International Security Expo is returning to Olympia London, in London, United Kingdom, in September 2021, with a range of pavilions and zones, each dedicated to a particular field of security, in order to help visitors navigate the show with ease. One of the zones, the Disaster & Resilience Zone, will combine the latest innovations in crisis management with a comprehensive education programme. International Security Expo 2021 Attendees will be able to network face-to-face with the zone&rs...
Security and Safety Things GmbH and Prosegur, one of the largest security companies in the world, have announced their collaboration on the development of a new Security Operations Centre (SOC) environment, leveraging the intelligence of innovative Artificial Intelligence infused video analytics and the expertise of Prosegur human operators to improve security services for customers around the globe. Prosegur will incorporate innovative, AI-infused video analytic applications from the Security...
Reliance Protect, a provider of lone worker solutions, has reinforced its commitment to personal safety by being one of the first to combine the benefits of live audio and video stream functionality, coupled with GPS user location, in a single device. The solution comes in the form of the innovative VB400 body-worn camera, which is designed to enhance lone worker safety through the use of cutting edge features that accelerate response decision making, provide powerful evidence capture, improve...
Comelit Group, as a founder partner to The Security Event, is excited to return to exhibit with the launch of the latest integrated solutions, comprising an array of smart security and fire safety systems for residential and commercial premises. On stand 3a/B10, Comelit will be presenting its new Logifire addressable panel, which has been designed to offer a simple to install, fire safety solution that is compliant with to latest standards. It is complemented with a new range of detectors, offe...
From asphalt to apps, Bosch has implemented a connected security solution for the Frechen truck stop near the A1 to protect people and freight from assaults. The modern parking area near Cologne now has around 40 parking spaces that meet the high-security standards of the Transported Asset Protection Association’s (TAPA) according to the Level 2 certificate and are therefore particularly secured. From now on, forwarding companies can book these via the Bosch Secure Truck Parking app...
DITEK, the provider of surge protection solutions is featuring state-of-the-art technology at ISC West 2021, July 19-21 in Las Vegas. DITEK surge protectors are the first line of defence against power surges and spikes caused by lightning or other sources. DITEK solutions protect critical electrical systems—from fire alarms to video surveillance—by safely diverting excess voltage to the ground, avoiding costly repairs and downtime. DITEK’s vast array of solutions gives system...
Existing CCTV and video monitoring systems are already working well to reduce retail shrinkage and are now being extended to help keep stores ‘COVID Safe’, found a new retail sector study of 111 high street retailers based in the UK, US, Sweden and Norway, carried out by Video Security as a Service (VSaaS) provider AVA Security in March 2021. An array of insights into what value physical retailers’ existing video security systems are detailed in the 15 pages Ava Security retail sector video security trends report 2021, published this week. Video security systems The research revealed that the biggest loss prevention gains from the use of video monitoring in stores were in shoplifting where 58% of retail sector security decision-makers recorded significant reductions in losses from shoplifting as a result of video security and 9% went further to reveal that their video security systems had completely eliminated shoplifting. Nearly half (46%) of retailers reported major reductions in losses linked to vandalism of property Over half (54%) confirmed that their video systems were significantly reducing theft or fraud by staff and contractors. Exactly half reported that in-store CCTV systems were significantly reducing losses from slip and fall insurance claims and 13% confirmed that their video systems had eliminated losses from fraudulent slip and fall claims. Nearly half (46%) of retailers reported major reductions in losses linked to vandalism of property had been achieved through the use of video monitoring and recording. Video security systems One in six retailers (17%) believed that vandalism of their property had been completely eliminated through the use of CCTV. And 41% recorded that ‘damage to goods by our staff’ had been reduced significantly through the use of video security. 39% of retailers reported it takes too long and proves too difficult to find relevant video sequences having uncovered a loss incident. The next most significant factor preventing further loss prevention in this study was the poor performance of their surveillance cameras in low or no light conditions. This was preventing 34% of retailers from reducing shrinkage further. Nearly a third (32%) of retailers’ claimed the fact that their video security systems’ did not offer early warning functionality (which can be provided by good quality audio analytics or video motion detection) was preventing them from reducing shrinkage further. Video monitoring systems The retail sector has been turning to video analytics to help reduce the risk of COVID-19 transmission Over a quarter (26%) of retailers admitted that their video monitoring systems don’t work well for loss prevention because the cameras that were installed on-site were originally put in for a different purpose such as remote management of visual merchandising or footfall analysis. The retail sector has been turning to video analytics to help reduce the risk of COVID-19 transmission as they open up to more customers. A total of 87% of retail sector decision-makers questioned by Ava Security saw a clear role for their video monitoring systems in supporting safe re-opening of their doors to staff and customers. Nearly half of this group (48%) had already put their existing video monitoring systems to work to help reinforce social distancing measures. A further 39% anticipated doing so over the next 12 months. This means ‘net deployment’ for this purpose was 88%. Onsite video cameras Not far behind was the use of thermal camera-based analytics to help run temperature checks on visitors: 39% of retailers across the four countries in the Ava study had already deployed this capability, while a further 38% predicted to do so in the next 12 months. Only 22% of retail sector respondents had no plans to deploy temperature checking Despite some concerns about the accuracy of these solutions, only 22% of retail sector respondents had no plans to deploy temperature checking via onsite video cameras. The US proved to be the main adopter of temperature checking in retail – with deployment levels almost three times higher than in the UK. Video systems have been adapted to help monitor shopper density levels in high footfall areas within stores. 47% of retailers have already installed this analytics capability, while a further 38% plan to do so within the next 12 months. Facial recognition analytics Despite the controversy associated with the deployment of facial recognition, some 30% of retailers have already deployed facial recognition analytics at the entrances to staff-only areas to enable contactless access control and a further 34% plan to do so over the next 12 months. For the 79% of all retail sector are actively considering Video Security as a Service (VSaaS) options right now. There were many criteria determining provider selection: 91% net considering VSaaS right now agreed with the statement ‘it (the VSaaS provider selected) must allow us to continue using our existing third-party cameras which we have already installed, we don’t want to rip & replace any equipment.’ The desire to hold onto existing security cameras and other equipment through the migration to VSaaS was considered a very important consideration in provider selection by 43% of retail respondents. Video analytics capabilities Not wasting prior investment in on-premise security systems is key to VSaaS provider success Net 90% of retailers considering VSaaS confirmed, ‘It must allow us to view their directly attached cloud cameras alongside our third-party cameras on the same interface.’ The fact that these two factors are so important confirms that not wasting prior investment in on-premise security systems is key to VSaaS provider success. Net 86% of retailers regarded it as important that the VSaaS it selected ‘must enable us to run the latest video analytics capabilities such as occupancy levels for social distance management (in a room), noise analytics (e.g., breaking glass, screaming, yelling, etc.), people and vehicle search, object searching and color searching.’ The fourth most important factor was the cyber security credentials of the selected VSaaS provider, net 84% confirmed that its VSaaS ‘must have very strong cyber security, including end-to-end encryption from the camera to the cloud.’ Cyber security credentials Only marginally behind cyber security credentials came to Video Management Software functionality continuity - a net 83% of retailers specified that their selected VSaaS ‘must allow us to use our existing Video Management Software (VMS) or provide the same functionality as we get from our VMS.’ A net 82% insisted their VSaaS ‘must allow us to continue existing integration with other physical security and safety systems. The Ava Security Retail Sector Video Security Trends Report 2021 provides a wealth of data, graphs and insight linked to how Operations, Facilities Management, Security and IT directors and managers within the retail sector in the US, Norway, Sweden and the UK, are adapting their video security systems in the wake of the pandemic. Increased operational efficiencies It also provides insight into how they are now preparing for the easing of lockdown restrictions It also provides insight into how they are now preparing for the easing of lockdown restrictions. Most states across the USA have already reopened their shops but mask-wearing and social distancing recommendations are still being encouraged in stores across the US and Europe. Vegard Aas, Head of Online Business at Ava Security, commented: “Our findings indicate that retailers, which have been enthusiastic adopters of video security to reduce well-known shrinkage sources and deliver increased operational efficiencies through remote monitoring for example, are now upgrading these systems by adding new video analytics to reduce losses further and promote COVID Safety in stores.” Video security systems “We are also seeing a strong interest from this sector for moving video security systems into the cloud. It makes sense because many retailers have multiple shops which their managers monitor remotely using the in-store cameras.” “Moving video recording and management into the cloud using a VSaaS system could help ensure more efficient access and storage of key video sequences and cut capital expenditure as dedicated PCs running VMSs locally should no longer be needed in each shop in a VSaaS scenario. There are significant savings to be had and efficiencies to be derived if cloud migrations are managed correctly.”
