplifying the live preview procedure of switching channels between thermal and optical channels. Bi-spectrum image fusion technology The bi-spectrum image fusion function also provides more image details under different environmental circumstances, making it easier to find hidden objects and document unusual events. The camera's image processing technology combines multiple image processing techniques to create the best thermal imaging results. It also utilises a ‘noise equivalent temperature difference’ (NETD) of less than 40 mK (this is a measure for how well a thermal imaging detector distinguishes between minute differences in thermal radiation within an image). This means that the lower the temperature difference sensed by the camera, the smaller the value and the better the image. Temperature anomaly alarm This new thermal camera also features a reliable temperature anomaly alarm, which will trigger an alarm once the temperature goes higher than a user-set limit. This setting effectively improves the pre-warning capability before a fire occurs and can alert safety personnel to eliminate hidden dangers before the temperature reaches ignition or combustion. In a practical application, it can help to detect smoking behaviors in the first place, especially for areas that are clearly prohibited from smoking like shopping malls or that are heavily banned like oil depots. Through effective alarms, staff can find and stop the person from smoking in time to reduce environmental pollution or fire damage caused by smoking. Deep Learning algorithm The camera contains a built-in GPU for running the deep learning algorithm for indoor monitoring In addition, the camera contains a built-in GPU for running the deep learning algorithm to effectively help indoor monitoring and detect illegal intrusion. Its intelligent video content analysis technology can help reduce false alarms by filtering out interference factors such as changes in lighting or movement of animals in the field of view. Only actual threats trigger alarms, making security measures vastly more efficient and preventing unwanted entry. Equipped for double-duty – fire detection and intrusion detection – this camera is highly recommended for use in indoor fire detection and intrusion detection solutions, especially in application scenarios such as warehouses, museums, data centers, and banks. Wide viewing angle (up to 90 degrees) along with relatively small and well-designed camera housings make them easy to install and convenient to use.
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organisation looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organisation is safe from innovative cyber threats. Security solutions enterprises Organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organisations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organisations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organisations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analysing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognise we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organisation's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organisation’s defences, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organisation's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious behaviour Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organisations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behaviour on your network and can prioritise threats for SOC teams for faster remediation. In-depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organisations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organisations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organisations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioural analytics The solution can then know when to remove an adversary before a breakout occurs Behavioural analytics and machine learning capabilities identify known and unknown threats by analysing unusual behaviour within the network. These have the ability to provide an essential first line of defence, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organisations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organisation cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organisations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organisations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organisations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
Artificial intelligence allows machines to do jobs previously done by people. When it comes to security and surveillance, this technology allows cameras and control room equipment to identify a wide range of threats automatically and in real time across hundreds or even thousands of cameras – allowing security teams to take immediate action to protect people and assets. AI technology and surveillance solutions Artificial Intelligence technology built into surveillance solutions help organisations optimise their security Video surveillance cameras are the electronic eyes of any security operation. In the past, human supervision was needed to make sense of the images captured, and to assess whether certain events posed a security risk or not. With some organisations using hundreds or even thousands of cameras to protect their people and assets, manual review of footage is simply impossible – potentially leaving them vulnerable to security breaches. Advanced Artificial Intelligence technology built into surveillance solutions can help organisations overcome this challenge and optimise their security. This means cameras, control-room equipment and back-end infrastructure can now ‘learn’ about potential threats for themselves by recognising people, vehicles and even behaviours. Detection and prevention The manual interventions needed with traditional security systems mean that teams were frequently reacting to breaches that had already happened. Artificial Intelligence changes all this by recognising potential threats before they impact company’s people or assets – allowing security teams to react immediately to neutralise any potential threat. Artificial intelligence solutions can automatically trigger alerts when a person appears in a restricted area For example, artificial Intelligence solutions can automatically trigger alerts when a person appears in a restricted area, or when a vehicle with a blacklisted number plate enters a site. With alerts delivered in real time, teams can identify and react to security threats and protect people and assets more effectively. And because alerts are automated, potential threats are hardly missed or overlooked. How does artificial intelligence work? Artificial Intelligence systems become more intelligent over time, building databases of potential threats and reacting to new events accordingly. This allows systems to ‘think for themselves’ and to alert teams of any suspicious events or people who are caught on camera. Artificial intelligence technologies use advanced algorithms based on Deep Learning to distinguish between different kinds of security events and threats. Technologies incorporated into the Hikvision portfolio include: Facial recognition which allows law enforcement personnel to identify suspects and commercial teams to identify VIP customers in real time. Vehicle identification which can be used to identify vehicle number plates and recognise different types of vehicles (even down to make and model), or to trigger alerts when vehicles enter restricted areas. Perimeter protection which helps organisations to identify real threats by distinguishing people and vehicles from other moving objects and keeping false alarms to a minimum. Business intelligence which employs people counting, queue detection, and heat mapping technologies, so that organisations can enhance operational efficiency by making use of the data report. Increasing commercial success Artificial intelligence isn’t just useful for identifying security threats – although this is a key strength of the technology. It can also help organisations increase their competitiveness and commercial success. For example, VIP customers who opt to participate in special marketing promotions or other incentives can be identified so staff can provide the right kind of service at the right time. This gives organisations the opportunity to personalise the service experience, foster loyalty and maximise customer lifetime revenues. Artificial Intelligence can help organisations to better understand customers and meet their needs more effectively In the same way, artificial Intelligence can help organisations to better understand customers and meet their needs more effectively – leading to more commercial opportunities. One feature – called People Counting – allows stores and commercial centres to map footfall at peak times, ensuring that staffing is optimised to meet demand. At the same time, stores can see which areas of the building customers visit most and adjust their merchandising and product positioning accordingly to maximise the sales opportunities. Artificial intelligence at Hikvision Hikvision’s family of artificial intelligence products include the DeepinView network cameras and DeepinMind NVRs. The products help to tackle security with facial recognition; monitoring and counting of people; and recognition and detection of vehicles, to name a few. These features all depend on artificial intelligence technology to recognise, classify and respond to security threats. This article was written by Hikvision.
