Acronis, the globally renowned company in cyber protection, has released its annual Cyber Readiness Report, providing a comprehensive overview of the modern cyber security landscape and the key pain points faced by businesses and remote employees worldwide, amid the global COVID-19 pandemic. Acronis’ Cyber Readiness Report Acronis’ Cyber Readiness Report revealed that more than 80% of global companies admitted they were not prepared to transition to remote work, exposing key vulner...
Boosting efficiency through digitalisation, almost no branch of industry can evade it. Also operators of press shops are increasingly networking their production. But, regardless of whether it’s a single press or press lines, it’s not always necessary to replace the entire plant, in order to stay up to date. Retrofitting existing lines, true to the principle of ‘sensible evolution instead of cost-intensive revolution’, is often the order of the day. With Visual Die Prote...
Technology-led employee safety specialists, Peoplesafe, have launched a new mass notification tool designed for instant communication with employees in a crisis. Peoplesafe Alert is a simple, intuitive app that allows organisations to send and track mass safety messages to thousands of employees simultaneously, overriding phones set to silent or do not disturb and, if necessary, using geofencing capabilities to only communicate with those in a certain location. Real-time operability Designed...
Four out of every ten (41%) of England-based medium and large-sized businesses, which are running CCTV systems, have already deployed facial recognition analytics in their systems, in order to capture human faces and compare images to human face databases, with a view to identifying matches for access control, event security or for public safety purposes. Facial recognition analytics One in six (16%) of CCTV system owners admitted to having access to this capability on their system, but not ye...
Allegion, a global provider of security products and solutions, has announced the first integration between Overtur, Allegion’s digital environment connecting all building phases in opening design, construction and ongoing management, and Software for Hardware, an industry-renowned software developed for door, frame and hardware distributors. Software integration The partnership announcement comes in advance of the DHI conNextions 2021 conference, where both companies will be demonstrati...
Moxa Inc., a globally renowned company in industrial communications and networking, with a focus on securing industrial networks, has introduced the new EDR-G9010 Series. These industry-certified, all-in-one firewall/NAT/VPN/switch/routers, act as a robust first line of defence for industrial networks, in diverse applications, such as smart manufacturing and critical infrastructure. EDR-G9010 Series industrial secure routers Moxa’s EDR-G9010 Series industrial secure routers offer 10-por...
Two members of the Hardstaff Barriers team have been shortlisted for national apprenticeship awards due to their commitment and achievements at work. Rhiannon McGhee, Apprentice Health, Safety, and Environment Technician, has been nominated for ‘Apprentice of the Year’ and Kathryn Cooper, Service Manager, has been nominated for ‘Apprentice Champion of the Year’ in the National Apprenticeship Awards 2021 for the East Midlands region. About Hardstaff Barriers Hardstaff Barriers, based in Kingston-on-Soar, Nottinghamshire, is a manufacturer and supplier of roadside safety barriers and perimeter security systems. The company’s vehicle restraint systems (VRS), hostile vehicle mitigation (HVM) barriers, perimeter fencing, concrete security barriers, and access gates are all designed to keep people and property safe. The pair will find out if they have been successful at a regional ceremony on October 20. Recognising apprentices National Apprenticeship Awards have been designed to recognise and reward the achievements of apprentices Regional winners will automatically be shortlisted for a national award and will undergo a second-tier national judging process where the national finalists will be selected. National finalists will be announced on Friday, November 12. The National Apprenticeship Awards, in their 18th year, have been designed to recognise and reward the achievements of exceptional apprentices, apprenticeship champions, and apprenticeship employers. Feedback Rhiannon, who started working for Hardstaff in 2019, said, “Starting any career can feel like a big step. I am lucky that I found the right path for me.” “By becoming an apprentice, I could learn and grow on the job around experts, learning skills beyond my apprenticeship and setting me up for a career ahead of me.” Kathryn Cooper, a successful Service Manager, who has worked for Hardstaff Barriers since 2017, said, “Making your people the best versions of themselves is key. Help the people grow and the business not only survives but thrives.”
Abloy Oy announced ABLOY CUMULUS, a platform for keyless access, combining quality hardware products with secure access and management applications. It brings all the solutions together into a single ecosystem with a risk-free, integrated cloud service. “CUMULUS is our next step in the ‘keyvolution’ — the development in which mechanical keys are transforming into digital ones. We have wrapped our more than one hundred years of security expertise into digital solutions for connected access management,” said Jussi Ahvalo, Vice President, International Sales, Abloy Oy. The world is becoming keyless, access rights are going digital, and customers want everything to be integrative. Many property owners and managers are planning to switch to access management that is seamlessly location-independent while securing all their keyless access points. The key to keyless access CUMULUS ensures secure access in commercial real estate, public spaces, housing, and sites essential for the functioning of society. It offers interfaces for third-party applications and software development. CUMULUS range of keyless, online access solutions can be administered with any software tool that best suits the needs The CUMULUS range of keyless, online access solutions from mobile keys and padlocks to upcoming electric locks and controllers can thus be administered with any software tool that best suits the customers’ needs. By selecting ABLOY OS INCEDO, the organisation can also manage other ABLOY solutions with the same tool, such as electromechanical PROTEC2 CLIQ™ and mechanical keys. “CUMULUS minimises management risks and provides a secure, tailored, always online and evolving access platform for our customer organisations. It is a cloud service for modern security management. With CUMULUS we provide continuously up-to-date, data-secure access management products and software,” said Jussi Ahvalo. CUMULUS padlock and software first to market CUMULUS is targeted at commercial and professional end-users (PEU). In the first phase, its primary vertical markets are parcel deliveries, finance (cash-in-transit), and construction. Geographically, CUMULUS will first be aimed at select markets in Europe and Southeast Asia. More markets will be added gradually. The first CUMULUS-branded products that will be available for customers later this year include a padlock, a mobile application, a cloud-based software engine (backend), and application programming interfaces (APIs). The APIs allow integrations to third-party applications such as booking, reporting, resource management, and access control systems. New products will continuously be added to the CUMULUS range.
SharpEagle recently featured in the top 10 list of regional and global brands that manufacture the best explosion-proof cameras, according to the consumption status for the period 2021-2026. SharpEagle is one of the ten brands featured in the list. While conducting the research, the team has analysed the market thoroughly. Some major things that they considered include the market share, size, growth, dynamics, and prospects. They also analysed the in-depth historical data of the explosion-proof market and compared all the competing industries, in order to choose the winners. SharpEagle in top 10 explosion-proof camera brands list SharpEagle promises to continue serving with an equal amount of hard work and determination, in the future as well" SharpEagle is honoured to have received this feature from SoccerNurds. The Managing Director of the company recently expressed his gratitude, by stating “We are glad that SoccerNurds found us to be one of the most trusting brands for developing explosion-proof cameras. SharpEagle promises to continue serving with an equal amount of hard work and determination, in the future as well.” Product features, requirements, demand, market, and other specifics were kept in mind, while creating the global market report for explosion-proof cameras. The survey data was also shared with other people belonging to different places and ages. Selection based on various factors The top 10 brands were selected impartially, based on all the factors mentioned above, plus other vital details, such as: Product launches Customer satisfaction Collaborations, alliances, and agreements Growth in the past years Advantages and disadvantages Prospects Global report featuring data related to enterprises The global report contains all data related to the enterprises, regional share, service providers and market growth of the brands. The report has four main sectors, namely, product category, infrastructure, regional market and end-user. The explosion-proof camera industry is spread in major global regions, such as China, Europe, the US, Dubai, Japan, etc. Therefore, the development and the sales of the products are also kept in mind. Other unique details highlighted in the report are growing competition, the pressure from competitors, threats caused by new global brands, bargaining power of the suppliers and the customers, etc.