PROMISE Technology, an enterprise storage solutions provider, is forecasting massive growth for large data storage, green technology and data compliance following surveillance trends unveiled at the International Security Conference (ISC West) 2021, held in Las Vegas recently. At ISC West, PROMISE Technology noted that the focus was very much on Smart Cities and Artificial Intelligence, mainly as a result of the ‘new norm’ brought along by the COVID-19 pandemic. The pandemic has brought into focus the necessity for security and video surveillance amid the ‘new norm’ - be it for tracking close contacts, containing new clusters and mutations, or vaccine passports. Access control products In tandem with this increased digitisation, many ISC West participants are offering products that cater to governments and property developers speeding up and reactivate pending smart city projects as economies around the globe recover. This contactless multimodal biometric access control products, touchscreen panels that offers unified home automation and security monitoring and space management systems. The integration of AIoT allows autonomy while increasing efficiency, foresee challenges and opportunities With an increase of smart cities, some ISC exhibitors focused on helping systems run smoothly with Artificial Intelligence of Things (AIoT) which is a key component in businesses to streamline decision making processes with the aid of gathering, analysing and interpreting data without the need of costly and significant system resources. The integration of AIoT allows autonomy while increasing efficiency, foresee challenges and opportunities, and scale proportionately according to the devices connected. Global surveillance industry The large amount of data emerging from the predicted increased surveillance results in a surge of data and requires efficient and large storage solutions to ensure a high efficacy rate. To address the demand for both larger storage and offer enhanced integration, PROMISE Technology converges physical security systems to leverage the accumulating amounts of data being produced. “PROMISE Technology has seen and supported first-hand major changes in the global surveillance industry over the last decade from traditional CVR all the way to AVR (Analytic Video Recorder). We will continue to converge physical security systems to leverage the accumulating amounts of data being produced. For example, our patented SMARTBOOST software provides optimised software features and FRU hardware design to eliminate storage equipment bottlenecks,” said Alice Chang, Chief Sales Officer of PROMISE Technology. Daily business operations PROMISE Technology has also dedicated an entire R&D team over the last 30 years to develop RAID solutionsPROMISE Technology has also dedicated an entire R&D team over the last 30 years to further develop Redundant Array of Independent Disks (RAID) solutions to improve efficiency for daily business operations which provides a solid engine to handle complicated data management requirements in the surveillance industry. This effort is coupled with PROMISE’s focus on eco-friendliness. Noting that incredible amounts of power is necessary to back the new trends, brands are expected to put extra emphasis on green technologies to conserve energy, save costs and keep enterprises as environmentally conscious as possible. PROMISE is also predicting that with AI and IoT devices creating large troves of personal data, the focus on cyberthreats as well as to protect privacy concerns has never been higher. Video surveillance products Thus, there is now a growing concern among manufacturers to provide National Defence Authorisation Act (NDAA)-compliant video surveillance products. “PROMISE Technology has made persistent endeavors in green production and compliance with government regulations, resulting in solid business results over the past 30 years. We consistently offer high-quality, reliable government-compliant solutions. By putting customer data protection and security first, we hope to bring peace of mind to our customers and partners worldwide,” said Chang. Large data storage solutions along with ‘green’ technology and strict compliance are only some of PROMISE’s solutions for the global audience. With expected surveillance industry boom in the ‘new norm,’ PROMISE is keeping a close eye on developments to ensure its solutions are in line with different local demands and evolving requirements to provide surveillance companies with tools to tackle new challenges.
Euralarm’s Services Section reports an important step forward for service providers and end-users of remote services: the very positive vote on the EN 50710, requirements for the provision of secure remote services for fire safety systems and security systems. The successful vote is the icing on the cake of the section’s efforts to guarantee more certainty for a future in which remote services play an increasingly important role. Secure remote services Jon Könz, Chair of Euralarm’s Services Section said, “It is an excellent result and an advancement for the fire safety and security industry. We would like to thank those who helped in the CEN/CENELEC JTC4/WG1 and who contributed to the ‘yes’ of 95% of the countries that could bring out a vote.” With the acceptance as a European Norm, it should be ready for publication in early 2022, after which the implementation in the respective countries will begin. It is an excellent result and an advancement for the fire safety and security industry" With the requirements for the provision of secure remote services via a remote access infrastructure being specified, both end-users and service providers will benefit from it. Both will also be able to take advantage of the technological developments within fire safety systems and/or security systems (FSSS) and the remote access infrastructure. Professional services providers It has been common practice for many years to monitor the alarm and fault status of fire safety and security systems (FSSS) installed in premises from remote locations. Technological developments as well as the telecommunication paths nowadays permit remote access to those FSSS with a wide variety of available functions up to and including full operation and programming as if an authorized person was on-site. Remote service supplements the on-site visits of a competent person and enables new possibilities for customers (end-users). Euralarm’s Mr. Bernd Giegerich, the convenor of WG1 said, “The overall service quality offered by the various types of professional services providers at the time of installation, maintenance or operation increases significantly. On one hand, end-users experience faster response times leading to higher system reliability and availability. On the other hand, service providers can provide new services such as predictive maintenance, which also improves staff utilisation.” Strict operational procedures Updates for instance can now be done by the manufacturers themselves or in consultation" Not all countries have industry standards for the use of remote access, which are crucial for end-users and service providers. Jon Könz stated, “With the arrival of this new European Norm, there will be a robust criteria against which remote services will be measured. Further, it will contribute to overcoming any hesitation about design requirements and strict operational procedures that are fundamental in avoiding actions such as unintended deactivation of parts of an FSSS.” Bernd Giegerich adds, “Apart from giving a framework for service providers, there are also the manufacturers who will benefit from the new standard. Certain manufacturers might go directly with their services. Updates for instance can now be done by the manufacturers themselves or in consultation with the system integrator.” Cross-border services “And for services providers there is the additional benefit of having a structure to explain to their customers what they can expect. In short, it will bring more clarity for the market on the provision and use of remote services as well as more transparency on what a client can expect from a service provider.” The pan-European approach of remote services is in line with the key objective of the European Services Directive in making provisions for cross-border services. It is important to outline that the EN 16763 (services standard for fire safety and security systems) is referenced in the EN 50710. The EN 16763 is applied in conjunction with installation guidelines, either European (if any) or national, as well as with national laws and regulations in the field of the systems. It sets the foundation for quality in services provision and is so an important basis for the EN 50710.
NAPCO Security Technologies is pleased to introduce its new Gemini Commercial Mobile App for its powerful, popular GEMP1632, GEMP1664, GEMP3200, GEMP9600 and GEMX255 Hybrid Control Panel Series. Customisable for dealers The all-new portrait-style, Gemini Commercial App provides smart multi-tier controls for business accounts of all sizes, on all NAPCO Gemini Security &/or Integrated Access Control Systems, 8 to 255 zones. And, it’s customisable for dealers to easily upload their own logo, contact and instructional info to make it an App of their own, for a bigger company image. Available for IOS and Android phones/smart devices for universality, it’s free of charge, downloadable from Apple or Google. Highlights The Gemini Commercial App can be used by both dealers and their accounts, and features easy intuitive mobile control of security systems and/or their integrated access control systems, supporting multi-tier user/manager levels, including administrative control of Users and Groups, such as managers and employees, for example, and privileges on one or across multiple areas, as applicable. The user experience includes an easy graphical icon-based screen &/or traditional virtual 3D keypad (portrait), including dealer keypad programming mode, scheduling, zone description templates & address book utility. Also handy for all are distinct access and alarm logs, zone open lists, user codes and access cards.
The New DICE Corporation is bringing its innovative technology, products and unique services to Latin America. With an evolutionary vision for alarm and video monitoring, this expansion will provide the growing global security industry with a game-changing way of doing business. Phase one will consist of introducing software as a service that enables interactive and advanced video monitoring services with video analytics that includes artificial intelligence for enterprise end users, guard companies, central stations and integrators. Market development plans While DICE Corporation has always been a global company, there is now an increased focus and resources for the region based on the company’s successes in the U.S. and Canada. Fresh, modern, and professional, the New DICE branding embodies an organisation that is reinventing itself but is still very committed to the security industry and now LATAM. The new identity builds upon the company’s 35-year history of innovation and quality, but also opens doors to the future. This expansion brings our multi-million-dollar investment in new technologies, new products, and new services that include IoT, artificial intelligence, machine learning, analytics, integrated audio, and video into Latin America. Video alarm services Latin America represents an important role in our global market development plans" These powerful technologies will also unlock opportunities for command centres and integrators to provide a new world of automated and smart video alarm services, which means increased RMR and a reduction in operational time and resources. "Latin America represents an important role in our global market development plans,” stated the New DICE Corporation’s Co-President Avi Lupo. “DICE is changing because the world around us is changing. The New DICE is a major milestone for the company as the IoT, interactive video and remote guarding markets accelerate, opening a unique opportunity for the security industry in Latin America to step into the future.” Integrated business operations Going beyond basic security and automation monitoring, the New DICE has developed products for integrated business operations, resiliency, telecom, video, and mobile that offer the industry unified solutions to empower their businesses. Many of the solutions can interface with any central station software. To promote the New DICE entering Latin America, Spanish translation is now available on the company’s website. There are also plans to hold virtual introductory events, as well as new marketing initiatives. “We see a very promising future and are excited to be entering these new markets where we can bring our innovations to more users and partners in Latin America," Lupo added.