Across the country, law enforcement officers are finding it increasingly difficult to respond to the near overwhelming number of calls coming from security alarms. Police departments commonly define a false alarm as a call, which upon investigation, shows no evidence of criminal activity, such as broken windows, forced doors, items missing, or people injured. While false alarms bog down police, they can also negatively impact customers and integrators. End users can expect hefty fines for false alarm responses, and when these customers receive large bills from the city, many turn to installers, dealers, and even manufacturers expecting them to accept the responsibility and pay the bill. What first brought the issue of alarm verification to your attention? It is crucial to both see a situation and concurrently listen to any corresponding sounds to gain full insight I’ve been aware of the problem of false alarms for about 5 years. I believed audio capture, through microphone deployment, could be an active part of the solution when used as a second source for indicating ‘out of the norm’ activity and as an equal component with the video surveillance technology. In 2015, I found similarly minded security professionals when introduced to the Partnership for Priority Verified Alarm Response. After reading PPVAR’s paper on ‘Audio Verified Alarms Best Practices; [April 2015],’ I knew that the Partnership was on to something important. In our lives, two of the five senses we count on day-in and day-out are sight and sound. It is crucial to both see a situation and concurrently listen to any corresponding sounds to gain full insight. What is the false alarm rate? In 2016, the International Association of Chiefs of Police reported that over 98 percent of all alarm calls in the United States were false. This number is obviously staggering, and something we need to work towards correcting. Why did this issue resonate so strongly with you? When I first investigated this issue, I was sure that the security industry would have already recognised this and was acting to ensure improved alarm verification, preferably through a combination of audio and video technologies. However, I quickly saw that this was not the case, or even close to the norm. I have questioned the rationale behind the lack of adoption and found the deployment of audio is often hindered by the concern of privacy. I’ve spearheaded many initiatives to explain the monitoring policies surrounding audio As CEO of Louroe Electronics, I’ve spearheaded many initiatives to explain the monitoring policies surrounding audio. I’ve had to reassure many security personnel and customers how the law supports the use of audio in public places as long as there is no expectation of privacy. By dispelling fears with facts around deploying and implementing audio sensors, customers can confidently include audio in their surveillance systems and gain a more effective security solution. Who is affected by this? Truth be told, everyone from the end user to the manufacturer is affected by this issue. Not to mention the strain this puts on law enforcement who are tired of ‘wasting time’ and effort out in the field on these nuisance alerts. When an end user receives a bill for their false alarm, many of them will immediately blame the integrator and or the monitoring center for a faulty set up and management and expect the integrator to remedy the situation, including carry the burden of paying the fines. The integrator, on the other hand, will turn to the manufacturer, assuming faulty equipment and installation instructions; therefore, looking for reimbursement for the cost. What is the average false alarm fee? It depends on many factors, and especially your first responder assigned location for responseIt depends on many factors, and especially your first responder assigned location for response. According to the Urban Institute, fees generally range from $25-$100 for the first offense, rising as high as a few thousand dollars per false alarm if a location has a large number in a single year. What’s worse, in extreme cases, alarm systems may even be blacklisted by the police dispatch center if they have raised too many false alarms in the past. Why do you believe audio is the ideal technology for secondary source verification? Video surveillance has been the main option for security monitoring and alarm validation for decades, however industry professionals are realising that video alone is not enough. Video only tells half of the story, by adding audio capture, the responsible party gains a turnkey solution with the ability to gather additional evidence to verify alerts and expand overall awareness. In reality, audio’s range is greater than the field of view for a camera. Sound pickup is 360 degrees, capturing voices, gunshots, breaking glass, sirens, or other important details that a fixed camera many not see. How would a secondary source verification system work with audio? Using a video monitoring solution equipped with audio, the microphone will pick up the sounds at the time a visual alert or alarm is triggered. If embedded with classification analytics, the microphone will send alerts for specific detected sounds. The captured audio, and any notifications are immediately sent to the monitoring station, where trained personnel can listen to the sound clip, along with live audio and video from their station. When law enforcement receives a validated alarm, they can better prioritise the response From here, an informed decision can then be made about the validity of the alarm, along with what the current threat is at the location. If the alarm is in fact valid, the information is then passed along to the law enforcement within minutes. When law enforcement receives a validated alarm, they can better prioritise the response. It also provides more information in a forensic evaluation. Are there any additional resources you would suggest looking into? Yes, we would suggest looking into the following to see a few different perspectives on the matter: NSA Support For 2018 Model Ordinance For Alarm Management and False Alarm Reduction Partnership for Priority Verified Alarm Response Support for the Term “Verified Alarm” and Prioritising Verified Alarm Responses Urban Institute Opportunities for Police Cost Savings without Sacrificing Service Quality: Reducing False Alarms
The ban on U.S. government usage of Chinese-made video surveillance products was signed into law last year and was scheduled to take effect a year later – on August 13, 2019. With that deadline looming, there are questions about whether government agencies and departments will comply in time. A year ago, the U.S. Congress passed, and the President signed, a ban on government uses of video surveillance equipment produced by two of the world’s top manufacturers – Hikvision and Dahua. The provision was buried in the National Defense Authorization Act (NDAA) for fiscal year 2019, which the President signed into law on August 13, 2018. The ban, which takes effect ‘not later than one year after … enactment’, applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. Tracking software to detect banned products Forescout Technologies, San Diego, California, provides software to track various banned devicesThe bill calls for an assessment of the current presence of the banned technologies and development of a ‘phase-out plan’ to eliminate the equipment from government uses. One problem is identifying where the surveillance equipment is being used, which involves either a tedious manual process to search out the equipment or the installation of tracking software to identify it on the network. A federal Department of Homeland Security program called ‘Continuous Diagnostics and Mitigation’ requires use of a detection tool to find any banned products on a network. Forescout Technologies, San Diego, California, provides software to track various banned devices, but not all required agencies have complied with a mandate to secure their networks by tracking every connected device (only 