The Security Industry Association (SIA) has named Bonnie Michelman as the 2021 recipient of the SIA Insightful Practitioner Award, an honour recognising excellence in promoting the implementation of innovative security solutions. Bonnie Michelman is the Executive Director of Police, Security and Outside Services at Massachusetts General Hospital (Mass General) and for Mass General Brigham Corporation. SIA will present her with the award on Wednesday, Nov. 17, during the 2021 SIA Honors cocktail reception. Corporate security leadership veteran She has 30+ years of corporate security leadership experience, and along with her roles with Mass General and Mass General Brigham Corporation, she also serves as President of the Board of International Association for Healthcare Security & Safety (IAHSS) Foundation. Bonnie Michelman has previously served as President of the International Security Management Association, ASIS International and IAHSS. She is on the Regional Board of Directors for the Anti-Defamation League and also serves on the Advisory Council for Hostage US. Under Michelman’s direction, Mass General won the Lindberg Bell Award for the nation’s finest health care security programme, in 1999, 2007 and 2018. Advocate for increasing diversity in the security industry She has also been an advocate for increasing diversity within the security industry She was appointed in 2010, by Secretary of Homeland Security, Janet Napolitano to the Homeland Security Advisory Council, holding that position until 2015, and chaired the U.S. Department of Homeland Security’s faith-based Security Advisory Committee. She has also been an advocate for increasing diversity within the security industry. Bonnie Michelman holds an MBA from Bentley College, an M.S. in Criminal Justice from Northeastern University and a B.A. in Government and Sociology from Clark University, as well as the Certified Protection Professional and Certified Healthcare Protection Administrator certifications. SIA’s 2021 Insightful Practitioner Award recipient “I was totally humbled and honoured in learning that I was the recipient of the 2021 Insightful Practitioner Award,” said Bonnie Michelman, adding “The greatest compliment one can experience is to be recognised by colleagues and one of the best industry associations that exists.” She adds, “I am so grateful to SIA, for not only this honour, but for all the work that SIA does and has done for a long time, to professionalise and advance the security industry and profession. SIA helps chart the course for this amazing industry.” Health Care Security Interest Group Bonnie Michelman is a prominent security thought leader and has spoken at a variety of industry conferences and events, including SIA’s Securing New Ground virtual conference and the 2021 Vertical Insights Health Care Security Symposium (Vertical Insights Symposium: Health Care Security). She helped the Security Industry Association in launching its Health Care Security Interest Group and has supported several of its projects, including a white paper on mitigating the risk of workplace violence in health care settings. “SIA is proud to announce Bonnie Michelman as the 2021 recipient of the SIA Insightful Practitioner Award,” said Security Industry Association (SIA) Chief Executive Officer (CEO) Don Erickson. Health care security expert We commend Bonnie for her outstanding accomplishments and contributions to the industry" He adds, “Bonnie is an industry luminary, whose leadership has grown Mass General’s security department into one of the top programmes in the country, and she has been a dedicated and influential volunteer with SIA, lending her expertise on health care security issues. We commend Bonnie for her outstanding accomplishments and contributions to the industry, and look forward to presenting her with this special award, at SIA Honors 2021.” SIA’s Insightful Practitioner Award is presented annually to a security practitioner, who demonstrates leadership and excellence, in promoting the implementation of innovative security solutions, through education, advocacy and teamwork with the security industry, and other stakeholders. SIA Honors 2021 Each year, SIA Honors, held concurrently with ISC East, the Northeast’s largest security trade show, hosted in collaboration with premier sponsor, Security Industry Association (SIA), features a gala cocktail reception and an award ceremony that recognises industry leaders. At SIA Honors 2021, in addition to presenting the Insightful Practitioner Award, the Security Industry Association will also honour industry leaders, with the George R. Lippert Memorial Award and the SIA Progress Award, sponsored by SIA’s Women in Security Forum. SIA Honors 2021 will be held on November 17, at Glasshouse Chelsea, in New York City, USA.
Eagle Eye Networks, the globally renowned company in cloud video surveillance solutions, has announced a new Vehicle Surveillance Package for the Eagle Eye Cloud VMS. Vehicle Surveillance Package (VSP) The Vehicle Surveillance Package (VSP) captures licence plate and vehicle information, received from distributed cameras and sends it to the Cloud, where it’s analysed, compared, alerted upon, and searched, to deliver business intelligence that improves efficiency, effectiveness, and safety. The solution includes Eagle Eye Time Watch, the industry’s first time-bound watchlist management tool, for loss prevention and operational efficiency. VSP detects and captures licence plate, and other vehicle information, triggering real-time alerts, making decisions to grant or deny access, and making other operational judgments. True cloud platform Users can search for vehicles across multiple sites and quickly review, using the video playback function. Eagle Eye Networks’ true cloud platform provides unlimited recording, unlimited camera support, global access and reliability. Vehicle detection, identification and tracking is important for businesses that manage fleets, track vehicles" “Vehicle detection, identification and tracking is important for businesses that manage fleets, track vehicles, or generate revenue from parking, to prevent loss and improve the customer experience,” said Dean Drako, the Founder and Chief Executive Officer (CEO) of Eagle Eye Networks. Dean Darko adds, “With Eagle Eye VSP, large- and small-scale businesses can take advantage of the Eagle Eye Cloud, to generate more revenue, improve traffic flow and efficiency, reduce loss, and make businesses and communities safer.” Eagle Eye Time Watch Eagle Eye Time Watch enables a business to timestamp a vehicle’s departure and return time, and alerts management or supervisors if a vehicle is outside a pre-determined time frame. This feature increases employee efficiency and protects against theft, resulting in a rapid return on investment. Customers across multiple industries use the Vehicle Surveillance Package (VSP) to: Reduce loss and increase profits, Improve fleet tracking/management, Improve garage/parking lot management Improve efficiency and safety for businesses with drive-in/drive-through and other access control and notification needs Improve traffic flow The new solution initially enables multi-site management and search of licence plate data for U.S. and Canadian plate libraries, with other regions to come.
Pyronix is pleased to announce the release of two Enforcer tablet kits; providing the easiest and most convenient way of purchasing the Enforcer V11 control panel with the brand-new 10-inch touchscreen control station, the AndroidTablet and HomeControlHUB app. Enforcer Tablet Kit 1 (Partcode: ENF-TAB/KIT1-UK) contains: 1 x Enforcer V11 all-in-one two-way wireless control panel with Wi-Fi built onboard the main PCB 1 x AndroidTablet (compatible with HomeControlHUB app) 2x KX10DP-WE - wireless KX pet immune PIR detector 10m range 1x MC1MINI-WE - two-way wireless mini magnetic contact 1x DELTA/MOD-WE - wireless Deltabell module Enforcer Tablet Kit 2 (Partcode: ENF-TAB/KIT2-UK) contains: 1 x Enforcer V11 all-in-one two-way wireless control panel with Wi-Fi built onboard the main PCB 1 x AndroidTablet (compatible with HomeControlHUB app) 2x KX10DP-WE - wireless KX pet immune PIR detector 10m range 1x MC1MINI-WE - two-way wireless mini magnetic contact Providing enhanced installation The Enforcer V11 is the most advanced Pyronix system released to date and delivers real added value “We’re very excited to release these two kits to the market, as they provide installers with convenient accessibility to the tablet interface and all the many benefits the system provides,” Pyronix Marketing Director, Laurence Kenny, said. The Enforcer V11 is the most advanced Pyronix system released to date and delivers real added value with every installation; security, automation and video that can be tailored, controlled and scheduled for any user preference. Featuring Wi-Fi communications built onboard the main PCB, the Enforcer V11 provides enhanced installation, selectable supervision per zone, occupancy timers on zones and much more, along with compatibility with the AndroidTablet, HomeControlHUB app and SmartPlug. Free support services The AndroidTablet with HomeControlHUB not only becomes the new local programming option for the installer for the initial install and maintenance visits, but also the touchscreen security hub where the user can control their system, their Pyronix or Hikvision cameras and also the new SmartPlug to control plug-in appliances around the home. The interface also doubles as a conventional tablet for the user to use day-to-day to surf the internet The interface also doubles as a conventional tablet for the user to use day-to-day to surf the internet, watch videos and play games, or open the HomeControlHUB app to access their security, automation and video. Installers can find out all about this brand-new solution and all advantages it provides to both them and their customers, along with the extensive free support services Pyronix offers by registering to attend an Enforcer on the tour date, where they can also claim a free £20 All4One voucher. Changing user requirements “With the security market constantly having to adapt and evolve to changing user requirements, the innovations of the Enforcer V11 in combination with the AndroidTablet and HomeControlHUB interface make this the most flexible and proactive solution we’ve ever released,” Laurence said. He continued: “The tablet kits enable our installers to easily offer a complete one-platform solution that protects not only the property but also its occupants, the perimeter, vans, caravans, elderly relatives and more, while also providing access to automation around the home and camera streams for video surveillance and direct action.”