Dahua Technology, a video-centric smart IoT solution and service provider, recently launches its Cooper-I Series XVR. As the first entry-level XVR to offer AI functions, this series allows customers to avail AI-enabled XVRs without spending a fortune. AI has been a common feature in the monitoring industry, which paved the way for the AI era. With its continuous innovation and development, AI has become part of Dahua's standard configuration, even for entry-level products. With the combination of HDCVI 6.0 PLUS innovation and cutting-edge AI technology, Dahua has realised the AI upgrade of its complete HDCVI recorder product line, continuously making breakthroughs to lead the industry’s HD-over-Coax development. Bringing great convenience "AI has penetrated into every aspect of our lives. Its value in improving efficiency and saving time and manpower costs has gradually been acknowledged, especially in terms of alarm accuracy and quick target search. However, the price of AI products might not be economical for budget-conscious customers. That is the major reason why we released the Cooper-I Series – to equip all HDCVI recorders with AI capabilities, making AI accessible to everyone," said Nicole Liu, XVR Product Manager of Dahua Technology. The Cooper-I Series XVR brings great convenience and value to both installers and users The Cooper-I Series XVR brings great convenience and value to both installers and users, especially with its AI functions that include SMD Plus and AI coding. These intelligent features are enabled by default and do not require extra configuration, making the whole installation process significantly easier and faster. Accurately identifying people The Smart Motion Detection Plus, or simply SMD Plus, can accurately identify people and vehicles and filter out false alarms triggered by irrelevant objects such as leaves, animals, light, etc., eliminating the hassle caused by repeated false alarms. During evidence collection, instead of manually screening a massive amount of videos after an event, users can search the target using target types (human and vehicle), which helps improve investigation efficiency and accelerate case closure. The SMD Plus function of Cooper-I Series XVR works smoothly with an HDCVI TiOC camera in preventing possible crime thanks to its active deterrence feature. The camera’s built-in siren together with its Smart LED lights can effectively warn off and deter intruders. This device is also integrated with the Dahua DMSS mobile application that users can use to monitor their surveillance operation anytime, anywhere. Customising alarm ringtones Users can record their own voices based on different scenarios and upload it to the camera Moreover, it also supports customisation of alarm ringtones that can be played by the front-end camera when the target is detected. Users can record their own voices based on different scenarios and upload it to the camera through the DMSS app. For example, a greeting like ‘Welcome!’ can be set at the entrance of a supermarket, while warning prompts such as ‘No trespassing’ and ‘No parking’ can be set respectively in private villas and areas where parking is forbidden. Another advantage of the latest Cooper-I Series XVR is its AI coding function. Compared to conventional H.264/H.265 coding, it saves more than 50% of bandwidth and storage space while maintaining complete images of people and vehicles and without compromising image quality. Other technological advantages Thanks to CBR (Constant Bit Rate), AI coding ensures compatible integration with third-party devices and platforms, as well as stable operation of the system. Overall, the Dahua Cooper-I Series XVR is indeed an intelligent recorder and storage device that offers convenience, ease of use, cost-effectiveness and other technological advantages. It is suitable to a wide array of application scenarios such as retail shops, parking lots and private villas. Equipped with amazing AI features including SMD Plus and AI coding, this series makes AI inclusive and available for everyone without breaking their budget. With its mission of ‘Enabling a safer society and smarter living’, Dahua Technology will continue to focus on ‘Innovation, Quality and Service’ to serve its partners and customers around the world.
Perimeter security is by no means a new concept. A phrase used to describe solutions with the primary purpose of limiting access to any area that is prohibited to the public at large, perimeter security has been prevalent for millennia. From Hadrian’s Wall that was built by the Roman Empire in Britain back in AD 122 to the Great Wall of China that winds almost 22,000 kilometers through the Asian country’s eastern regions, it is a concept that remains a fundamental part of global societies today. Fast forward to today and no longer are we reliant on 50-foot-high, 20-foot-thick stone blockades to protect our safety. Perimeter security has evolved over the centuries moving from empires and structures to products and cutting-edge technology and continues to grow today. In fact, in 2020 Perimeter Security was a $61.3 billion industry as more businesses and industries have the need to protect against modern-day threats. This colossal and growing market is powered by industry innovators that are providing advanced solutions that are reliable, integrated, and cost-effective. Layered Perimeter Security Defense The number of perimeter intrusions is a large reason behind the continued surge in security investment, propelled by increasing urbanisation, a growing terror threat, and a plethora of other concerning factors. Most organisations are better equipped to protect people and assets today, yet there is still a need for solutions that can grow with our future needs and the unforeseen challenges ahead. For many, this means moving beyond siloed solutions into a multi-layered, integrated physical security strategy – one that provides the best security posture possible. There are a variety of innovative technologies that can create a holistic perimeter security solution that will transform the defences of any organisation. The question is, what are the technologies and trends shaping perimeter security in 2021 and beyond? Next-Generation Video Surveillance By combining two powerful visualisation technologies in a single form factor, rich data can be captured and deliver more accurate awareness In today’s surveillance market, cameras and video management systems are nothing like those that were available a mere half-decade ago. Cameras now readily feature ultra-HD and 4K resolution that provide an extremely high level of detail, enhancing security teams’ ability to capture evidence and identify perpetrators. This enhanced detail bolsters not only investigation sequences but equally transforms video analytics capabilities, like facial recognition that unlock additional business benefits. Where are cameras heading in the future? Let’s look at Oyla’s cameras as an example. These cameras fuse together artificial intelligence (AI), video, and 3D data, offering a depth camera that can be used to define very accurate intrusion detection perimeters. Its advanced motion detection activates an alert when a user-defined perimeter has been crossed, or if there is a presence in a user-defined area or volume space. By combining two powerful visualisation technologies in a single form factor, rich data can be captured and deliver more accurate awareness and better application of deterrence measures in real-time, versus the evidentiary use of cameras today. Thermal Cameras Thermal cameras are a relatively novel yet growing security phenomenon, having come to the forefront during the pandemic. Where such technology was once a novelty, their widespread application in detecting raised temperatures which might indicate a COVID-19-related fever has seen them become increasingly applied to a broader market in the past 18 months. Not only are these cameras now more accessible, but they have also advanced from a technical perspective. Modern thermal cameras now offer a more accurate thermal resolution, longer detection ranges, ONVIF compliance and edge-based analytics for the benefit of VMS solutions. They are also a useful technology for solving visibility challenges in complete darkness. Radar Radar is a technology that’s increasingly being used in physical perimeter security applications. Capable of conducting 360-degree scans of a property on a continual basis every couple of seconds, it is an extremely powerful intrusion detection technology. Radars stand up better than other technologies in difficult conditions such as smoke and fog. When paired with other sensors, false alarms can also be reduced in these conditions – something that is a major challenge more broadly. While law enforcement responds to millions of security alarms every year, a study from the United States Department of Justice's Office of Community Oriented Policing Services previously showed that between 94 and 98 percent of these turn out to be false, costing as much as $1.8 billion a year in wasted police time and resources. LiDAR What is LiDAR? LiDAR has been around since the 1960s, with one of LiDAR’s first use cases was being attached to aircraft to emit laser light towards the surface of the earth to provide distance readings. Spurred by its necessity for the coming autonomous driving revolution, today, the application of LiDAR technology has become more widespread. It is technologies such as these, designed to reduce the burden of security personnel by conducting the heavy lifting in alarm validation According to research by Fortune Business Insights, the size of the global LiDAR market is set to surpass $6.7 billion by 2026, a monumental increase on the $1.32 billion spent on LiDAR in 2018. In the security space, LiDAR technology is already proving it carries a string of benefits and upgrades on what is currently available on the video surveillance market. The major upside of LiDAR is that like video, it brings a high level of detail to a physical environment that other sensors simply cannot provide. Pairing Lidar with video, machine learning, AI, and other advanced sensor technologies can help validate alarm accuracy. Indeed, it is technologies such as these, designed to reduce the burden of security personnel by conducting the heavy lifting in alarm validation, that we can expect to become increasingly prevalent soon. Drones Often referred to as unmanned aerial vehicles (UAVs), drones are another technology that is becoming both more accessible and more capable from a security perspective. In sizable areas of land or hard-to-reach critical infrastructure sites, drones can be dispatched instead of security personnel as a means of first response to an intrusion alert. They can also work in tandem with thermal imaging, radar, lidar, and next-generation video surveillance technologies, either incorporating them onboard directly or supporting them in wider, integrated security infrastructures. Developing the Right Multi-Layered Perimeter Security Strategy These are just a handful of some of the more progressive perimeter security-centric technologies on the market today. The challenge for many organisations is knowing which solutions will suit their needs and address the challenges of tomorrow. Take the time to understand what you need to protect. Is it people, data, or assets? Where do you feel your potential vulnerabilities may lie? By assessing your risks, you will better understand potential target areas and address them accordingly. For perimeter security, a multi-layered solution will likely be the most secure approach. From basic needs to the more advanced, there are a broad variety of possible solutions available. Yet taking the time to understand which solutions are the most successful, cost-effective, and relevant to your business will yield the best results.