35% had complied as of 2018.) “Without an automated, real-time tool that can detect all of the IT devices – computer or ‘other’ – on your network, there is simply no way to be 100 percent certain that you are compliant with these product bans,” says Katherine Gronberg, Forescout’s Vice President, Government Affairs. Difficult to determine device’s manufacturer Not all equipment is marked to identify its manufacturer; some has been rebrandedAnother problem is the existence of OEM agreements and other supply chain complications that can make it difficult to determine the manufacturer of any given device. A report by Bloomberg says: “A complex web of supply chain logistics and licensing agreements makes it almost impossible to know whether a security camera is actually made in China or contains components that would violate U.S. rules.” Not all equipment is marked to identify its manufacturer; some has been rebranded. “There are all kinds of shadowy licensing agreements that prevent us from knowing the true scope of China’s foothold in this market,” said Peter Kusnic, a technology writer at business research firm The Freedonia Group. “I’m not sure it will even be possible to ever fully identify all of these cameras, let alone remove them. The sheer number is insurmountable.” Companies banned under NDAA The NDAA ban covers “public safety, security of government facilities, physical security surveillance of critical infrastructure, and other national security purposes.” It bans “video surveillance and telecommunications equipment produced by Hytera Communications Corporation, Hangzhou Hikvision Digital Technology Company, [and] Dahua Technology Company (or any subsidiary or affiliate of such entities).” Hytera Communications is a Chinese digital mobile radio manufacturer. Huawei Technologies Co. equipment has also been banned, including the HiSilicon chips widely used in video cameras. In addition to banning the Chinese equipment in government installations, the NDAA also includes a ‘blacklist’ provision [paragraph (a)(1)(B)], which could be interpreted to extend the ban to companies that use Chinese-made products in other, non-government applications. Rulemaking on that aspect is still under way, including a public hearing in July.
While security salesmen are touting megapixels and anti-passback features, they are missing an opportunity to communicate the role of technology in the broader context of risk management and incident response – and in saving lives. That’s the message of Gerald Wilkins, PSP, Vice President of Active Risk Survival. Incident response is at the core of how an enterprise reacts to risk and is a standardised approach to the command, control, and coordination of emergency response. Effective incident response requires integrating a combination of facilities, equipment, personnel, procedures, and communications operating within a common organisational structure. All the elements must work together to achieve the desired outcome – to mitigate a risk using countermeasures. Capabilities of systems during emergencies I want to see us have more meaningful conversations with security directors and emergency operations planners"Equipment such as CCTV, access control and mass notification systems can provide effective countermeasures, but salesmen in the physical security market are not ‘connecting the dots’ between equipment specifications and its capabilities as part of the broader incident command system. “Historically, purchases of security technologies have not been considered in that context,” says Wilkins. “Rather, the industry’s sales pitches have been about features and capabilities – pixels or communication distances or intelligence – not about how those capabilities are useful in the specific context of emergency response.” “My goal is to change the industry,” says Wilkins. “I want to see us have more meaningful conversations with security directors and emergency operations planners.” Focusing on the Emergency Operations Plan “We are in the life safety business, and we need to have more conversations about where technology fits into the Emergency Operations Plan (EOP). When was the last time you [as a security salesman] asked a client to look at their Emergency Operations Plan? No one knows the technology better than we do.” What’s missing, however, is attention to how technology is applied to risk management and response“There are so many folks in our industry who are technology gurus, who ‘get’ the technology, and are good at selling it,” he says. What’s missing, however, is attention to how technology is applied to risk management and response. “As an industry, even guys who have been in the business a long time have never heard about incident command,” says Wilkins. “How are we weaponising technology to maximise the outcome? We don’t talk about it. We want to talk about megapixels and wide dynamic range. But when are we going to talk about how we can apply that technology to mitigate our tangible and intangible risks?” Importance of security equipment In the wake of each active shooter or other incident in the news, Wilkins looks back to consider the missed opportunities and how security equipment could have saved lives. “What technology did we have to help first responders – video, access control and paging – but they weren’t used?” he asks. An example is the San Bernandino shooting in 2015, when police officers were heard asking “has anybody found that access control card?” In effect, a law enforcement officer was asking for technology that should have been included as part of the emergency plan. Situational awareness, such as that provided by video systems, can help responders judge which areas are safe fasterSituational awareness, such as that provided by video systems, can help responders judge which areas are safe faster and provide Emergency Medical Services (EMS) personnel more time to save lives. However, video is not being viewed in that light as a part of the broader life-saving mission. “Our industry needs to sit down with a security director or operations manager and ask: How are you using technology as a resource tool that will become part of your critical response?” says Wilkins. Understanding how equipment works Technology is often not being incorporated in emergency planning, even with something as simple as a fire drill. Most fire drills are ‘one size fits all’ – every person knows where they should go and how they should exit. But what if there is a fire in a particular part of the building? Today’s fire alarms operate in zones to communicate the location of a fire, but this capability is not being used to practice a variety of resulting scenarios that could save lives. “We need to understand as an industry how our partners in law enforcement and EMS do their jobs,” says Wilkins. “We can help stakeholders in a building understand how our equipment works every day and how they can use it in a critical incident. We need to understand Emergency Operations Plans (EOPs), how incident command works, and how we can help emergency responders.” Security training for salespeople I want to know everything I can know to help guys sell things that can change the outcome if something bad happens"“If a guy wants to talk about his pixels or his anti-passback, he should instead consider having a meaningful conversation with the client about best practices and how to mitigate risk. This creates a different position [for the salesman], and if there is a critical incident, something you said or did might save someone’s life.” When it comes to training and taking a more strategic approach to sales, to some extent, the security technology industry has been a victim of its own success. When business is good, security companies are less likely to look for ways to train their salespeople. “We’re in the life safety business, not in the ‘stuff’ business,” says Wilkins. “I want to know everything I can know to help guys sell things that can actually change the outcome if something bad happens.” Another problem is “we don’t know what we don’t know.”