The past year has elevated consumer awareness about personal safety, from COVID-19 issues to social unrest, making safety top-of-mind and the need for personal safety solutions, even more prevalent. In addition, consumers spent more time at home, as schools closed, events were canceled and remote work increased. This prompted two major shifts that, in my opinion, most significantly opened the need for and raised the popularity of mobile safety solutions. Demand for grocery and food delivery apps surged Rise in use of app-based delivery services During the past 18 months, the use of app-based delivery services has skyrocketed During the past 18 months, the use of app-based delivery services has skyrocketed. With more use comes more interactions among strangers in homes and businesses, and while the majority of these moments are completely safe and convenient, incidents are happening, ranging from uncomfortable situations to physical assaults. And, with more delivery drivers on the road, there are going to be more accidents among gig-economy workers. Based on recent estimates, food and grocery delivery are expected to remain popular, even as we get back to normal life. High popularity of mobile security apps and wearables With more work shifting from stationary locations to working on-the-go, mobile security apps or wearables can be a lifeline in all sorts of situations. It’s important for these mobile safety products to be comprehensive, dynamic and designed to address the full range of people’s safety and security needs, from providing simple human reassurance to dispatching emergency help. Domestic violence cases increased According to the National Domestic Violence Hotline, due to COVID-19 lockdown restrictions, domestic violence rose as a result of many victims being stuck at home with their abusers, while sheltering in place and working from home. Mobile safety apps, such as ADT’s SoSecure U.S. Attorneys General and other state-elected officials have endorsed mobile safety apps, like SoSecure by ADT These situations necessitate the need for discreet ways for victims to call for help. U.S. Attorneys General and other state-elected officials have endorsed mobile safety apps, like SoSecure by ADT, as a tool to help victims of domestic abuse, safely call for help, without alerting their abuser. Over the past year, the mobile safety app market has seen tremendous innovation, including more user-friendly ways to make SOS calls. Today, within a single app, a person can summon help hands-free, by saying a secret phrase, by text or by swiping a button. Extension of mobile safety into wearable devices And, users can connect with people trained to help in unsettling situations over video, which can be an effective deterrent and provide video evidence. We’ve also seen the extension of mobile safety into wearable devices, in order to make these devices more discreet and usable. There will always be some safety risks in our lives. However, the good news is there’s no need to live in a constant state of fear. The easiest, most direct way to be prepared and ready to ‘fight back’ is by having a personal safety tool in your pocket, a mobile safety app that is there, when you need it most.
Intrusion alarm systems are currently facing a growing number of potential error sources in the environment. At the same time, alarm systems must comply with increasingly demanding legal requirements for sensors and motion detectors. As a future-proof solution, detectors equipped with Sensor Data Fusion technology raise the level of security while reducing the risk of cost- and time-intensive false alarms. This article provides a comprehensive overview of Sensor Data Fusion technology. Anti-masking alarms A cultural heritage museum in the South of Germany for decades, the installed intrusion alarm system has provided reliable protection on the premises. But suddenly, the detectors trigger false alarms every night after the museum closes. The system integrators are puzzled and conduct extensive tests of the entire system. When they finally identify the culprit, it’s unexpected: As it turns out, the recently installed LED lighting system in the museum’s exhibition spaces radiates at a wavelength that triggers anti-masking alarms in the detectors. Not an easy fix situation, since a new lighting system would prove far too costly. Ultimately, the integrators need to perform extensive detector firmware updates and switch to different sensor architecture to eliminate the error source. This scenario is by no means an isolated incident, but part of a growing trend. Need for reliable detector technology Legal requirements for anti-masking technology are becoming stringent in response to tactics by criminals The number of potential triggers for erroneous alarms in the environment is on the rise. From the perspective of system operators and integrators, it’s a concerning development because every false alarm lowers the credibility of an intrusion alarm system. Not to mention steep costs: Every false call to the authorities comes with a price +$200 tag. Aside from error sources in the environment, legal requirements for anti-masking technology are becoming more stringent in response to ever more resourceful tactics employed by criminals to sidestep detectors. What’s more, today’s detectors need to be fortified against service outages and provide reliable, around-the-clock operability to catch intruders in a timely and reliable fashion. Sensor Data Fusion Technology In light of these demands, one particular approach has emerged as a future-proof solution over the past few years: Sensor Data Fusion technology, the combination of several types of sensors within one detector – designed to cross-check and verify alarm sources via intelligent algorithms – holds the keys to minimising false alarms and responding appropriately to actual alarm events. This generation of detectors combines passive infrared (PIR) and microwave Doppler radar capabilities with artificial intelligence (AI) to eliminate false alarm sources without sacrificing catch performance. Motion detectors equipped with Sensor Data Fusion technology present a fail-proof solution for building security “It’s not about packing as many sensors as possible into a detector. But it’s about including the most relevant sensors with checks and balances through an intelligent algorithm that verifies the data for a highly reliable level of security. The result is the highest-possible catch performance at the minimum risk for erroneous alarms,” said Michael Reimer, Senior Product Manager at Bosch Security Systems. Motion detectors with sensor data fusion Looking ahead into the future, motion detectors equipped with Sensor Data Fusion technology not only present a fail-proof solution for building security. The comprehensive data collected by these sensors also unlock value beyond security: Constant real-time information on temperature and humidity can be used by intelligent systems and devices in building automation. Integrated into building management systems, the sensors provide efficiency improvements and lowering energy costs Integrated into building management systems, the sensors provide the foundation for efficiency improvements and lowering energy costs in HVAC systems. Companies such as Bosch support these network synergies by constantly developing and optimising intelligent sensors. On that note, installers must be familiar with the latest generation of sensor technology to upgrade their systems accordingly, starting with a comprehensive overview of error sources in the environment. Prominent false alarm triggers in intrusion alarm systems The following factors emerge as frequent triggers of false alarms in conventional detectors: Strong temperature fluctuations can be interpreted by sensors as indicators of a person inside the building. Triggers range from floor heating sources to strong sunlight. In this context, room temperatures above 86°F (30°C) have proven particularly problematic. Dust contamination of optical detectors lowers the detection performance while raising susceptibility to false alarms. Draft air from air conditioning systems or open windows can trigger motion sensors, especially when curtains, plants, or signage attached to the ceilings (e.g. in grocery stores) are put in motion. Strong light exposure directly on the sensor surface, e.g. caused by headlights from passing vehicles, floodlights, reflected or direct sunlight – all of which sensors may interpret as a flashlight from an intruder. Extensive bandwidth frequencies in Wi-Fi routers can potentially confuse sensors. Only a few years ago, wireless routers operated on a bandwidth of around 2.7GHz while today’s devices often exceed 5GHz, thereby catching older detectors off guard. LED lights radiating at frequencies beyond the spectrum of visible light may trigger sensors with their infrared signals. Regarding the last two points, it’s important to note that legislation provides clear guidelines for the maximum frequency spectrum maintained by Wi-Fi routers and LED lighting. Long-term security But the influx of cheap and illegal products in both product groups – products that do not meet the guidelines – continues to pose problems when installed near conventional detectors. For this reason, Sensor Data Fusion technology provides a reliable solution by verifying alarms with data from several types of sensors within a single detector. Beyond providing immunity from false alarm triggers, the new generation of sensors also needs to comply with the current legislature. These guidelines include the latest EN50131-grade 3, and German VdS class C standards with clear requirements regarding anti-masking technology for detecting sabotage attempts. This is exactly where Sensor Data Fusion technology provides long-term security. Evolution of intrusion detector technology Initially, motion detectors designed for intrusion alarm systems were merely equipped with a single type of sensor; namely passive infrared technology (PIR). Upon their introduction, these sensors raised the overall level of building security tremendously in automated security systems. But over time, these sensors proved limited in their catch performance. As a result, manufacturers began implementing microwave Doppler radar capabilities to cover additional sources of intrusion alarms. First step detection technology In Bosch sensors, engineers added First Step detection to trigger instant alarms upon persons entering a room Over the next few years, sensors were also equipped with sensors detecting visible light to catch flashlights used by burglars, as well as temperature sensors. In Bosch sensors, engineers added proprietary technologies such as First Step detection to trigger instant alarms upon persons entering a room. But experience in the field soon proved, especially due to error sources such as rats and other animals, that comprehensive intrusion detection demands a synergetic approach: A combination of sensors aligned to cross-check one another for a proactive response to incoming signals. At the same time, the aforementioned bandwidth expansion in Wi-Fi routers and LED lighting systems required detectors to implement the latest circuit technology to avoid serving as ‘antennas’ for undesired signals. Sensor data fusion approach At its very core, Sensor Data Fusion technology relies on the centralised collection of all data captured by the variety of different sensors included in a single detector. These data streams are directed to a microprocessor capable of analysing the signals in real-time via a complex algorithm. This algorithm is the key to Sensor Data Fusion. It enables the detector to balance active sensors and adjust sensitivities as needed, to make truly intelligent decisions regarding whether or not the data indicates a valid alarm condition – and if so, trigger an alarm. Advanced verification mechanisms The current generation of Sensor Data Fusion detectors, for instance from Bosch, feature advanced verification mechanisms, including Microwave Noise Adaptive Processing to easily differentiate humans from false alarm sources (e.g. ceiling fans or hanging signs). For increased reliability, signals from PIR and microwave Doppler radar are compared to determine