The 2020s will be a wireless decade in access control, says Russell Wagstaff from ASSA ABLOY Opening Solutions EMEA. He examines the trends data, and looks beyond mobile keys to brand new security roles for the smartphone. The benefits of wire-free electronic access control are well rehearsed. They are also more relevant than ever. A wireless solution gives facility managers deeper, more flexible control over who should have access, where and when, because installing, operating and integrating them is easier and less expensive than wiring more doors. Battery powered locks Many procurement teams are now aware of these cost advantages, but perhaps not their scale. Research for an ASSA ABLOY Opening Solutions (AAOS) benchmarking exercise found installation stage to be the largest contributor to cost reduction. Comparing a typical installation of battery-powered Aperio locks versus wired locks at the same scale, the research projected an 80% saving in installers’ labour costs for customers who go cable-free. Battery powered locks all consume much less energy than traditional wired locks Operating costs are also lower for wireless: Battery powered locks all consume much less energy than traditional wired locks, which normally work via magnets connected permanently to electricity. Wireless locks only ‘wake up’ when presented with a credential for which they must make an access decision. AAOS estimated a 70% saving in energy use over a comparable lock’s lifetime. Find out more about wireless access control at ASSA ABLOY's upcoming 29th June webinar Deploying wireless locks In short, every time a business chooses a wireless lock rather than a wired door, they benefit from both installation and operating cost savings. A recent report from IFSEC Global, AAOS and Omdia reveals the extent to which the advantages of wireless are cutting through. Responses to a large survey of security professionals — end-users, installers, integrators and consultants serving large corporations and small- to medium-sized organisations in education, healthcare, industrial, commercial, infrastructure, retail, banking and other sectors — suggest almost four locations in ten (38%) have now deployed wireless locks as a part or the whole of their access solution. The corresponding data point from AAOS’s 2014 Report was 23%. Electronic access control Electronic access control is less dependent than ever on cabling Without doubt, electronic access control is less dependent than ever on cabling: Even after a year when many investments have been deferred or curtailed, the data reveals fast-growing adoption of wireless locks, technologies and systems. Is mobile access control — based on digital credentials or ‘virtual keys’ stored on a smartphone — an ideal security technology for this wire-free future? In fact, the same report finds mobile access is growing fast right now. Among those surveyed, 26% of end-users already offer mobile compatibility; 39% plan to roll out mobile access within two years. Before the mid-2020s, around two-thirds of access systems will employ the smartphone in some way. The smartphone is also convenient for gathering system insights Driving rapid adoption What is driving such rapid adoption? The convenience benefits for everyday users are obvious — witness the mobile boom in banking and payments, travel or event ticketing, transport, food delivery and countless more areas of modern life. Access control is a natural fit. If you have your phone, you are already carrying your keys: What could be easier? IBM forecasts that 1.87 billion people globally will be mobile workers by 2022 Less often discussed are the ways mobile management makes life easier for facility and security managers, too. Among those polled for the new Wireless Access Control Report, almost half (47%) agreed that ‘Mobile was more flexible than physical credentials, and 36% believe that mobile credentials make it easier to upgrade employee access rights at any time.’ IBM forecasts that 1.87 billion people globally will be mobile workers by 2022. Workers in every impacted sector require solutions which can get the job done from anywhere: Access management via smartphone offers this. Site management device The smartphone is also convenient for gathering system insights. For example, one new reporting and analytics tool for CLIQ key-based access control systems uses an app to collect, visualise and evaluate access data. Security system data could contribute to business success. The app’s clear, visual layout helps managers to instantly spot relevant trends, anomalies or patterns. It’s simple to export, to share insights across the business. Reinvented for learning — not just as a ‘key’ or site management device — the phone will help businesses make smarter, data-informed decisions. The smartphone will also play a major role in security — and everything else — for an exciting new generation of smart buildings. These buildings will derive their intelligence from interoperability. Over 90% of the report’s survey respondents highlighted the importance of integration across building functions including access control, CCTV, alarm and visitor management systems. Genuinely seamless integration They offer greater peace of mind than proprietary solutions which ‘lock you in’ for the long term Yet in practice, stumbling blocks remain on the road to deeper, genuinely seamless integration. More than a quarter of those polled felt held back by a lack of solutions developed to open standards. ‘Open standards are key for the momentum behind the shift towards system integration,’ notes the Report. As well as being more flexible, open solutions are better futureproofed. Shared standards ensure investments can be made today with confidence that hardware and firmware may be built on seamlessly in the future. They offer greater peace of mind than proprietary solutions which ‘lock you in’ for the long term. Open solutions and mobile management are critical to achieving the goals which end-users in every vertical are chasing: scalability, flexibility, sustainability, cost-efficiency and convenience.
Display solutions play a key role in SOCs in providing the screens needed for individuals and teams to visualise and share the multiple data sources needed in an SOC today. Security Operation Centre (SOC) Every SOC has multiple sources and inputs, both physical and virtual, all of which provide numerous data points to operators, in order to provide the highest levels of physical and cyber security, including surveillance camera feeds, access control and alarm systems for physical security, as well as dashboards and web apps for cyber security applications. Today’s advancements in technology and computing power not only have increasingly made security systems much more scalable, by adding hundreds, if not thousands, of more data points to an SOC, but the rate at which the data comes in has significantly increased as well. Accurate monitoring and surveillance This has made monitoring and surveillance much more accurate and effective, but also more challenging for operators, as they can’t realistically monitor the hundreds, even thousands of cameras, dashboards, calls, etc. in a reactive manner. Lacking situational awareness is often one of the primary factors in poor decision making In order for operators in SOC’s to be able to mitigate incidents in a less reactive way and take meaningful action, streamlined actionable data is needed. This is what will ensure operators in SOC truly have situational awareness. Situational awareness is a key foundation of effective decision making. In its simplest form, ‘It is knowing what is going on’. Lacking situational awareness is often one of the primary factors in poor decision making and in accidents attributed to human error. Achieving ‘true’ situational awareness Situational awareness isn’t just what has already happened, but what is likely to happen next and to achieve ‘true’ situational awareness, a combination of actionable data and the ability to deliver that information or data to the right people, at the right time. This is where visualisation platforms (known as visual networking platforms) that provide both the situational real estate, as well as support for computer vision and AI, can help SOCs achieve true situational awareness Role of computer vision and AI technologies Proactive situational awareness is when the data coming into the SOC is analysed in real time and then, brought forward to operators who are decision makers and key stakeholders in near real time for actionable visualisation. Computer vision is a field of Artificial Intelligence that trains computers to interpret and understand digital images and videos. It is a way to automate tasks that the human visual system can also carry out, the automatic extraction, analysis and understanding of useful information from a single image or a sequence of images. There are numerous potential value adds that computer vision can provide to operation centres of different kinds. Here are some examples: Face Recognition: Face detection algorithms can be applied to filter and identify an individual. Biometric Systems: AI can be applied to biometric descriptions such as fingerprint, iris, and face matching. Surveillance: Computer vision supports IoT cameras used to monitor activities and movements of just about any kind that might be related to security and safety, whether that's on the job safety or physical security. Smart Cities: AI and computer vision can be used to improve mobility through quantitative, objective and automated management of resource use (car parks, roads, public squares, etc.) based on the analysis of CCTV data. Event Recognition: Improve the visualisation and the decision-making process of human operators or existing video surveillance solutions, by integrating real-time video data analysis algorithms to understand the content of the filmed scene and to extract the relevant information from it. Monitoring: Responding to specific tasks in terms of continuous monitoring and surveillance in many different application frameworks: improved management of logistics in storage warehouses, counting of people during event gatherings, monitoring of subway stations, coastal areas, etc. Computer Vision applications When considering a Computer Vision application, it’s important to ensure that the rest of the infrastructure in the Operation Centre, for example the solution that drives the displays and video walls, will connect and work well with the computer vision application. The best way to do this of course is to use a software-driven approach to displaying information and data, rather than a traditional AV hardware approach, which may present incompatibilities. Software-defined and open technology solutions Software-defined and open technology solutions provide a wider support for any type of application the SOC may need Software-defined and open technology solutions provide a wider support for any type of application the SOC may need, including computer vision. In the modern world, with everything going digital, all security services and applications have become networked, and as such, they belong to IT. AV applications and services have increasingly become an integral part of an organisation’s IT infrastructure. Software-defined approach to AV IT teams responsible for data protection are more in favour of a software-defined approach to AV that allow virtualised, open technologies as opposed to traditional hardware-based solutions. Software’s flexibility allows for more efficient refreshment cycles, expansions and upgrades. The rise of AV-over-IP technologies have enabled IT teams in SOC’s to effectively integrate AV solutions into their existing stack, greatly reducing overhead costs, when it comes to technology investments, staff training, maintenance, and even physical infrastructure. AV-over-IP software platforms Moreover, with AV-over-IP, software-defined AV platforms, IT teams can more easily integrate AI and Computer Vision applications within the SOC, and have better control of the data coming in, while achieving true situational awareness. Situational awareness is all about actionable data delivered to the right people, at the right time, in order to address security incidents and challenges. Situational awareness is all about actionable data delivered to the right people Often, the people who need to know about security risks or breaches are not physically present in the operation centres, so having the data and information locked up within the four walls of the SOC does not provide true situational awareness. Hyper-scalable visual platforms Instead there is a need to be able to deliver the video stream, the dashboard of the data and information to any screen anywhere, at any time — including desktops, tablets phones — for the right people to see, whether that is an executive in a different office or working from home, or security guards walking the halls or streets. New technologies are continuing to extend the reach and the benefits of security operation centres. However, interoperability plays a key role in bringing together AI, machine learning and computer vision technologies, in order to ensure data is turned into actionable data, which is delivered to the right people to provide ‘true’ situational awareness. Software-defined, AV-over-IP platforms are the perfect medium to facilitate this for any organisations with physical and cyber security needs.