As political winds present new challenges for Chinese companies doing business in the U.S. market, the countdown is under way to implementation of a ban on sale of Chinese manufacturers’ video surveillance products to the Federal government. Some good news is a delay enacting the wider-reaching “blacklist” aspects of the ban. Meanwhile, possible sanctions to prevent U.S. manufacturers from selling components to Chinese companies are posing immediate public relations difficulties – and the possibility of eventual more tangible ones. Chinese ban imposed by U.S. government The “Chinese ban” provision [[Paragraph (a)(1)(a) of section 889 of Title VII of the National Defense Authorisation Act (NDAA) for FY 2019] prohibits Federal government procurement of “equipment, systems, or services provided by specified entities.” The “specified entities” are Huawei Technologies Co., ZTE Corp., Hytera Communications Corp., Hangzhou Hikvision Digital Technology Co. and Dahua Technology Co. Hikvision and Dahua are two of the largest manufacturers of video surveillance equipment, and Huawei manufactures HiSilicon chips widely used in video cameras. NDAA specifies that the ban be implemented within a year of the law taking effected The “Chinese ban” provision is an open Federal Acquisition Regulations (FAR) Case, and a proposed FAR draft rule is due in early June. NDAA specifies that the ban be implemented within a year of the law taking effected (signed by President Trump on August 18, 2018). Blacklisting integrators that sell Chinese products Implementation of a “blacklist” provision has been spun off into a separate FAR Case, and enactment has been delayed allowing time for public comments on its ramifications. The provision [Paragraph (a)(1)(B) of section 889 of Title VII of the National Defense Authorisation Act (NDAA) for FY 2019] addresses “entities that use covered equipment.” As it relates to the video surveillance market, this provision has been interpreted to mean, for example, that an integrator that sells Hikvision equipment to anyone (e.g., to a small retailer) would be banned even from selling non-Hikvision equipment to the U.S. government or ‘recipients of Federal loan or grant funds.’ Obviously, this represents a broader impact on the industry compared to the Chinese equipment sale ban. The government’s stated reasons for the delay include concern about a dramatic reduction in the available industrial base Reduction in available industrial base The government’s stated reasons for the delay include concern about a dramatic reduction in the available industrial base (including small business suppliers), who will no longer be able to sell to the government, either because their non-government business is more valuable, or due to the cost of the potential regulatory burdens associated with compliance. Another concern is that Federal grant recipients in rural areas may be ‘disproportionally impacted … due to the limited number of market options in rural areas.’ The delay will allow time for a public meeting to solicit input on the proposed rulemaking The delay will allow time for a public meeting to solicit input on the proposed rulemaking. In fact, the Department of Defense (DoD), General Services Administration (GSA) and NASA (National Aeronautics and Space Administration) are hosting a public meeting on July 19 from 9 a.m. to 3 p.m. at the Department of Interior (DOI) Auditorium in Washington, D.C. Interested parties may also attend virtually via the Internet. NDAA ban on Chinese technology, equipment Furthermore, a proposed rule of implementation will be published, followed by a second public meeting. The Office and Management and Budget will solicit feedback on proposed changes to existing grants and loans and consider public comments and feedback prior to finalising changes. The White House has sent a legislative proposal to Congress to "adjust certain implementation deadlines to allow for additional stakeholder engagement." The Federal Acquisition Security Council would be tasked with submitting a report “containing a discussion and recommendations regarding any changes required for effective implementation of that section.” Do these processes represent hope for leniency? Hikvision targeted in ban The NDAA ban is one of several issues facing Chinese companies in the U.S. market The NDAA ban is one of several issues facing Chinese companies in the U.S. market. Another is snowballing backlash about the involvement of surveillance companies in human rights abuses at detention camps in the Xinjiang region of China. For example, a number of Congressmen and Senators have sent a letter asking the U.S. State Department and Treasury to impose sanctions, export controls and financial disclosures to counter the human rights abuses. In response, Hikvision has retained human rights expert and former U.S. Ambassador Pierre-Richard Prosper to advise the company regarding human rights compliance. According to a company spokesperson: “Hikvision takes these concerns very seriously and has engaged with the U.S. government regarding all of this since last October.” (See Hikvision USA’s full statement here.) Furthermore, Hikvision expressed optimism at the ISC West trade show. The Trump administration has also singled out Hikvision and is considering seeking limits on the video surveillance giant’s ability to buy American technology, similar to a ban already implemented against chipmaker Huawei. HiSilicon chips, manufactured by Huawei, currently run millions of security cameras across the United States, and several video camera manufacturers are rethinking their use of HiSilicon chips in wake of the ban.