whether an actual alarm event is taking place. Additionally, the optical chamber is sealed to prevent drafts and insects from affecting the detector, while the detector is programmed for pet and small animal immunity. Sensor cross-verification Further types of sensors embedded in current and future generations of Sensor Data Fusion detectors include MEM-sensors as well as vibration sensors and accelerometers. Ultimately, it’s important to keep in mind that the cross-verification between sensors serves to increase false alarm immunity without sacrificing the catch performance of actual intruders. It merely serves to cover various indicators of intrusion. Protecting UNESCO World Cultural Heritage in China Intelligent detectors equipped with Sensor Data Fusion are protecting historic cultural artifacts in China from theft and damage. At the UNESCO-protected Terracotta Warriors Museum site, one hundred TriTech motion detectors from Bosch with PIR and microwave Doppler radar technology safeguard the invaluable treasures against intruders. To provide comprehensive protection amid the specific demands of the museum site, the detectors have been installed on walls and ceilings to safeguard the 16,300-square-meter museum site. To ensure an optimal visitor experience without interference from glass walls and other barriers, many detectors are mounted at a height of 4.5 meters (15 feet) above ground under the ceiling. Despite their height, the detectors provide accurate data around the clock while exceeding the performance limits of conventional motion detectors, which clock out at a mere 2 meters (6 feet) catchment area. Integrated video systems The site also presents additional error sources such as large amounts of dust that can contaminate the sensors, as well as visitors accidentally dropping their cameras or mobile phones next to museum exhibits. To distinguish these events from actual criminal activity, the intrusion alarm system is integrated with the museum’s video security system. This allows for verifying alarm triggers with real-time video footage at a fast pace: In the case of an actual alarm event, the system alerts the on-site security personnel in the control room in less than two seconds. Added value beyond security Sensor Data Fusion technology provides a viable solution for the rising number of error sources in the environment As of today, Sensor Data Fusion technology already provides a viable solution for the rising number of error sources in the environment while providing legally compliant building security against intruders. In light of future developments, operators can leverage significant added value from upgrading existing systems – possibly without fundamentally replacing current system architecture – to the new detector standard. Added value how? On one hand, the detectors can integrate with access control, video security, voice alarm, and analytics for a heightened level of security. These synergetic effects are especially pronounced on end-to-end platforms like the Bosch Building Management system. On the other hand, the data streams from intelligent detectors also supply actionable intelligence to building automation systems, for instance as the basis for efficiency improvements and lowering energy consumption in HVAC systems. New backward-compatible detectors Bosch will release a new series of commercial detectors by end of 2021, based on the latest research on risk factors for false alarm sources in the environment and line with current legislation and safety standards. Throughout these developments, installers can rest assured that all new detectors are fully backward compatible and work with existing networking/architecture. With that said, Sensor Data Fusion technology emerges as the key to more secure intrusion alarm systems today and in the future. TriTech detectors from Bosch For reliable, fail-proof alarms the current series of TriTech detectors from Bosch relies on a combination of different sensor data streams, evaluated by an integrated algorithm. These Sensor Data Fusion detectors from Bosch combine up to five different sensors in a single unit, including: Long-range passive infrared (PIR) sensor Short-range PIR sensor Microwave sensor White light sensor Temperature sensor Equipped with these sensors, TriTech detectors are capable of detecting the most frequent sources of false alarms; from headlights on passing cars to a mouse passing across the room at a 4.5-meter distance to the detector. What’s more, TriTech detectors provide reliable performance at room temperatures above 86°F (30°C) while fully guarding against actual intrusion and sabotage attempts from criminals.
Today, we live in a technology-obsessed age. Whichever way you look, it’s hard to avoid the increasing number applications, products and solutions that continue to redefine the boundaries of what we previously thought possible. From autonomous vehicles and edge computing to 5G and the Internet of Things, all facets of our lives are continuing to evolve, thanks to an endless stream of differentiated innovations. In this article, we’ll be focusing on the latter of these - the Internet of Things (IoT). Deployment of IoT technologies Smart homes, smart utilities, smart retail, smart farming, smart supply chains and many of the other ‘smart’ versions of sectors that we’re already familiar with, are all called as such because of the implications of IoT. Indeed, it is a technology that has manifested itself in billions of devices, which today underpin the truly transformational levels of connectivity that we see across industries of all shapes and sizes. The statistics speak for themselves. According to Statista, over US$ 1 trillion is expected to be spent on IoT technology worldwide, in 2022. Be it added convenience, efficiency, productivity or intelligence, many benefits are poised to emerge from this spike in IoT-related activities. Yet to say this digital transition is going to be entirely positive would be naïve. Threats faced by smart cities It is said that by 2040, 65 per cent of the world’s population will be living in cities Let’s consider smart cities. It is said that by 2040, 65 per cent of the world’s population will be living in cities. To accommodate such an influx, without facing significant logistical issues, with limited space and infrastructure, policy makers have begun to recognise that these urban environments need to become not only larger, but smarter as well. As a result, the global smart cities market is on the rise. Statista states that, globally, technology spending on smart city initiatives is expected to double from US$ 81 billion in 2018 to US$ 189.5 billion in 2023. Threat of attackers with expanding IoT landscape The challenge here is that such a stark uptick will drastically expand the IoT landscape, presenting more opportunities than ever to threat actors. As connectivity and computing power is distributed more widely across large-scale outdoor networks, hackers will scale-up their own operations in tandem. According to a Nokia report from October 2020 (based on data aggregated from monitoring network traffic on more than 150 million devices globally), IoT devices now account for roughly 33 per cent of all infected devices, up from the 16 per cent estimated in 2019. What’s more concerning is how these figures are translating into real world events. 2021 alone has already witnessed an attack on a water plant in Oldsmart, Florida, which was designed to poison residents’ drinking water. Furthermore, Colonial Pipeline, one of the largest fuel pipelines in the US was also hacked, earlier this year, resulting in major shortages across the country’s East Coast. Security through IoT authentication From weak password protection, a lack of regular patch updates and insecure interfaces, to insufficient data protection, poor IoT devices management and an IoT skills gap, there are plenty of weaknesses existing within the IoT ecosystem, which continue to provide open goals for attackers. To defend against such lethal threats, security-by-design and open standards should be the guiding principles of IoT, working to prioritise security, interoperability and robust, internet-based protocols to mitigate risks. Device authentication and encryption A sound place to start is to make device authentication and encryption the central pillars of your IoT security architecture A sound place to start, in this regard, is to make device authentication and encryption the central pillars of your IoT security architecture. The goal is to be able to prove that each and every device joining a network is not malicious, with tell-tale signs being rogue code, for example. By ensuring each device is uniquely identifiable with digital certificates and therefore, properly authenticated when joining a network, you can ensure no tampered devices are able to infiltrate your overarching network. Using technologies, such as Hardware Secure Element Critically, passwords should be avoided altogether, these vulnerable to being stolen and cracked. And, while a similar vulnerability lies in the fact that all secure devices contain a private key, you can leverage technologies, such as Hardware Secure Element (a chip designed specifically to protect against unauthorised access, even if the attacker has physical access to the device), as an extra layer of defence. Digital certificates are not the only option available in protecting those IoT devices that, if tampered with, could become the cause of physical threats. Physical Unclonable Function (PUF) can also be used to prevent tampering. Physical Unclonable Function (PUF) Through Physical Unclonable Function (PUF), a form of IoT device fingerprint is developed from the unique make up of a piece of silicon, which can be used to create a unique cryptographic key. Unlike digital certificates, a secure infrastructure can be achieved through PUF, without the need for any additional hardware, as the key is not only stored securely, but it also becomes invisible to hackers, when the device is not running. The importance of encryption Use of AES encryption within radio chips, to scramble messages on the move, is the method adopted at Wi-SUN Alliance Now, let’s turn attentions to encryption. The use of AES encryption within radio chips, to scramble messages on the move, is the method that we have adopted here at Wi-SUN Alliance. It’s a means of maximising data security, but also reducing power consumption in the devices themselves. Beyond AES encryption, it’s also worth considering topography at the design stage. Indeed, mesh networks are advantageous for several reasons. They are more reliable, allowing data to be re-routed, should devices lose contact unexpectedly. Transmissions usually travel shorter distances, which improves power efficiency and performance, and frequency hopping functionality prevents attackers from jamming signals, which could deny the service altogether. Open standards and interoperability But where do open, interoperable standards fit in? As is defined by the European Committee for Interoperable Systems (ECIS), interoperability enables a computer programme to communicate and exchange information with other computer programmes, allowing all programmes to use that information. Open standards then allow any vendor of communications equipment or services to implement all standards necessary, to interoperate with other vendors. This is incredibly useful from a security perspective. It means that all specs are stress-tested and verified by many users, and that any vulnerabilities are quickly detected, and remediated, enhancing security and reliability. Need for open standards Equally, open standards can accelerate time-to-market, reduce costs and ensure products are usable, with a variety of manufacturers’ processors and radios, with a steam of publicly available protocol stacks, design information and reference implementations available that can help build and future-proof secure products. Indeed, large-scale corporate IoT networks alongside smart cities, smart utilities, and other key smart infrastructure will only continue to evolve, in the coming years. With the immense threats of attackers in mind, these systems must prioritise security-by-design, both now and in the future.