A result of the COVID-19 pandemic has been fewer crowds gathering for outdoor events. However, sooner or later, crowded events will surge, as will the danger of injury or death from vehicle attacks. The threats of vehicular violence are still present even though collisions have become less frequent and traffic, in general, is at a significant low. Preparing for such instances remains a high priority, and institutions are seeking to take a preemptive stance to prevent major incidents before they happen. Vehicle security barriers Even amid the pandemic, manufacturers of vehicle barriers have not seen a major impact on their sales. “Half of the battle against aggressors perpetrating a vehicle attack is pre-planning,” says Greg Hamm, Vice President of Sales and Marketing, Delta Scientific. He says Delta is fortunate to have long-standing trust relationships with many agencies, built over the last 46 years. “We're happy to see that demand for vehicle security barriers has not changed much – customers are preparing for the future when crowds will be present again, and probably larger than ever,” adds Stuart Glen, National Sales Manager of Jackson’s Fencing. “Lots of councils are using the downtime to install or upgrade security around town and city centers, which is promising.” Physical structures such as bollards, barriers, and barricades can stop a vehicle from entering a high-foot-traffic area. Temporary venues can deploy portable barriers. "We're happy to see that demand for vehicle security barriers has not changed much" Fully automated system The first consideration is the level of security required for a particular location. A parking garage for a foreign embassy or federal courthouse will require far more serious security measures than a parking lot for a mall. Other primary factors to consider include the frequency of vehicles moving in and out and whether there will be vehicle inspections performed or a fully automated system at the entrance. “A key challenge when protecting people from vehicle attacks is trying to ensure that the public are kept safe, but do not feel worried or overly aware of any risks,” says Glen. “People should feel protected and be able to move freely. Discreet measures such as bollards are ideal as they don't restrict pedestrian flow but are very effective in the case of a hostile vehicle attack.” Sparking future assaults The use of vehicles as tools of destruction has become one of the top concerns for security specialists Events and sports venues need increased protection as they are likely targets due to the high numbers of crowds. Places of worship are sadly another target that should be given extra protection, says Glen. The use of vehicles as tools of destruction has become one of the top concerns for security specialists. This tactic has grown popular regardless of ideology and is especially alarming when coupled with cars’ accessibility. In many places, individuals only need a valid driver’s license to rent a truck. News of a particular attack encourages or inspires other individuals to perpetuate the same form of violence. Unfortunately, this creates a feedback loop as more reports emerge following these tragedies, potentially sparking future assaults. Straightforward security solutions In the case of vehicle-ramming attacks, there are straightforward security solutions to protect patrons. Delta Scientific offers over 100 product designs, emphasising barriers that stop and destroy attacking vehicles. Delta’s barriers carry crash ratings from PU50 up to K54 and include sophisticated control systems that provide custom optimisation. Control systems feature the latest, most advanced protection technology. Early warning systems enable active security measures built into Delta products plus alert features to on-site security personnel. Delta Scientific’s High Security Protection and Barricade Systems are used internationally by governments, armed forces, federal agencies, private corporations, and other industries. Jackson’s Fencing’s range of solutions includes fencing, bollards, road blockers, and gates. They have been tested to PAS 68 standards and can stop a 7.5-ton vehicle travelling at 50mph (80km/h). The products come with a 25-year guarantee. Attractive timber appearance They offer crash ratings up to M50 and include both automated barriers and passive bollards In addition, their unique Linebacker PNR system is a cable crash fence, encased within a timber post and rail fence, offering a completely discreet yet highly effective vehicle security barrier with an attractive timber appearance. Facilities that require day-to-day employee and civilian access need permanent solutions installed to thwart daily terror threats, says Hamm of Delta Scientific. Solutions include wedge barriers, bollards, beams, and sliding gates with high duty cycles and excellent reliability coupled with appropriate crash ratings. Local fairs and festivals, parades, conventions, sports, and vaccination sites utilise portable barriers that can be towed into place and set up within 30 minutes. They offer crash ratings up to M50 and include both automated barriers and passive bollards. They can be plugged into a local 120v source and provide a portable solution that allows vehicle throughput by pushing a button. Vehicle-borne attacks Both temporary and permanent barriers are extremely effective, says Glen of Jackson’s Fencing. Temporary barriers can be deployed rapidly and removed when a threat has passed (for example, an event such as the London marathon, where large crowds gather), while permanent measures are used for sites that will always be a high-risk target. Glen says temporary barriers also generally have a more dominating appearance and wider footprint. Permanent measures are used for sites that will always be a high-risk target. Temporary barriers can be used immediately after a risk assessment highlights vehicle-borne attacks as a threat to a site before permanent measures are installed. They can help to identify the ideal positioning of permanent barriers – often it's a case of trial and error before finding a solution that works well for one’s particular needs. The United States Department of Homeland Security (DHS) has provided certification according to the Support Anti-terrorism by Fostering Effective Technology Act (SAFETY Act) of 2002. Access control products This certification minimises insurance risks for organisations that deploy authorised Delta vehicle access control products to protect against terrorists and errant drivers. All products certified are covered retroactively back to 1984 and are now authorised to carry the SAFETY Act Designated mark. By minimising insurance risks to deploying authorised Delta vehicle access systems, this certification lets customers feel comfortable knowing that they have the full faith and backing of the Department of Homeland Security. A common planning deficiency occurs when designers choose non-certified barriers or barricades A common planning deficiency occurs when designers choose non-certified barriers or barricades. Certified equipment has been tested and proven to work under extreme conditions, thus giving planners the confidence they rely on. No area is more critical to the vehicle barrier selection process than testing. Without adequate testing, there is no assurance that the barrier will resist the threat. Independent testing company Testing is normally done by an independent testing company or government agency, such as the Department of State (DOS) and ASTM. Comprehensive reports of test results are issued and are available from the testing agency or manufacturer. A common misconception among the general public is that the barriers are ‘ugly,’ but this often comes from the appearance of temporary barriers that are installed for testing purposes before deciding on permanent measures. Temporary barriers often have a large footprint because they have no foundations and can be quite obtrusive. There are actually many discreet and attractive permanent solutions such as road blockers and stainless steel rising bollards, which allow flexible control over entry and security, and can be rapidly activated.