As prominent in Belfast’s history as its cranes are on the city’s skyline, it’s hard to imagine Belfast without Harland and Wolff. Once the world’s greatest shipbuilder, Harland and Wolff today has evolved into a company that provides over 150 years of engineering excellence to the maritime, offshore, and renewable energy sectors. The Harland and Wolff facilities on Queen’s Island are now used to maintain some of the world’s largest ocean-going vessels, ranging from offshore platforms and cruise liners to offshore wind farms. The company is spread over two sites in Belfast and covers over 200 acres. Its main facility has a public-facing perimeter of no less than 1.5 kilometers. With safety as a primary consideration in the execution of projects, the company goes to great lengths to protect its investments from unwanted visitors, intruders, and vandalism. FLIR VMS solution For over 15 years, Harland and Wolff has been using FLIR’s United VMS to manage a wide variety of security cameras For over 15 years, Harland and Wolff has been using FLIR’s United Video Management System (VMS) to manage a wide variety of security cameras. As technology innovations and features were being added onto the United VMS over the years, Harland and Wolff has always remained loyal to the FLIR brand. But with the increasing development of Queen's Island as an industrial, commercial, and tourist area came a greater public presence and an increased safety and security threat. That is why in recent years Harland and Wolff has been continuously investing in the latest security camera technology from FLIR, including enterprise security cameras, PTZ cameras, intelligent thermal cameras, and mobile and wearable cameras. Optical and thermal cameras “Today, over 140 FLIR cameras on-site and along the site’s perimeter make sure that we can detect any irregularity,” said Chris Neill, security operations manager at Harland and Wolff. “Whenever one of our cameras picks up an incident – an intruder for example – an alarm is generated and sent to our security control room, who can then follow up the incident. This ensures us that our investment and that of our customers is safe and secure at all times.” Due to the high impact and risk associated to a possible incident on site, the company’s security department follows a proactive approach for possible intruders. Even in complete darkness, in perimeter areas where there is no additional lighting, thermal analytic cameras can pick up the presence of intruders, animals, or vehicles automatically based on their heat signatures. Intruder detection While thermal camera footage does not allow actual identification of intruders, it can still be used as evidence for insurance companies or law enforcers, especially when an intrusion pattern can be seen over different cameras. United VMS is FLIR’s enterprise-level software solution for video surveillance operations United VMS is FLIR’s enterprise-level software solution for video surveillance operations. The software is currently used at Harland and Wolff by four control room operators and eight managers, all of which have dedicated user rights. One of the strengths of the United VMS system is that it can connect with nearly any security camera on the market and that video streams and detection alerts can be presented on any screen, be it on a video wall, a PC, or a smartphone. United VMS But Harland and Wolff has been using United VMS for far more applications. “We also use the United VMS platform to monitor alarms coming from fire sensors on oil rigs, for example,” said Neill. “Another example is the detection of failed pumps on one of our drydocks. This information also comes in on United VMS, where we generate alarms and notify key staff in real time.” Harland and Wolff has indeed managed to make use of United VMS's flexibility and deploy it for much more than security applications only. "We are not in a static business," said Neill. "At Harland and Wolff, we are always taking on new challenges and solving new problems; FLIR’s United VMS platform helps us do that.” TruWITNESS mobile sensor technology Harland and Wolff will also make use of TruWITNESS, the latest mobile and wearable sensor technology from FLIR. TruWITNESS will allow guards on patrol to stream video directly to the control room in real time and from anywhere on the Harland and Wolff sites. Harland and Wolff needs to comply with a minimum security level imposed by the UK Department of Transport" Guards will be able to bookmark events so that incidents or irregularities can be reported and can be followed up more efficiently. In case of incidents, camera footage from the TruWITNESS wearable devices can be used as evidence. In addition, control room operators will be able to track members of staff via the United VMS and display their location on a map. Security technology advancements “Our yellow gantry cranes have become a national icon,” said Neill. “Unfortunately, this also means that they are an attractive target for political messages or, as in the past, terrorism. As a port facility, Harland and Wolff needs to comply with a minimum security level imposed by the UK Department of Transport. But in reality, we always exceed these requirements. We owe this to our continuous investments in security technology, which we also consider as a commitment to our customers.” Maybe this is what connects Harland and Wolff with FLIR. “As committed as we are to our customers, we expect the same from our suppliers as well,” said Neill. “As someone with a technical background, I have always been convinced of the quality of FLIR security products. But there will always be a time when you need to rely on technical support, and that’s where FLIR really makes a difference.”