BIM (building information modeling) provides a process for creating and managing information during the building lifecycle and beyond. BIM is often equated with 3D modeling of construction projects, but the visual component is just part of the value of BIM. Additional data, such as specifications and other documentation, is also part of the process, underlying the visual aspects, helping to drive decision making and providing immediate access to detailed information about all facets of the building process. Incorporating BIM systems For the last six years, ASSA ABLOY Opening Solutions has worked with specification writers and architects in Europe, the Middle East, and Africa (EMEA) to make it easy to incorporate ASSA ABLOY Opening Solutions doors, hardware, and security solutions into BIM systems. Everyone on a project can work together in the interactive and information-rich BIM environment. BIM tools are also used by contractors, distributors, facility owners, and security consultants. BIM software BIM information relating to doors, hardware, and security solutions is available in the cloud BIM information relating to doors, hardware, and security solutions is available in the cloud with the company’s Openings Studio BIM software. This improves the process of door scheduling and visualisation and enables customers to focus on the design, installation, and management of openings. “If you have up-to-date information inside the BIM model, you can reduce mistakes and misunderstanding in the building industry,” says Marc Ameryckx, ASSA ABLOY Opening Solutions’ BIM Manager for the EMEIA region. “It helps to eliminate mistakes before they happen or as early as possible in the building process. The earlier, the less it costs. We provide data as soon as possible in the process.” (ASSA ABLOY Opening Solutions also has comparable systems available in other regions of the global company.) Centralised data in BIM 3D model Expanding the data available in BIM provides additional value compared to merely providing “BIM objects” that can be incorporated into a BIM 3D model. The combination of BIM modeling and the underlying specifications boosts the quality of the project and its key to success, says Marc Ameryckx. Even after the building is complete, the BIM model is still valuable, providing a repository of “as-built” information that can be used by building managers and security professionals tasked with operating and maintaining the building. For example, if a lock needs to be replaced, retrofitting is simpler because all the information about the lock and existing installation is available in a centralised data file. Revit and ArchiCAD A widely used BIM software is Revit from Autodesk, a program that brings architecture, engineering, and construction disciplines into a unified modeling environment to drive more efficient and cost-effective projects. Another BIM software program is ArchiCAD, developed by the Hungarian company Graphisoft. Openings Studio™ added a plugin for ArchiCAD this year, in addition to Revit. Tailor-made information security solutions We provide tailor-made information security solutions with various hardware on projects with more doors" “We can provide tailor-made information security solutions with various hardware on projects with more doors, adding more flexibility,” says Marc Ameryckx. “Customers do not need to be the experts on the products because we provide expertise as part of our specifications.” For example, how often do building mistakes occur because of a misunderstanding about the electrical needs of a lock and the wrong cabling is installed? The problem is especially expensive if it is discovered only after the walls are complete. Providing complete data about the electrical lock as part of a BIM system avoids the snafu. Another example is the specification of a deadbolt lock on a door that operates with an electric strike. The deadbolt undermines the intended operation of the electric strike and can interfere with escape routes in case of an emergency. The mistake becomes obvious in the BIM environment and can be rectified before consequences impact the real world. Data addition to Opening Suites site ASSA ABLOY Opening Solutions is continuously expanding the data it provides at the Opening Suites site, covering additional functionality and more components including the door, cabling, and electrical connections. Hardware sets are linked to specific doors in the BIM models, including all the details of various components, including article numbers, technical sheets, electrical requirements, all depending on customer expectations. Physical equipment includes QR codes that can be scanned by a smartphone to provide information on the door (A mobile app is in development). More details and more data Experienced BIM consultants work with the Openings Studio software on projects ranging from single doors to large buildings with many doors. Data will be more and more important, and there will be more data inside BIM models Adding more data and detail to the BIM process at the level of each door expands the usefulness of BIM, which has historically been focused on broader issues such as structural work and HVAC. “Openings Studio™ provides all the data to integrate doors and security in the BIM process,” says Marc Ameryckx. The higher level of detail may be a new aspect even for customers who already use BIM software. “Data will be more and more important, and there will be more data inside BIM models,” says Marc Ameryckx. In the future, the use of “digital twins” could expand the capabilities even further; for example, the software could simulate escape routes in case of fire. More data makes more things possible.
An impact of the COVID-19 pandemic has been to accelerate change. In 2020, the security industry was among many others that sought to adapt to shifting norms. In the process, we grabbed onto new opportunities for change and, in many cases, re-evaluated how we have done business for decades. If necessity is the mother of invention, perhaps crisis is the mother of acceleration. This article will reflect on how these themes impacted the physical security industry in 2020, based on content we published throughout the year, and with links back to the original articles. Sensitive data leakage Since the lockdown came into effect, organisations globally have undergone years' worth of transformations in a matter of months. Whether it has been to transition their operations online or moving their IT infrastructure to the cloud, there’s no denying that the face of business has changed permanently, experiencing a seismic shift, both operationally and culturally. As we enter the ‘next normal’ there remains a great deal of uncertainty around what the next 12 months holds and how organisations can navigate turbulence in the face of a possible recession. One of the most notable and widely reported trends has been the switch to remote methods of work, or home working. With so many employees logging on from residential networks, through personal devices that may be more easily compromised, the overall attack surface has greatly increased, raising the risk of potential corporate and sensitive data leakage in their new home office settings. Security and data protection are larger issues than ever. Good cybersecurity hygiene Criminals will use the crisis to scam people for money, account information and more" With a majority of the world working from home, businesses had to respond to this changing landscape. While it used to be that in-person networking events and sales pitches secured new projects or opportunities, the current landscape pushes businesses to be more creative in how they reach their customers. For example, with ISC West being postponed, many companies have turned to online resources to share new product demonstrations and other company news. Others are hosting webinars as a way to discuss the current climate and what it means for the industry. Without the proper precautions, working from home could become a cybersecurity nightmare, says Purdue University professor Marcus Rogers. “Criminals will use the crisis to scam people for money, account information and more,” he says. “With more people working from home, people need to make sure they are practicing good cybersecurity hygiene, just like they would at work. There is also a big risk that infrastructures will become overwhelmed, resulting in communication outages, both internet and cell.” Work-life balance In a typical office with an on-premise data centre, the IT department has complete control over network access, internal networks, data, and applications. The remote worker, on the other hand, is mobile. He or she can work from anywhere using a VPN. Until just recently this will have been from somewhere like a local coffee shop, possibly using a wireless network to access the company network and essential applications. There are many benefits of working remotely with productivity right up the top of the list There are many benefits of working remotely with productivity right up the top of the list. By reducing the unproductive time spent commuting and travelling to meetings, we are able to get much more done in a day. Add to this the reduction in stress and improved work-life balance and it makes for an impressive formula of happier, healthier and more motivated colleagues. And it’s still easy to measure results no matter where someone is working. Video conferencing platforms Trade shows have always been a basic element of how the security industry does business - until the year 2020, that is. This year has seen the total collapse of the trade show model as a means of bringing buyers and sellers face to face. The COVID-19 pandemic has effectively made the idea of a large trade show out of the question. The good news is that the industry has adapted well without the shows. A series of ‘on-line shows’ has emerged, driven by the business world’s increasing dependence on Zoom and other video conferencing platforms. The fact is, 2020 has provided plenty of opportunities for sellers to connect with buyers. Some of these sessions have been incredibly informative – and conveniently accessible from the comfort of a home office. Online training courses Online training has grown in popularity this year, and the change may become permanent Online training has grown in popularity this year, and the change may become permanent. “We have seen unprecedented international demand for our portfolio of online training courses ranging from small installation companies to the largest organisations, across a wide range of sectors,” says Jerry Alfandari, Group Marketing Manager of Linx International Group, a UK training firm. “More than ever, businesses are looking to ensure they have the skills in-house to coordinate their response to the changing situation. Individuals are also taking this time to upskill themselves for when we return to ‘normal’ by bringing something with them they didn’t have before. Perhaps unsurprisingly, people are still seeking to better themselves for what will be, eventually, a competitive market.” Virtual trade show ‘Crisis and the Everyday’ was part of Genetec’s Connect’DX virtual trade show last spring. The virtual conversation – emphasising both in form and content the topsy-turvy state of the world – included interesting insights on the current pandemic and its near- and long-term impact on the industry. In the middle of this pandemic, there is an opportunity to help security reinvent itself “In the middle of this pandemic, there is an opportunity to help security reinvent itself,” said Brad Brekke, Principal, The Brekke Group, one of the panelists. “Amid the business disruption, we should ask ‘what’s the new playbook?’ It’s an opportunity for security to look at ourselves now and look at a business plan of what the future might look like. We need to align with the business model of the corporation and define our role more around business and not so much around security.” Cloud-based platform As a cloud-based platform for service providers in the security, smart home and smart business markets, Alarm.com adapted quickly to changing conditions during the coronavirus pandemic. In the recent dynamic environment, Alarm.com has kept focus on supporting their service provider partners so they can keep local communities protected. “We moved quickly to establish work-from-home protocols to protect our employees and minimise impact on our partners,” says Anne Ferguson, VP of Marketing at Alarm.com. The Customer Operations and Reseller Education (CORE) team has operated without interruption to provide support to partners. Sales teams are utilising webinars and training resources to inform and educate partners about the latest products, tools, and solutions. Alarm.com’s partner tools are essential for remote installations and support of partner accounts.