At an Oldsmar, Fla., water treatment facility on Feb. 5, an operator watched a computer screen as someone remotely accessed the system monitoring the water supply and increased the amount of sodium hydroxide from 100 parts per million to 11,100 parts per million. The chemical, also known as lye, is used in small concentrations to control acidity in the water. In larger concentrations, the compound is poisonous – the same corrosive chemical used to eat away at clogged drains. The impact of cybersecurity attacks The incident is the latest example of how cybersecurity attacks can translate into real-world, physical security consequences – even deadly ones.Cybersecurity attacks on small municipal water systems have been a concern among security professionals for years. The computer system was set up to allow remote access only to authorised users. The source of the unauthorised access is unknown. However, the attacker was only in the system for 3 to 5 minutes, and an operator corrected the concentration back to 100 parts per million soon after. It would have taken a day or more for contaminated water to enter the system. In the end, the city’s water supply was not affected. There were other safeguards in place that would have prevented contaminated water from entering the city’s water supply, which serves around 15,000 residents. The remote access used for the attack was disabled pending an investigation by the FBI, Secret Service and Pinellas County Sheriff’s Office. On Feb. 2, a compilation of breached usernames and passwords, known as COMB for “Compilation of Many Breaches,” was leaked online. COMB contains 3.2 billion unique email/password pairs. It was later discovered that the breach included the credentials for the Oldsmar water plant. Water plant attacks feared for years Cybersecurity attacks on small municipal water systems have been a concern among security professionals for years. Florida’s Sen. Marco Rubio tweeted that the attempt to poison the water supply should be treated as a “matter of national security.” “The incident at the Oldsmar water treatment plant is a reminder that our nation’s critical infrastructure is continually at risk; not only from nation-state attackers, but also from malicious actors with unknown motives and goals,” comments Mieng Lim, VP of Product Management at Digital Defense Inc., a provider of vulnerability management and threat assessment solutions.The attack on Oldsmar’s water treatment system shows how critical national infrastructure is increasingly becoming a target for hackers as organizations bring systems online “Our dependency on critical infrastructure – power grids, utilities, water supplies, communications, financial services, emergency services, etc. – on a daily basis emphasises the need to ensure the systems are defended against any adversary,” Mieng Lim adds. “Proactive security measures are crucial to safeguard critical infrastructure systems when perimeter defences have been compromised or circumvented. We have to get back to the basics – re-evaluate and rebuild security protections from the ground up.” "This event reinforces the increasing need to authenticate not only users, but the devices and machine identities that are authorised to connect to an organisation's network,” adds Chris Hickman, Chief Security Officer at digital identity security vendor Keyfactor. “If your only line of protection is user authentication, it will be compromised. It's not necessarily about who connects to the system, but what that user can access once they're inside. "If the network could have authenticated the validity of the device connecting to the network, the connection would have failed because hackers rarely have possession of authorised devices. This and other cases of hijacked user credentials can be limited or mitigated if devices are issued strong, crypto-derived, unique credentials like a digital certificate. In this case, it looks like the network had trust in the user credential but not in the validity of the device itself. Unfortunately, this kind of scenario is what can happen when zero trust is your end state, not your beginning point." “The attack on Oldsmar’s water treatment system shows how critical national infrastructure is increasingly becoming a target for hackers as organisations bring systems online for the first time as part of digital transformation projects,” says Gareth Williams, Vice President - Secure Communications & Information Systems, Thales UK. “While the move towards greater automation and connected switches and control systems brings unprecedented opportunities, it is not without risk, as anything that is brought online immediately becomes a target to be hacked.” Operational technology to mitigate attacks Williams advises organisations to approach Operational Technology as its own entity and put in place procedures that mitigate against the impact of an attack that could ultimately cost lives. This means understanding what is connected, who has access to it and what else might be at risk should that system be compromised, he says. “Once that is established, they can secure access through protocols like access management and fail-safe systems.” “The cyberattack against the water supply in Oldsmar should come as a wakeup call,” says Saryu Nayyar, CEO, Gurucul. “Cybersecurity professionals have been talking about infrastructure vulnerabilities for years, detailing the potential for attacks like this, and this is a near perfect example of what we have been warning about,” she says. Although this attack was not successful, there is little doubt a skilled attacker could execute a similar infrastructure attack with more destructive results, says Nayyar. Organisations tasked with operating and protecting critical public infrastructure must assume the worst and take more serious measures to protect their environments, she advises. Fortunately, there were backup systems in place in Oldsmar. What could have been a tragedy instead became a cautionary tale. Both physical security and cybersecurity professionals should pay attention.
Convergint Technologies’ rapid growth has come through a combination of organic growth and acquisitions — they have acquired 35 companies since 2014. Growth has been a focus since day one when the founders started the systems integration company with 10 colleagues in a basement. Today, the diverse company includes more than 5,000 employees globally. As technology has advanced and business practices have evolved, Convergint’s core values and beliefs have guided their path forward. Customer-centric approach Convergint’s culture is a critical aspect of the company, from the executive level to frontline colleagues. “It is essential that the companies we look to acquire and develop partnerships with directly align with our people-first, customer-centric, inclusive culture centered on colleagues and customers,” says Mike Mathes, Executive Vice President, Convergint Technologies. “This approach has allowed us to maintain and grow our number of colleagues across our acquisitions and enables us to continue being our customers’ best service provider.” Integration practices Many practices have to be form-fitted to each individual acquisition A simple but important consideration as Convergint grows through acquisitions is: No two companies are the same. While some integration practices can be standardised across the company, many practices have to be form-fitted to each individual acquisition, says Mathes. “Our objective is not to come in and immediately implement change. We want to build on what has already been successful within the local market and share our learned experiences. There is plenty we can learn from each other and create a much better organisation.” Mathes says that Convergint’s view of a successful acquisition is that 1+1=3. “The end result is always much more impactful than what we anticipated,” he says. “Every acquisition brings with it an experienced leadership team, dedicated and skilled colleagues, vertical market and technological expertise. Most acquisitions are in geographies where we do not already operate, so with every acquisition, we increase our capability to serve our customers much better.” Also, the network of Global Convergint Technology Centres (CTCs) helps expand clientele, and the Convergint Development Centre (CDC) offers new support capabilities allowing acquisitions to grow at a very high rate. Expanding service Are there more acquisitions to come? Mathes says Convergint is always open to further expanding its footprint across the globe, improving its ability to service customers, deepening their technical expertise, and continuing to expand service offerings across the current and new vertical markets. However, the current focus remains on several key factors: service to colleagues, customers, and communities. “While obviously, acquisitions fuel our growth, the addition of these organisations to Convergint has really improved our ability to service clients on a global basis,” says Mathes. Acquiring ICD Security Solutions in Asia, for example, made Convergint a pioneer in that market for U.S.-based multi-national companies. Meeting customers demand “Convergint does not weigh market conditions when making an acquisition decision,” says Mathes. Rather, they are primarily focused on meeting or exceeding their customer’s needs on a local to a global level. They see acquisitions as a potential way to extend their geographic reach so they can be closer to customers. An acquisition might also expand technological or vertical market expertise. “The end goal is for us to enhance our service capabilities by attracting and retaining talented colleagues and leaders to better service our customers,” says Mathes. Enhancing and expanding services Convergint identifies how to leverage the expertise to further enhance and expand current service options “Economies of scale” have not been a consideration. They have never sought to acquire companies and restructure them in the process, for example. Rather, each company brings forth a unique skillset, is carefully vetted by the executive team, and provides purpose in the company's mission and vision for the future.” “Frontline colleagues are Convergint’s most valuable assets,” says Mathes. Rather than restructuring and eliminating skilled, knowledgeable colleagues, Convergint identifies how they can leverage the expertise to further enhance and expand current service options for customers. “Our colleagues and their skill sets are our competitive advantage—they remain an essential element to our success,” says Mathes. Demand for integrator services “We continue to experience a growing demand for innovative solutions across electronic security, fire alarm, and life safety,” says Mathes. “As companies innovate further and rely on technologies such as artificial intelligence, cybersecurity, IoT, and cloud solutions, we expect to see an increased demand for integrator services. Our customers demand a local service provider who is responsive and can meet their needs, which is why Convergint aims to be its customers’ best service provider.” This year, Convergint is celebrating its 20th anniversary. In 2021, they will continue to focus on the same critical components that have dominated since day one taking care of colleagues, customers, and the communities where they operate.
The nerve centre at Miami International Airport (MIA) is its Airport Operations Center (AOC), which operates around the clock, monitoring activity, responding to safety and security incidents, disseminating information and responding to requests from stakeholders throughout the airport. Incident logging at the AOC An essential daily task for the AOC team is incident logging, with approximately 70 detailed logs being created each day, and that number is set to rise, as a result of internal process changes within the department. Rupen Philloura is the Director of Terminal Operations & AOC at Miami International Airport and he explains, “The MLS logging system was a 25-year-old custom-built application. It was familiar for our operators to use, but it was unwieldy, unreliable, and inefficient. With logging being such a critical and growing aspect of our day-today operations, we needed to upgrade to a state-of-the-art unified platform.” Situator enterprise incident management system The platform chosen by the airport was the renowned enterprise incident management system, Situator, from Qognify The platform chosen by the airport was the renowned enterprise incident management system, Situator, from Qognify, a company whose solutions are trusted by airports around the world. Miami itself was already working with the company, using its NiceVision video management system (VMS) and analytics solutions across its highly distributed video surveillance system. Currently, the AOC has six Situator-powered stations from which operators monitor the airports Honeywell/EBI fire alarm and Matrix access control systems, as well as its extensive surveillance camera network. Dynamic form functionality Rupen Philloura describes the process, stating “When an alert is raised, the operator must follow a strict set of procedures for that specific event, this might simply be resetting an alarm remotely, or the dispatch of maintenance personnel. Incidents and subsequent actions need to be accurately documented for regulatory compliance purposes, but also to help us to learn and improve how we deal with incidents and events.” The need to manually enter all details has been replaced by the dynamic form functionality within Situator. It automatically populates and logs specific information relating to that incident, saving operators valuable time, and ensuring every log is of a consistently high standard. End-to-end accounts and improved logging Rupen Philloura further stated, “Together with the input of the operator, we are assured that the logs we generate and store are comprehensive end-to-end accounts, which can be quickly and reliably searched, retrieved and reviewed.” The improved logging has also had a noticeable impact on business continuity and operational efficiency, as well as providing an additional layer of protection to the airport from a regulatory standpoint. With the AOC operating a three-shift pattern, it is vitally important that change overs can be completed swiftly and nothing is overlooked. Rupen Philloura adds, “When the next shift logs on to Situator they have instant situational awareness, there is no lag in productivity. They can see what has happened and what requires their immediate attention. During their shift they no longer need to repeatedly log into multiple systems to access information. It is all there on the screen at their station.” Reduced response time to incidents The success of Situator within the AOC has led the airport to begin exploiting its strength as a powerful platform Situator has also reduced the response time to incidents, such as door alarms, as well as access requests from tenants and airport employees, by automating the interaction with the Matrix system. With the old MLS system, both use cases needed to be handled manually. The success of Situator within the AOC has led the airport to begin exploiting its strength as a powerful platform, with higher levels of task automation, ad-hoc forms and reporting, as well as integration with airport-specific and non-specific subsystems (made easier by the API driven Situator), such as its access control system and surveillance cameras. Support for facilities management It is also evaluating its ability to support the facilities management team in ensuring the statutory maintenance of its extensive network of elevators and moving walkways. Mike Bryant is Computer Services’ Sr. Manager at Miami-Dade Aviation Department and he has been impressed not only by the reliability that the web-based Situator is providing, (demonstrated by a drop in support calls from the AOC since the implementation), but also its future potential. Enhanced Airport safety and security Mike Bryant said, “With Situator, we have a platform that we can evolve to positively impact the operations, maintenance, compliance, safety and security throughout our airport. It has opened up possibilities to integrate systems, solve problems and make improvements, without needing to make further investments in standalone solutions.” Rupen Philloura concludes, “Every airport needs a robust, reliable and easy to use logging solution and for MIA it is one of the greatest strengths of Situator. It gives us complete situational awareness regarding when and how an event transpired, who responded, how, and the result. This insight improves our decision-making and feeds a continual cycle of improvement.”