In a highly visible, and competitive sport like Formula One racing, it’s not hard to understand why an organisation like Aston Martin Red Bull Racing attracts people who want access to their factory, and all the secrets contained within. Intrusion from unwanted visitors or vandalism is something that the people at Milton Keynes headquarters, in Buckinghamshire, England, want to avoid at all cost. Asset protection “Our Milton Keynes facility contains valuable technology and intellectual property,” says Mark Hazelton, Chief Security Officer. “At the same time, we are located alongside a public road, close to a residential area with high footfall. That is why it is critical for us to have high-performing security processes and systems in place, so we can effectively protect our assets as well as the people who work here.” The scale of operations at the Aston Martin Red Bull Racing Team factory in Milton Keynes is amazing The scale of operations at the Aston Martin Red Bull Racing Team factory in Milton Keynes is amazing. Crafting the next Formula One challenger is done on the engineering site with a variety of buildings, including many office spaces, an R&D facility, manufacturing and storage areas. The design, testing, building and assembling of thousands of parts required to construct each race car all happen in house. About 750 people are employed at Milton Keynes and some parts of the factory are operated on a 24/7 basis. Site and facility security “As our site has grown, our previous CCTV system was no longer sufficient to provide adequate security monitoring,” says Caroline Tierney, Infrastructure Project Manager at Aston Martin Red Bull Racing. “Our CCTV installation was no longer state of the art and we wanted to ensure that we made best advantage of the improving technology available. We were also looking to make it easier to retrieve information from the system.” Aston Martin Red Bull Racing started to look out for an updated CCTV system, investigated different options and ultimately selected FLIR Systems as their technology provider through a local IP security system integrator. Quasar HD and 4K cameras The facility is now equipped with some 120 cameras, both visual and thermal, that cover the entire area 24/7. Cameras on site include FLIR’s visual Quasar HD and Quasar 4K, the latter presenting four times the resolution of the HD camera and, therefore, able to cover larger areas with less cameras. The facility also makes use of the Quasar Hemispheric Mini-Dome, which provides 360° immersive viewing, and of the thermal FLIR FC-Series ID camera, which includes onboard video analytics capable of classifying human or vehicular intrusions. The entire camera network is managed by FLIR’s Latitude Network Video Management System (VMS). FLIR thermal cameras The image quality that we get from the new range of visual FLIR cameras is truly impressive" “The image quality that we get from the new range of visual FLIR cameras is truly impressive,” says Zoe Chilton, Head of Technical Partnerships at Aston Martin Red Bull Racing. “It’s amazing what kind of image quality can come out of such a compact camera unit.” The FLIR thermal cameras have powerful video analytics on board, which makes them extremely useful as intrusion protection devices at several strategic locations across the Milton Keynes site. With the FC-Series ID camera, you can set custom trip lines and regions of interest that will trigger alarms for human or vehicular intruders, even at night or in poor weather conditions. Upon the detection of an intruder, an alert is sent over to security personnel via email. FLIR Latitude VMS The FLIR Latitude video management system is the backbone of the system, allowing Aston Martin Red Bull Racing personnel to easily view, playback, search and export video from a scalable number of cameras. “In the past, when we wanted to investigate a particular incident in more detail, it used to take a long time to actually retrieve the information we needed from our video recordings, but with the new FLIR Latitude VMS, this is much more straightforward and we save a lot of time,” says Tierney Comprehensive camera network The cameras used in the network around the Milton Keynes site are relatively small in size. And there’s a very good reason for that, according to Chilton. “Of course, it’s important to have the best image quality possible, but on the other hand, we don’t want our cameras to be too large and imposing either.” The Milton Keynes headquarters receives visitors, customers and partners every day. For Aston Martin Red Bull Racing, it’s important that everybody feels welcome: “While we need our site to be secure, and the cameras are of course important, we don’t want them to be the first thing visitors see when they arrive to visit us, " said Chilton. "I think that the FLIR cameras strike that difficult balance between security and subtlety really well.” The cameras can also be used to check whether visitors are using the parking lot correctly FLIR security monitoring system Other than the security aspect, there are other practical benefits of having a comprehensive camera network, as well. The cameras can also be used to check whether visitors are using the parking lot correctly, to track contractors around the site, and just for general site management purposes. The selection of the FLIR security monitoring system fits into a long-standing technology partnership between FLIR and the Aston Martin Red Bull Racing team. Since 2014, the team has been integrating FLIR cameras for a wide variety of uses around the factory and track, from electrical maintenance, test rigs and security on site, to tyre temperature assessments in the garage. High product quality The high product quality and innovative approach FLIR takes to developing new solutions for the challenges of Formula 1 makes a great fit with Aston Martin Red Bull Racing’s desire to push the boundaries of available technology for developing their cars.
Over 1,600 Wisenet cameras manufactured by Hanwha Techwin have been installed at Asia’s largest mega hub terminal in order to help operators monitor the movement of parcels and vehicles, as well as keep employees and visitors safe. With its nine decades of endless innovation, Korea’s logistics service provider, CJ Logistics, is leaping forward to become a pioneer by expanding its global networks to over 94 locations and entering the Thailand, Malaysia, China and Philippines markets. Video surveillance solution In June 2018, CJ Logistics opened Asia’s largest mega hub terminal in Gonjiam, Gyeonggi-do, South Korea. The terminal, which comprises two buildings with four floors above ground and two underground, occupies approximately 300,000sq metres, almost the size of 40 football stadiums. The total length of the facility’s conveyer belts is almost 43km, long as a full-course marathon The total length of the facility’s conveyer belts is almost 43km, which is as long as a full-course marathon. The terminal also has a state-of-the-art automation system, the first of its kind in Korea, which has increased the company’s daily handling capacity to 1.72 million parcels, four times higher than its competitors. CJ Logistics looked for a top-notch video surveillance solution which could match the terminal’s grand scale and the technically advanced automated facilities. Providing periphery monitoring After testing cameras from different manufacturers in the market, CJ Logistics chose Hanwha Techwin as its supply partner and have subsequently installed around 1,660 Wisenet cameras throughout the terminal. Wisenet X series IR PTZ cameras have been installed along the building exteriors, providing periphery monitoring 24/7 and auto tracking that enables precise monitoring across long distances, while IR illumination provides visibility even at night. Inside the buildings, around 1,400 Hanwha Techwin’s Wisenet Q series cameras were installed on the terminal’s ceilings and walls. The cameras are able to help detect any problems occurring to the automated conveyer systems which have a constant flow of parcels on them. They also oversee the movement of over 1,500 vehicles in and around the terminal and help create a safe working environment. Highly accurate recognition Wisenet X series bullet cameras, running license plate recognition (ANPR) software onboard, have been installed at the main gate of the terminal to enhance security at the entrances and exits, providing highly accurate recognition of license plates. These cameras enable effective vehicle monitoring within the terminal where cargo moves in and out around the clock, and are particularly useful in monitoring the main entrance. Both camera types are equipped with 12x optical zoom and 150dB WDR Wisenet X series bullet and PTZ cameras have been installed at indoor staircases and corridors of the office building. Both camera types are equipped with 12x optical zoom and the World’s best 150dB Wide Dynamic Range (WDR) which ensures clear images are captured from scenes that contain a challenging mix of bright and dark areas, normally causing overexposed or underexposed images. Intelligent video analytics As part of the Wisenet X series, these cameras feature intelligent video analytics and offer movement, loitering and intrusion detection. They are also equipped with audio analysis functionality which recognises critical sounds such as gunshots, explosions, screams and broken glass. “Thanks to the Hanwha Techwin’s Wisenet security solution, we were able to build a safe video surveillance system that can match the size and the cutting edge facilities of Asia’s largest logistics terminal,” said an official at CJ Logistics. “Now we can safeguard every corner of our terminal including vehicles, parcels, and personnel, not to mention indoor and outdoor spaces.”