If one employee stands less than six feet away from another employee, a fob attached to a lanyard around his or her neck emits an auditory beep – an immediate reminder to observe social distancing. If an employee were to be diagnosed with COVID-19, a cloud-based database provides a record of who at the company the sick employee had contact with. These capabilities of HID Location Services ensure social distancing and provide contact tracing to enable companies to return to work safely. They have been deployed in a pilot program at HID Global’s Corporate Headquarters in Austin, Texas. Social distancing using a BLE beacon To ensure social distancing, a Bluetooth Low Energy (BLE) beacon is emitted from an employee’s fob (or from a badge that has the same functionality). The beacon communicates peer-to-peer with a beacon emitted by another employee’s fob or badge to alert if the location of the two employees is less than six feet apart. To ensure social distancing, a Bluetooth Low Energy (BLE) beacon is emitted from an employee’s fob For contact tracing, the beacons communicate via a nearby “reader” (a BluFi BLE-to-Wi-Fi gateway) to the Bluzone cloud-based software-as-a-service. The building area covered by each reader constitutes a “zone,” and the system records when two beacons are signaling from the same zone, which indicates contact between employees. In effect, the system records – historically and forensically – who was near whom (and for how long) using the zone-based approach. “In the workplace, we provide organisations with visibility into the location of their workforce,” says Mark Robinton, Vice President, IoT Services Business Unit at HID Global. Pilot program spans variety of environments By documenting where a sick individual moved in the building, the system also can guide any need to close off a certain area for deep cleaning. Instead of quarantining a whole building, a company could quarantine a small subset of employees who were likely exposed. Importantly, the system only reports data, while management makes the actual decisions about how to respond. The site of the pilot program is the 250,000-square-foot HID Global facility in Austin, which includes a variety of environments, including manufacturing areas, an executive suite, cubicles, a training area, a cafeteria, and lobbies. This spectrum of use cases enables the pilot program to evaluate how the system works in various scenarios. The building in Austin has two floors, plenty of natural lighting and emphasises sustainability in its design. HID Location Services ensure social distancing and provide contact tracing Pilot starts small and expands For the pilot program, 80 readers were installed in a wide area in the facility, including a variety of environments. Initially 30 badges and 30 fobs, all BLE-enabled, were issued to employees. If a badge identifies another nearby beacon (suggesting a social distancing failure), it emits a blinking LED light, which can be seen by the offending co-worker. The fobs emit an audible beep, which employees have overwhelmingly said they prefer. Observers overseeing the pilot program have documented employee reaction and comments. It emits a blinking LED light, which can be seen by the offending co-worker There were challenges in setting up the pilot program remotely to ensure fewer employees were on site during the pandemic. The equipment was provisioned in Florida and then shipped to the Austin location. Fine-tuning was required to adjust the signal strength of the BLE beacons. The badges were initially more powerful, but the strength was dialed back to be comparable to the fobs and within the six-foot social distancing range. Signal strength is also a variable in diverse environments – the 2.4 Ghz signal tends to reflect easily off metal, so adjustments in signal strength are needed in a factory setting, for example, versus a collection of cubicles. “This facility is large enough and diverse enough that it provides great test results and quality data to analyse,” says Dean Young, Physical Security Manager at HID Global. “Our employees are eager to be part of the pilot to demonstrate that we use the technologies we provide to our customers, and they want to help us stay in compliance with social distancing and contact tracing.” Ensuring privacy while protecting employees HID Global’s headquarters had approximately 425 employees before the coronavirus pandemic lowered the number drastically to include only essential workers. As more people return to work, additional fobs and badges are being issued to expand the scope of the pilot program. The program is also incorporating contact tracing of suppliers and others who visit the facility. Except when triggered by contact among employees, locations are not recorded. Each employee’s location is always available in real-time (e.g. in case of an emergency), but they are not “tracked.” Through BluFi placement and geofence capabilities, the system closes off private areas where location should not be monitored, such as a rest room. Geofencing also identifies when employees enter and/or exit the area covered by the pilot program. Although each beacon is associated with an employee, the employee’s identity is not part of the data stored in the cloud, so there are no privacy concerns. Data is completely anonymised, and no personally identifiable information (PII) is stored in Bluzone. Other computer systems in a company, such as a human resources (HR) program, can privately and securely store the identities associated with each beacon. Other applications for HID location services In addition to social distancing and contact tracing applications, HID Location Services offer other use cases ranging from asset tracking and employee safety/security to location analytics. For example, the system can analyse room usage for better building management and operational efficiency. It can also quickly find people in emergency situations. These use cases ensure continued value for a system even after concerns about social distancing and contact tracing have faded. The system can analyse room usage for better building management and operational efficiency Another big selling point is the ability of a company to be better prepared in case of a future pandemic, or a second wave of this one, says Robinton. The HID Location Services social distancing and contact tracing applications will be available at the end of Q3 and will be rolled out through HID Global’s existing integrator channel. Vertical markets likely to embrace the technology include healthcare, where hospitals need to track patients as they come in and to know which other patients or staff they may have been exposed to. The financial sector is another likely market, as is manufacturing, which is looking to avoid the prospect of shutting down an entire plant. It’s better to address the three or four people who were near a sick employee than to shut down the plant. In the hospitality industry, fobs can be used to signal duress by the housekeeping staff.
Alcatraz AI has announced that they are bringing the Alcatraz AI Rock facial authentication solution to BrainBox AI’s offices. BrainBox AI is at the forefront of building automation and a renowned company in the green building revolution. Identity and facemask verification solution As BrainBox AI’s office recently re-opened with limited capacity, the company is taking proactive steps, through Alcatraz AI’s robust identity and facemask verification solution, in order to keep employees safe. As one survey showed, two-thirds of employees have safety concerns, regarding the return of on-site operations. Considering these statistics, health and safety must be top priorities for businesses, as they re-open. BrainBox AI is keeping its employees’ safety at the top-of-mind, by installing Alcatraz AI’s Rock solution, before they return, to ensure greater safety and security. Alcatraz AI’s Rock facial authentication solution Alcatraz AI’s Rock facial authentication solution combines advanced AI and 3D sensing technologies Alcatraz AI’s Rock facial authentication solution combines advanced AI and 3D sensing technologies, to provide facilities with enterprise-grade identity verification, which is needed to create secure spaces. Rock’s state-of-the-art security features include touchless access, multi-factor authentication, video at the door and intelligent tailgating detection. Alcatraz AI’s access control solution, the Rock, effectively detects tailgating and sends ‘real-time alerts’, if an unauthorised person enters, and sends real-time notifications to ACS/VMS. BrainBox AI, leading the green building revolution “BrainBox AI is leading the green building revolution, and we are looking forward to bringing frictionless, multi-sensor technology and a touchless authentication feature to the office,” said Tina D’ Agostin, the Chief Executive Officer (CEO) of Alcatraz AI, adding “By utilising the Alcatraz AI Rock, we’ve helped BrainBox AI’s offices re-open smoothly and safely.” “BrainBox AI is excited to announce its partnership with Alcatraz AI. Our employees’ safety is always our top priority. We are confident The Rock’s touchless authentication and the frictionless security system will give each BrainBox AI employee peace of mind, when returning to the office,” said Jean-Simon Venne, the Co-Founder and Chief Technology Officer (CTO) of BrainBox AI.