When Care Protect wanted to upscale its operations in healthcare safety and monitoring services to a large private provider, it turned to Hikvision’s HikCentral video management software, in combination with offsite cloud video storage from Manything Pro. Care Protect is an innovative organisation. It was created to promote excellent, sustainable and consistent care delivery in health and social care settings. That innovation is reflected in the way the company integrates technology into the very heart of its care provision services. It uses the latest camera and audio technology, alongside the latest secure cloud-based video storage services, with a team of health and social care professionals reviewing and assessing around the clock. Social care environments Because of this diligence in monitoring, high levels of independent scrutiny can be guaranteed. The result is that through this transparency, reassurance is available for residents and their families, knowing that vulnerable adults and children are better safeguarded and protected. In all cases, system use is with the prior consent of residents and relatives or next of kin only. Care Protect was established to help address public concerns over incidents of poor care or malpractice Care Protect’s independent monitors are very well qualified, with years of relevant health and social care experience, together with all necessary Disclosure and Barring Service (DBS) checks and Security Industry Authority (SIA) licencing. Collectively they offer a high level of sector knowledge and expertise essential to assist and advise those with responsibility for safeguarding and quality and clinical governance. One of the key reasons that Care Protect was established to help address public concerns over incidents of poor care or malpractice in health and social care environments, some of which have seen wide media coverage. Private healthcare provider As a result, sound and motion detection alarms and infrared filming is utilised so immediate alerts can be raised if an incident is seen or heard or there is a connectivity or maintenance issue. Video recordings also include the use of privacy settings to block any agreed zones or areas of view as required. With video footage playing such a crucial role in Care Protect’s service, it is of pivotal importance that the system in place to manage the viewing of that video is stable, reliable and effective. One of Care Protect’s clients is a large private healthcare provider, for which Care Protect monitors bedrooms and communal areas of child and adult wards in hospitals nationwide throughout England. Care Protect also monitors elderly care homes for several different providers. Offsite video storage Care Protect also monitors elderly care homes for several different providers Care Protect’s IT & Systems Director, Andy Johnson, said Care Protect Directors have a background in the care industry, which has informed the monitoring system the company utilises. “We’ve developed a system based on the reviewing of recorded footage by social workers and nurses to advise, initially, on the quality of practice,” Johnson explains. “The contract with the large private healthcare company saw our operation change to caring for patients who pose a high risk to themselves for self-harm. Because of the importance of this monitoring in ensuring the patients’ wellbeing, it was critical that we were able to efficiently manage that video, both in terms of live monitoring and offsite video storage.” Cloud video storage The new focus required an upscaling of Care Protect’s operational office in Belfast (the company’s head office is in Yarm, Cleveland). A key element of this upscaling was the use of Hikvision’s HikCentral video management software, which needed to be able to deliver high quality images to a Samsung multi-screen video wall for real-time monitoring. Resident and patient rights to privacy remain at the core of Care Protect’s operations Video management via HikCentral at Belfast is critical, as is the offsite cloud video storage provided by Manything Pro, as Care Protect is careful to ensure there is no local recording of video onsite at the customer’s facilities so that it cannot be tampered with. Resident and patient rights to privacy remain at the core of Care Protect’s operations, and they ensure they comply with and exceed all relevant legislation and guidelines, including the Data Privacy Act and Surveillance Camera Code of Practice. Intelligent surveillance platform HikCentral is a comprehensive, intelligent surveillance platform. The newly improved HikCentral delivers data and intelligence via a pre-installed VMS on standard, off-the-shelf servers, and contains advanced functions including advanced live view and playback, thermal imaging, queue detection, low bandwidth adaptability, video linkage with access control, enhanced alarm management and smart wall operation – as in use at Care Protect. HikCentral manages the cameras, the smart wall monitors, and the video decoders that drive the images to the multiple screens in the Belfast hub. These screens cover 21 separate hospital sites for Care Protect’s private health provider customer. “One of the key features of HikCentral for us was the new smart wall functionality,” Johnson says, “Allowing us to manage multiple screens from the one place, rather than having software to run an application to then put it on the screens.” Network mini domes We use Smart Maps within HikCentral for interactive floor plans for the hospitals we monitor" Care Protect also makes good use of HikCentral’s Smart Maps function. “We use Smart Maps within HikCentral for interactive floor plans for the hospitals we monitor,” Johnson explains. “We have a selection of the communal cameras live on the maps, and our reviewers can click into the relevant area and get an overview without having to further interrogate those floor plans.” The appeal of this VMS, he says, was down to both the newly mature and advanced functions of the latest version of HikCentral, as well as its very competitive pricing compared to its rivals. Care Protect uses 500 HikCentral licences and a variety of Hikvision cameras are deployed across the customer’s facilities, predominantly unobtrusive 4MP and 6MP high resolution network mini domes. Hikvision Smart functionality on those cameras also proves extremely useful, Johnson says. Smart camera functions “The use of Hikvision Smart events on the cameras helps our reviewers to know how many people are in a room or a designated zone at a particular time,” he says. “These sorts of Smart features can greatly assist our reviewers, allowing us to be more efficient and effective in responding to the needs of patients.” Those in-built Smart camera functions are complemented by the use of audio analytics Those in-built Smart camera functions are complemented by the use of audio analytics. In some cases this audio software is used to trigger cameras so that potential incidents can be automatically viewed and assessed by a Care Protect reviewer. The results of utilising this technology, according to Johnson, have been highly successful. “We have been able to upscale our operation to 27 screens, to accommodate 21 hospital sites for our biggest customer, to great satisfaction from their end as it is safeguarding the vulnerable patients that they care for,” he says. Poor network conditions In addition to monitoring the live streams for certain hospitals, Care Protect’s independent monitors are tasked with reviewing all recorded video to ensure that the quality of care provided meets the required standards. For this they utilise the services of Hikvision cloud video technology partner, Manything Pro. Care Protect have almost 3,000 cameras recording video to the Manything Pro platform. All video is stored offsite in the secure Manything Pro cloud and can be accessed via the Manything Pro app and website. Manything Pro software runs on Hikvision cameras and is constantly monitoring the bandwidth conditions on each site. If necessary, the software will dynamically adjust the video bit rate to ensure recorded events are sent to the cloud even in poor network conditions. “We use Manything Pro for our cloud storage, so any recorded footage goes up to them, and we review through their website,” he says. “Some providers that we work with aren’t part of the live streaming through HikCentral in our Belfast monitoring centre. For these sites we also use the Manything Pro app and website to view the camera live streams.”
Genetec Inc, a technology provider of unified security, public safety, operations, and business intelligence solutions, announces that Seagate Technology Holdings plc, a provider of data storage and enterprise storage systems, has deployed Genetec™ Security Centre to secure their global campuses and regional offices. At the heart of this large-scale global deployment is the Genetec unified security platform which includes Security Center, Genetec Omnicast™ IP video management system (VMS) to manage more than 1,150 cameras, Genetec Synergis™ IP access control system (ACS) to manage more than 22,000 card holders, Sipelia to manage communications between intercoms and security operation, and Seagate’s own high-efficiency, high-performance Exos™ X 5U84 mass capacity storage system. Unified security platform All sites are connected using the Genetec Security Centre Federation feature to centralise monitoring, reporting, and alarm management across the entire organisation. The solution enables Seagate to pull in up to 1.3 petabytes of high-definition video in a single disk enclosure from hundreds of cameras and other IoT devices without losing a single frame or data packet. The solution enables Seagate to pull in up to 1.3 petabytes of high-definition video “Video, and especially multi-source, high-definition video, provides a stringent performance test for any storage solution,” said Ken Claffey, Senior Vice President and General Manager of enterprise storage systems at Seagate. “Likewise, the data availability expectation of a robust, unified security platform like Genetec™ Security Centre is formidable. The sheer volume of high-definition video streams, frames and metadata coupled with increasingly long retention periods, represent one of the most challenging IT infrastructures to deploy.” Physical security environment This enterprise scale deployment provides a clear blueprint for a state-of-the-art, unified, high performance physical security environment for modern, large scale facilities. “Enterprises with global campuses and data centre environments have mission critical requirements, and securing a growing number of assets across huge facilities, while staying ahead of emerging threats is increasingly challenging,” said Christian Morin, Vice President of Product Groups at Genetec Inc. “Through our partnership with Seagate, this enterprise scale deployment provides a great example of how enterprises can implement a holistic approach to security, that encompasses physical and cyber security, while ensuring compliance with fast-changing regulatory mandates.”