Percepto has announced that the company has launched its market-leading industrial on-site autonomous drone solution in Singapore, through partnership with Certis - the leading advanced integrated security services organisation. On-site autonomous drone solution In October 2018, Certis announced that it has expanded its industry-leading ops-tech capabilities to deliver Security Plus (Security+) solutions. Today, Certis’ Security+ combines advanced security, facilities management and customer service into a single holistic service, supported and underpinned by technology. Percepto, the provider of the most advanced global Drone-in-Box solution for industrial sites, is a recipient of the Frost & Sullivan Global Enabling Technology Leadership Awards. Percepto CEO, Dor Abuhasira comments on entering the Singaporean market: “Percepto is proud to be selected by Certis to be its premier Autonomous Drone solution partner.” Singapore is breaking new ground in the commercialisation of innovative drone solutions" Abuhasira continues: “Singapore is breaking new ground in the commercialisation of innovative drone solutions, aided by the clear published regulations on the drone activity permit application by the local authority.” Integrated security with Security+ “As a technology-driven company, Certis now provides an integrated approach to advanced security, facilities management and guest services through what we now call Security+. In partnership with Percepto, we are pleased to introduce this technological solution, that enables us to reimagine new concepts of operations for our customers,” said Ms Fong Ying Ching, Vice President, Certis Technology. Percepto drones are equipped with high-definition and thermal cameras to enable day and night operation and can perform in hostile weather conditions including rain, snow and dust. When deployed in-the-field they take-off on-demand or at scheduled times and navigate pre-defined routes. Percepto cloud management system Once the mission has been completed the drone returns to its base station - a highly secure enclosed weather-proof box - where automated post flight checks and fast battery charging are completed, ensuring the drone is primed for the next flight. The system is controlled through Percepto’s cloud management systemThe system is controlled through Percepto’s cloud management system and it is also the only drone-in-a-box solution that is powered by computer vision and AI and provides communications over LTE. As a result, these drones provide aerial security for total surveillance monitoring and response. Industrial drones The partnership between Percepto and Certis signifies a major development for the use of industrial drones in Singapore in areas of security, surveillance and safety, maintenance, inspection, mapping and operations.
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, announces yet another successful apprehension, courtesy of sister company, Sonitrol’s, incredibly effective TotalGuard technology. Sonitrol of Lexington, Kentucky performed the system installation and does on-going 24/7/365 monitoring. Brandenburg Auto is a small, family-owned and operated auto repair shop in Lexington, Kentucky, run by Jack Brandenburg and his son, Jack Jr. The business had recently experienced a break-in, during which the phone line was cut prior to entry, rendering their previous security system incapable of sending alerts when the intrusion occurred. Installing entire system Brandenburg Senior was initially reluctant to deploy the new Sonitrol TotalGuard solution, as he felt they already had cameras and he was concerned because the new technology would not have a keypad. However, after Danny Goodpaster, Sonitrol Security Consultant, demonstrated the technology and showed him a video of an actual break-in resulting in an apprehension, both father and son decided to move forward. Sonitrol staff had implemented a process of pre-deploying the TotalGuard devices in their offices Sonitrol scheduled the installation with an expedited timeline considering the recent loss the business had experienced. The technicians actually finished a previous job earlier than expected, which allowed them to come to the Brandenburg facility one day earlier than planned. Prior to installation, Sonitrol staff had implemented a process of pre-deploying the TotalGuard devices in their offices before arriving on site, which allowed the team to install the entire system in less than half a day. Scheduled installation This was quite a fortuitous turn of events, because that very night, the night before the original scheduled installation, an intruder cut the phone line again and entered through the shop door. The new TotalGuard system was no longer on the phone line, and the unfortunate thief was immediately detected by Sonitrol monitoring personnel and the police were dispatched. Law enforcement arrived quickly, and in numbers, making the apprehension and minimising the impact to the next day of business for this valued customer. The full system is comprised of three TotalGuard sensors and a standalone TotalGuard, which does not need a panel because it is wired directly to the camera. TotalGuard alarms on motion, impact, audio, and video and communicates to the central station without needing a phone line. The system is arm/disarm via Sonitrol mobile app and the business phone is the keypad, so no maintenance and no wearing out of the equipment. All control is from the mobile app, and updates are pushed to the system automatically.