Patient falls in nursing homes are a serious problem. In the United States, for example, around 1,800 elderly people, living in nursing facilities, die each year from injuries related to falls, according to the Nursing Home Abuse Center. Those patients who survive their injuries often have a reduced quality of life and suffer some form of permanent disability. Rise in nursing home patient falls Figures show that between 50% and 75% of nursing home residents suffer falls each year, twice the chances of falling when compared to seniors who live in a regular residential community. It has been a prevalent challenge to detect falls quickly and effectively, especially when these occur in residents’ bedrooms. In the United Kingdom, the Care Quality Commission has recognised that the use of CCTV may be one of the best ways to ensure safety and quality of care. However, using video surveillance also brings into question other security issues, such as privacy and data protection. Dahua’s WizMind technologies WizMind embraces human-based AI (Artificial Intelligence), for a whole host of applications across verticals This is where Dahua Technology’s WizMind technologies come into play. WizMind embraces human-based AI (Artificial Intelligence), for a whole host of applications across verticals, such as retail, energy, finance, transportation and of course, health and social care. Specific to the health and social care sector are deep-learning algorithms, to protect the privacy of the face and body in real-time, and stereo analysis, which combines dual-lens cameras with three-dimensional scene analysis, in order to detect sudden physical movement, such as falls. Stereo video analysis The growth of AI applications has enabled the greater availability of 3D scene analysis solutions, thereby enabling objects and people to be analysed in three dimensions. Dahua Technology’s stereo analysis uses two lenses, in order to capture separate images of the same scene. It then computes the ‘optical parallax’ of spatial points in the two images, providing 3D information of the scene. The stereo vision mimics the depth of view that comes from humans having two eyes, known as binocular vision. Combined with deep-learning algorithm Combined with a deep-learning algorithm, stereo analysis can recognise event patterns, such as falls and other movement-based behaviours, such as people approaching, the detection of an abnormal number of people in an area, and violent behaviour. In nursing and care homes, stereo analysis cameras can help staff monitor residents, in case of emergency and respond to residents’ problems, such as tripping and falls. The cameras can view all three dimensions of subjects and together with its deep-learning algorithm, can immediately alert staff to any unusual or sudden movement, such as would be evident in a fall. Cameras in communal areas and bedrooms With cameras situated both in communal areas and in bedrooms, the staff is able to respond quickly to incidents With cameras situated both in communal areas and in bedrooms, the staff is able to respond quickly to incidents, which may otherwise stay undiscovered for hours. An example of such a scenario is a nursing home in Singapore, which has a capacity of around 400 beds and is divided into 14 separate living environments, with each designed to be a home-like living area. Dahua cameras with intelligent fall detection technology Dahua cameras, such as IPC-HDW8341X-BV-3D with intelligent fall detection technology were installed, including the provision of 167 stereo analysis cameras inside each bedroom. These trigger an alarm, in the case of incidents, such as a fall, allowing immediate response by staff. Not only does this enhance the well-being and safety of residents, but it also can reduce the nursing home’s labour costs. In addition, Stereo Analysis can also be applied in other application scenarios. An underground unmanned bicycle parking garage in Amsterdam, for instance, has installed Dahua Technology’s behaviour analysis cameras, to detect abnormal events and prevent accidents, such as people tripping and falling, or suspicious individuals wandering around the area. Privacy Protection 2.0 technology While monitoring their situation inside the nursing home, Dahua also adopts Privacy Protection 2.0 technology that features masking of human face and body, to protect the residents’ privacy. It involves the restriction of what can be seen in video images and applies equally to live, and recorded images. Digital masking takes place on the front-end device (e.g. network camera). Dahua’s Privacy Protection 2.0 provides real-time occlusion of the body and face and enables users to access recorded videos, without having to overlay faces with mosaic masks. It also offers additional occlusion options, such as irregular polygons, mosaics and coloured blocks, and allows code exporting based on specified targets, ensuring the privacy of subjects. Privacy and security in evidence collection Stereo video analysis and privacy protection come into their own in nursing homes and healthcare facilities Benefits offered include non-pixelated human targets, allowing for privacy and security in evidence collection. The technology also allows for face and human attributes analysis, without breaching people’s privacy, making it ideal for nursing homes. Stereo video analysis and privacy protection come into their own in nursing homes and healthcare facilities. It allows the close monitoring of residents or patients to help ensure their well-being and safety, while at the same time protecting the privacy of often vulnerable individuals. Dahua TechMonth As part of the Dahua TechMonth, this blog highlights how Dahua’s stereo analysis technology, combined with privacy protection, can provide a valuable tool to help staff respond to incidents quickly and efficiently, including falls, without infringing on people’s data protection rights. In the next blog, Dahua Technology will be discussing the WizMind application of human metadata, enabling users to maximise situational awareness and analysis of events.
Adani Group is an Indian multi-national conglomerate, with its headquarters located in Ahmedabad, Gujarat, in India. The group’s diversified businesses include resources, logistics, energy sectors and agriculture business. Adani Group is the largest port developer and operator in India, with the Mundra port, located in Gujarat, the largest commercial port in India. Having multiple ports, branches, manufacturing units and corporate offices at various locations, Adani Group is one of the largest business units in India. In all, this business group has 15,000+ employees and 50,000+ workers (with 900+ third-party contractors), who are involved in the incorporation of various work orders, across 25+ business units. Attendance and shift record maintenance Adani Group is widely engaged in multiple business units and ports, with strength of 50,000+ workers, who are engaged under 900+ contractors employed at various locations. Maintaining and managing the entire attendance details, diverse shifts and leave policies for the various locations and numerous workers at a central place was critical for the multi-national conglomerate. Moreover, task allotment to workers based on its requirements, skills under a contractor and its verification against the respective contractor's report were tedious tasks for the management to deal with on a regular basis. To provide approved and appropriate induction of each worker, at a defined level, monitor progress status of each work order and its segregation, based on reports were quite challenging. COSEC Contract Workers Management solution Report generation to eliminate the fraudulent and erroneous payment of wages, at contractors' end, had been the need of the hour. Moreover, their requirement of timely and error-free payroll processing was to improve overall productivity. After a comprehensive discussion, with regards to the problems and requirements of the Adani Group’s management, Matrix offered its COSEC Contract Workers Management solution for their 50,000+ workers, who are working under 900+ contractors, spread across the enterprise’s four locations in India. Centralised attendance management solution Matrix’s COSEC Contract Workers Management solution offers a centralised attendance management solution Matrix’s COSEC Contract Workers Management solution offers a centralised attendance management solution for various branches that are spread across multiple locations, which automates all processes right from recording entries and exits, up to processing salaries. The COSEC Contract Workers Management solution facilitates enrolment of the worker credentials, along with photographs, documents and induction details. It helps contractors to manage workers efficiently, using contractors’ self-service portal. The solution provides multiple connectivity possibilities, via Ethernet, Wi-Fi and Mobile broadband. Seamless integration with SAP The solution also eases the tracking of work order progress. It offers seamless integration with SAP, using the database to database linking and offers the feature of real-time notifications, in cases of exceptional situations, via Email and SMS. Results: Enhanced security with effective worker’s enrolment process, abiding by various induction levels. Increase in productivity of administration by 20%. Easy decision making, due to the generation of customised reports. Smooth and effective monitoring of work orders. Improved security with centralised control and monitoring, with reduced time spent by the security department. Error-free man hours’ computation for quick & effective wages’ calculation. Minimised manual interventions. Products offered by Matrix include: COSEC CENTRA LE - Application software platform, expandable up to one million users. COSEC LE CWM - Contract Workers Management module for COSEC CENTRA LE. COSEC DOOR FOW - Fingerprint and RF card-based door controller with Wi-Fi connectivity. COSEC PATH DCFM - Fingerprint, Mifare card, and NFC-based door controller. COSEC VEGA FAX - Fingerprint and RF card-based premium door controller with Touch Sense LCD, IP65, Wi-Fi and POE connectivity options. COSEC DOOR FOP - Fingerprint and RF card-based premium door controller with LCD and keypad.