GNP (Grupo Nacional Provincial) is one of the largest insurance providers in Mexico. The company has several offices throughout the country and primarily provides insurance policies for life, medical, automobile, home, and business. The organisation was relying on analog CCTV technology that was unreliable and outdated. GNP wanted to modernise from its outdated system and deploy a new IP surveillance solution to improve security and take advantage of enhanced features. Network barriers Several network barriers needed to be addressed before the organisation could deploy the new IP security solution. A Coax infrastructure supported the existing CCTV system in each of the company’s locations. A Coax infrastructure supported the existing CCTV system in each of the company’s locations The customer had initially thought about ripping out the existing Coax-based infrastructure in each location and using fiber-optic cabling to extend connectivity beyond the 328ft (100m) reach limitation of standard Ethernet switches. However, this strategy would be extremely costly, disruptive, and time-consuming. GNP was also concerned with the potential business disruption and negative operational impacts as a result of the construction work needed to overhaul the network. The organisation required an innovative solution to achieve its digital transformation objectives. NVT Phybridge EoC Given the customer’s modernisation challenges, Logen, the reseller partner, recommended NVT Phybridge EoC (Ethernet over Coax) innovations. Logen had used NVT Phybridge products in the past for many other projects and was confident in the technology. GNP was excited about the potential solution and organized a proof-of-concept to test the technology in one of its locations. CLEER24 switch After a few simple setup steps, the NVT Phybridge CLEER24 switch transformed the customer’s existing and proven Coax-based infrastructure into a power-packed IP backbone. The CLEER24 switch delivers power and data over a single Coax cable up to 6,000ft (1,830m), which’s 18-times farther than a standard Power over Ethernet (PoE) switch. GNP was impressed with the results and decided to move forward with the project using the CLEER24 switch. The customer avoided traditional rip-and-replace strategy, leveraging the existing Coax infrastructure to achieve results Simple and quick installations GNP was delighted with the entire experience, using the CLEER24 switch to deploy more than 250 IP cameras across several locations. “Installing the CLEER24 switch was simple, quick, and did not require any special tools,” said Mario Gomez Alvarez. “The NVT Phybridge team provided excellent technical support and training materials.” The customer was able to avoid the traditional rip-and-replace strategy, leveraging the existing and proven Coax infrastructure to achieve incredible results. Simplify and accelerate the deployment by 40% Reduce total infrastructure costs by 50% Prevent service outages and operational disruption during the upgrade Eliminate IDF closet requirements Maintain a physically separate network for the new IP security devices Allocate infrastructure cost savings towards more IP devices and applications GNP took full advantage of the CLEER24’s feature set. The switches are stacked and configured for power redundancy. Unused ports are locked for enhanced security. All equipment is centralised in one location for better system control.
Calipsa, a provider of deep-learning-powered video analytics for false alarm reduction, announced that Edmonton, Alberta-based GPS Security Group is using its false alarm filtering platform. GPS, which offers a complete range of security services across Alberta, British Columbia and other parts of Western Canada, is the third Canadian central monitoring station to adopt the cloud-based Calipsa technology. Deep learning technology Calipsa’s software uses artificial intelligence with deep learning technology to recognise genuine alarms caused by human or vehicle movement. More than 90% of notifications resulting from nuisance factors such as animals, lighting, weather or foliage are filtered out, helping operators reduce their response times to genuine threats. We’ve engaged Calipsa as a strategic growth partner to assist with reducing false video alarms" The GPS Security Group’s Fredy Ramsoondar, Corporate Senior Security Solutions Advisor and Private Investigator, said GPS is adopting Calipsa’s AI-powered video analytics across its video surveillance sites to support the sustained growth of its monitoring division. “We’ve engaged Calipsa as a strategic growth partner to assist with reducing false video alarms, allowing our operators to focus on only genuine alarms,” he said. “We anticipate widespread benefits, including improved customer service, operational efficiency and employee morale.” Cloud-based technology Tara Biglari, Calipsa’s Regional Sales Director, Americas, said its false alarm reduction software is easily scalable, making it ideal for any growing video monitoring station. “This is an exciting time of growth for the GPS team and we’re happy to partner with them to provide the highest level of customer service,” she said. “The installation of our cloud-based technology requires no onsite hardware devices and we keep our service always current with remote upgrades.” A platform dashboard enables station managers to monitor the software’s performance, including detecting idle cameras that may need replacement or moving to a better position.
Corero Network Security plc, a provider of real-time, automatic Distributed Denial of Service (DDoS) cyber defense solutions, and Juniper Networks, a pioneer in secure, AI-driven networks, team up to provide Plusnet, an organisation offering communications and network services to 25,000 businesses in Germany, with their joint DDoS Protection Solution to protect its infrastructure, business, and customers within seconds of a DDoS attack. DDoS protection solution Over the past 20+ years, DDoS attacks have always been a part of the threat landscape, but their frequency, magnitude, and sophistication are constantly increasing. Plusnet, which serves 200 cities and regions of Germany, previously relied on an internal data filtering solution to analyse anomalies in traffic patterns. Plusnet needed DDoS mitigation with effective, and dynamic protection to defend its network from attack-driven outages However, this in-house solution required manual intervention, which was neither practical nor effective as attacks mounted and evolved. Plusnet needed to automate DDoS mitigation with effective, dynamic, and scalable protection to defend its national network from attack-driven outages. Impact on network performance “During the testing phase of the Juniper-Corero solution, we could immediately see a manageable stream of DDoS attacks. With the Juniper-Corero solution, Plusnet can further improve network protection without any significant impact on network performance,” said Ralf Weber, Head of Competence Center Network & Security, Plusnet. Solution highlights: The joint solution removes malicious traffic at the network edge, as close to the source as possible, delivering fast and effective protection cost-effectively. Plusnet took an active approach to thwart DDoS attacks with Juniper Networks and Corero Joint DDoS Protection, delivering real-time detection and line-rate mitigation of DDoS attacks, which can identify and block very significant attacks in seconds. Juniper Networks MX Series Universal Routing Platformswork together with Corero SmartWall Threat Defense Director to rapidly identify, precisely detect and automate mitigation of attacks. Analytics and continuous monitoring provide comprehensive visibility of data patterns and anomalies for network security professionals. As DDoS attacks continue to increase, the protection capacity provided by this solution can be expanded to tens of terabits per second. 24/7 protection from threats “More than ever before, providers need to ensure that their infrastructure and business operations are always available to deliver an exceptional user experience. This can only be achieved when security is built into the same network infrastructure that provides connectivity and extended across every point of connection.” Plusnet is a great example that leverages Juniper Connected Security to enable the threat-aware network " “Plusnet is a great example that leverages Juniper Connected Security to enable the threat-aware network, ensuring its operations are comprehensively protected 24/7 against the growing risk of DDoS attacks,” said Samantha Madrid, Vice President, Security Business & Strategy, Juniper Networks. SmartWall TDD solution “We are very pleased to continue partnering with Juniper Networks to provide a superior DDoS solution that is now protecting thousands of customers around the globe.” “The SmartWall TDD solution couples Corero’s surgically accurate, real-time automatic DDoS protection with the high-performance packet filtering of Juniper MX Series routers." "This, along with the comprehensive visibility into attacks, enabled Plusnet to implement a cutting-edge solution that can detect and mitigate DDoS attacks in seconds to protect its network and the ones of its customers,” said Lionel Chmilewsky, Chief Executive Officer at Corero Network Security.
Round table discussion
Perimeter security is the first line of defence against intruders entering a business or premises. Traditionally associated with low-tech options such as fencing, the field of perimeter security has expanded in recent years and now encompasses a range of high-tech options. We asked this week’s Expert Panel Roundtable: What are the latest trends in perimeter security technology?
We are several weeks into 2021, and it is already shaping up to be an eventful year. The happenings and trends from 2020 will likely carry over into the new year, but in a fast-moving industry such as ours, there will also be additional trends to watch. Looking toward the year ahead, we asked this week’s Expert Panel Roundtable: What will be the biggest security trends in 2021?
Ensuring privacy is often a concern for video surveillance systems, especially in situations where a system intended for “public” surveillance could somehow, perhaps inadvertently, view private areas or situations. The classic example is an apartment building whose windows are within the range of a video surveillance camera. How can you provide video surveillance without invading the privacy of the apartment dwellers? Integrators and end users often turn to technology for a solution. We asked this week’s Expert Panel Round Table: How can smart camera features (such as privacy masking and programmable pan-tilt-zoom) address concerns about privacy?