The high-performance Predator Ultra HD PTZ video surveillance camera from UK CCTV manufacturer, 360 Vision Technology, has entered service at the National Coastwatch Institution’s (NCI) Felixstowe lookout station, to help protect lives along the coastline of the River Deben estuary. Felixstowe Coastwatch is a charity funded, volunteer-based organisation with over 50 highly trained volunteers available to man lookout shifts. It’s also part of the NCI, a voluntary organisation established in 1994 to restore a visual watch along UK shores, after many small Coastguard stations had been closed. Maritime navigation Felixstowe Coastwatch took over operations at the Lookout in April 1996 Under Felixstowe Coastwatch’s territory is the Deben estuary, whose treacherous shifting shingle banks and bar can present quite a challenge for maritime navigation, as Ian Clarke of Felixstowe Coastwatch explains: “Half of all call outs from the RNLI Harwich Lifeboat Station during 2016/17 were to attend incidents in this area, so it was clear that additional observation of the area would be beneficial and help to make it safer.” Felixstowe Coastwatch’s Lookout is built on top of Martello Tower ‘P’, one of the famous ‘Martello Towers’, built in the early 1800s as a defence against a possible invasion by Napoleon. The first lookout was originally built by HM Coastguard (replaced in 1979 by the current structure), who operated the Lookout until 1994. Felixstowe Coastwatch took over operations at the Lookout in April 1996. Experiencing CCTV cameras “Originally, the first idea to tackle the maritime issues at the River Deben estuary was to build an additional lookout tower,” says Ian. “That would have been a prohibitively costly exercise for a charity-based organisation. However, after a visit to the NCI Station at Portland Bill, I was inspired by the use of CCTV there and interested to establish if video surveillance could be deployed to monitor the remote Deben estuary from our existing lookout station.” “The first task was to experience CCTV cameras in action, so we visited the Port of Felixstowe, the Felixstowe Town CCTV system and the Great Yarmouth Port Authority, where we saw the 360 Vision Predator in action. Impressed by the quality of its images, I contacted 360 Vision Technology for a demonstration, at which we were able to record video from the proposed location of the camera mast.” Comprehensive business case 360 Vision Technology had just launched their Predator equipped with a 40x optical zoom" “After the demonstration of the camera’s capability, I was able to prepare a detailed report to our trustees, setting out a comprehensive business case as to why a CCTV camera would offer the best solution to the issues we were facing at the mouth of the River Deben. I was able to use the recorded footage of the demonstration to produce a video highlighting the impressive capability of the imaging technology.” From Ian’s report, approval of the project was granted and the 360 Vision Predator Ultra HD was installed by STC Solutions Ltd, after funds were raised from council-allocated budget and fundraising events organised by Felixstowe Coastwatch volunteers. “When we placed the order, 360 Vision Technology had just launched their Predator equipped with a 40x optical zoom,” Ian continues. Wireless transmission solution “This was an important factor for us, as the entrance to the River Deben is expansive, and identifying vessels and individuals there would be greatly assisted by the optical zoom of the 360 Vision Predator camera.” With no line of sight from the camera to the lookout tower, an innovative wireless transmission solution was employed, using a belfry tower at a midway point in Felixstowe, where the signal is relayed to enable control and recording of the high definition images back at the lookout station. “Now operators can view superb live images of the River Deben, to confirm the identity, position and situation of vessels in the mouth of the river and if necessary, contact HM Coastguard if we observe any problems,” Ian explains. Seamless ONVIF integration Thanks to the broad integration capability of 360 Vision’s Predator Ultra HD, all surveillance video is archived for retrospective investigation, and controlled via a QVIS Viper NVR recorder. In addition, seamless ONVIF integration into Cambridge Pixel’s ‘RadarWatch’, a flexible client display application for radar display and target tracking, allows Felixstowe Coastwatch’s operators to set up virtual tripwire lines across dangerous areas of the river and shallow waters close to the main shipping channel. The trip alarms instantly alert operators and provide immediate verification of a vessel’s precise location Once crossed by a vessel, the trip alarms instantly alert operators and provide immediate verification of a vessel’s precise location, along with high-definition visual verification from the Predator camera. Also displayed as an overlay on screen, via the Predator Ultra camera and Cambridge Pixel technology integration, is Automatic Identification System (AIS) ship transponder information for each vessel, including a compass bearing supplied by the Predator camera’s head, which indicates which way the camera is pointing. Innovative installation “This means we can instantly identify and position any specific vessel we’re seeing with the camera,” says Ian. “We can also view the banks of the river and its beaches, to ensure that no members of the public are in danger.” Taking advantage of 360 Vision Technology’s any colour and any finish design offer, the Predator Ultra camera was supplied in a Marine Grade white paint finish, and along with its powerful 40x zoom lens, is equipped with a ½” Ultra camera module to ensure maximum imaging performance, even in low-light conditions. This innovative installation has been so successful that Felixstowe Coastwatch are currently looking at other areas of the coastline where high-definition 360 Vision Predator Ultra HD cameras could assist with their daily operations, to protect the public and maritime traffic.
Round table discussion
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
The definition of a standard is “an authoritative principle or rule that usually implies a model or pattern for guidance, by comparison with which the quantity, excellence, correctness, etc., of other things may be determined.” In technology markets, such as physical security, standards are agreed-upon language, specifications or processes that are used across the board by multiple stakeholders to enable easier interconnectivity and smoother operation of systems. We asked this week’s Expert Panel Roundtable: How are standards shaping change in the physical security market?