With 4,500 card readers installed across 55 university buildings, Aalborg University in Denmark is G4S’s biggest integrated access control implementation in Europe. G4S access control system What started out as a simple security contract, providing a handful of officers at two university buildings, nearly 25 years ago, has grown into G4S’s biggest integrated access control implementation in Europe. Aalborg University, founded in 1974, is Denmark’s fourth-largest higher education institution and is organised across three campus cities, in Aalborg, Copenhagen and Esbjerg, Denmark. It provides Bachelor’s and Master’s degree courses in a range of subject areas, including Engineering, Natural Sciences, Social Sciences, Humanities and Health Sciences. Integrated access control and video-monitoring system All of the readers are linked to G4S’s access control management software, covering 55 buildings With 4,500 card readers installed on different doors to classrooms, laboratories, offices and libraries, more than 100 external cameras and intrusion alarms, the G4S solution at Aalborg University is large-scale, integrated access control, alarm and video monitoring system. All of the readers are linked to G4S’s access control management software, covering 55 buildings, with 20,000 access card users per year. Also, the university continues to add more buildings. Catering to Aalborg University’s security needs “It's a big operation and we have an excellent relationship of trust with our customer, built over many years,” said Jens Ryberg, the Key Account Manager for G4S in Denmark. Jens Ryberg adds, “Our contract started from fairly humble beginnings, where we provided a small number of security officers to two or so buildings, and we built the contract from there, adding firstly, burglar alarms and later, access control, as the university’s requirements evolved.” Large-scale access control system implementation As it has increased in size, in terms of the number of students and premises, security has become increasingly complex and challenging. The university team wanted an intelligent system, which automated manual processes and allowed thousands of students to be enrolled every semester and given the correct security passes. The Aalborg University manages the creation of new access cards and it stores the protected data on its own servers. Each access card is programmed with the relevant levels of access for each individual, student or university employee. Single entry card for access control The installed system uses intrusion alarms, video monitoring systems and access software, across all its buildings “University staff that may have previously carried 30 separate keys, for different buildings and restricted zones, now only need one card for all their specific access requirements. This automation is what the university wanted,” said Jens Ryberg. The installed system uses intrusion alarms, video monitoring systems and access software, across all its buildings. Managed from a central G4S control facility in Aarhus, the technology monitors all video footage and alarm activations, and security professionals, in the control room, are able to react quickly, when any issues arise. G4S patrolling security professionals Technology installed by G4S also has environmental benefits, with sensors fitted to hundreds of smart windows. The system receives signals from the windows, in order to keep different buildings comfortable and energy-efficient, by opening and closing windows as required. G4S provides patrolling security professionals, who ensure the buildings are secure, around the clock, but particularly at night, when the campuses are largely empty, between 4 pm and 8 am. Security across the four campuses is discreet and all are open plans, with no perimeter fencing. Each security professional carries a tablet device that will alert them, should an alarm be sounded, allowing a prompt response at the correct location. Enhanced security level during COVID-19 pandemic During the COVID-19 pandemic, the team has made some changes, in order to increase the level of security, with additional patrolling officers, in different locations and times. Enhancements have also been made to the access controls, so as to ensure the safety of students and employees alike. “The security we provide is advanced, professional and most importantly reliable, allowing the educational and social aspects of university life to continue smoothly,” said Jens Ryberg, adding “We are here to manage the risks and enhance value for the university. We bring organised safety and security to the campuses, which are unobtrusive and reassuring.” “G4S has been our long-standing partner in security and Aalborg University sees G4S as a very professional partner, with extensive knowledge in security,” said Jens Gregersen of Aalborg University Campus Services, adding “G4S has been involved in solving complex challenges in the university’s current level of security. Aalborg University attaches great importance to trust and permanent staff, and G4S staff have shown professionalism, and provided good solutions for the university.”
Globally renowned sensor solutions provider, HENSOLDT and L3Harris Technologies have joined forces to develop new capabilities for NATO’s Alliance Future Surveillance and Control (AFSC) programme. Both companies have signed a joint strategic cooperation agreement, to combine their respective skills in the areas of platform-independent mission solutions. HENSOLDT - L3Harris Technologies In the frame of the cooperation, HENSOLDT, with its proven track record in developing and manufacturing sensors, and mission systems, will contribute, among other things, capabilities in the areas of active and passive sensors, sensor data fusion and network management capabilities. L3Harris and HENSOLDT with their respective strengths are ideally suited to offer NATO the optimum solution" “Next-generation surveillance requires an intelligent approach to platform-independent, networked high-end sensors, AI-based date exploitation and dissemination,” said Jürgen Halder, the Head of Strategic Projects at HENSOLDT’s Spectrum Dominance Division. Jürgen Halder adds, “L3Harris and HENSOLDT with their respective strengths are ideally suited to offer NATO the optimum solution.” Open systems and multi-function solutions “Our team will explore open systems, multi-function solutions and data-centric concepts to sustain the NATO Alliance’s military advantage from 2035 and beyond,” said Dave Johnson, the Vice President (VP) of Strategy, Integrated Mission Systems, at L3Harris Technologies. L3Harris Technologies and HENSOLDT are part of an international team that brings together NATO nations’ industrial expertise in surveillance and control. This team will analyse the risks and feasibility of technologies, and components within its systems of systems approach, in order to enhance the NATO Alliance’s capabilities, to the year 2035 and beyond. Enhancing efficiency of future NATO operations L3Harris Technologies’ international teammates share a common vision, which is to increase the effectiveness and efficiency of future NATO military operations, through the procurement and integration of a multi-domain (AFSC) capability, which is centered on the data enterprise.
Revader Security has supplied a fleet of over 20 re-deployable CCTV cameras to West Midlands Combined Authority (WMCA), to provide visibility of multiple major construction projects being undertaken, in anticipation of the 2022 Commonwealth Games. 2022 Commonwealth Games The Transport for West Midlands (TfWM) capital construction programme comprises several major Commonwealth Games critical projects, within the Perry Barr area, including the A34 highways scheme, Perry Barr Rail Station & Bus Interchange, Alexander Stadium, A34 Sprint and A34 public realm works. The sheer scale of simultaneous construction activities within a constrained geography and along one of the busiest radial corridors into Birmingham City Centre, presents acute transport challenges. The redistribution of traffic flows is expected to cause significant potential disruption to the regional transport network, which requires intensive CCTV monitoring and rapid incident response. Re-deployable CCTV cameras Revader’s re-deployable CCTV cameras are rugged outdoor surveillance solutions Revader’s re-deployable CCTV cameras are rugged outdoor surveillance solutions, which combine camera, recording, storage and wireless video transmission in a single unit. They can be installed in virtually any location within minutes and repositioned to subsequent locations, to suit changing surveillance requirements. The units can operate from a variety of power sources, including mains and battery. Transport for West Midlands (TfWM) are able to relocate their cameras from site to site according to construction schedules, traffic volumes and the variable levels of disruption caused to surrounding infrastructure. The camera units are primarily attached to street lighting columns adjacent to major traffic routes. Data and video storage Data and video feeds are fed back to TfWM’s Regional Transport Coordination Centre in Birmingham, where these can also be shared with regional Urban Traffic Control centres and third parties, such as the Police. It was, therefore, important from the outset that the new cameras interface with existing network infrastructure and control room systems. Revader Security worked in partnership with CDC Technical Services (TfWM’s appointed consultant for the project) and Total Integrated Solutions (the authority’s incumbent maintenance provider) to ensure that the cameras integrated seamlessly with existing CCTV systems. Deploying high performing 4G cameras Revader’s re-deployable products are both reliable and high performing" Carl Chippendale, Owner and Managing Director of CDC Technical Services said, “Given the large geographical area involved, the solution to use 4G cameras was an obvious one. Revader’s re-deployable products are both reliable and high performing, making them the perfect match for a complex project. The level of support provided was exemplary and I would not hesitate to recommend them.” Eamonn Murphy, Key Account Manager at Total Integrated Solutions said, “Revader supplied us with a large fleet of re-deployable cameras, which were delivered on time and have proven highly effective. They also worked closely with us on this complex project to help configure our video networks and ensure that all our client’s priorities had been satisfied. I would recommend them highly.” Working with partners Revader Security continues to work alongside their partners, in order to support West Midlands Combined Authority (WMCA), Transport for West Midlands (TfWM) and a variety of other clients, in the public and private sectors.
Round table discussion
A new generation of security professional is waiting in the wings. They will be faced with unprecedented challenges, as they seek to transform the security marketplace to the ‘next level’. Technology changes ensure the market will be very different 10 years from now and the fresh labour pool will need to be able to meet the host of new challenges. We asked our Expert Panel Roundtable: What exciting career opportunities in the security industry await the next generation?
Since the advent of the physical security industry, access control has been synonymous with physical cards, whether 125 kHz ‘prox’ cards or the newer smart card alternatives. However, other credentials have also come on the scene, including biometrics and even smart phones. Some of these choices have distinct cost and security advantages over physical cards. We asked this week’s Expert Panel Roundtable: How soon will the access control card become extinct and why?
Cost is a reality to be managed. No matter how powerful or desirable a technology may be to a customer, the sale often comes down to the basic question: Can I afford it? And affordability extends not just to the purchase price, but to the cost of technology over its lifespan. In addition to advances in technology capabilities, the security industry has also achieved inroads to make its offerings more worth the cost. We asked this week’s Expert Panel Roundtable: What is the physical security industry doing to make more affordable and cost-effective technology solutions for end users?
Wireless security: Manufacturers & Suppliers
Protecting dormitory residents and assetsDownload
Protecting Critical Infrastructure through facial recognitionDownload
12 questions to ask your access control providerDownload
Providing frictionless cloud Video Storage as a Service (VSaaS)Download