Beach security
Not far from Kurfürstendamm, Berlin's number 1 shopping boulevard, a handful of people are working high up on the 13th floor to conquer the global market for smart door intercom systems with a compact and ultra-modern and above all high-quality and affordable product: DoorBird. The goal was to make it possible for residents all over the world to speak to their visitors at the door and even open the door for them, no matter where they may be at that moment. HD camera In autumn...
The Security Industry Authority (SIA) mounted a series of coordinated, surprise operations across England to tackle suspected security licence fraud, labour exploitation and immigration offences. SIA investigators launched the day of action on 31 October in partnership with Home Office Immigration Enforcement targeting 11 locations spanning the length and breadth of the country. Section 22 of PSIA Two people were arrested by Home Office Immigration Enforcement (HOIE) officers for ov...
ASIS International, the world’s largest association for security management professionals, celebrated Military and Law Enforcement Appreciation Day at Global Security Exchange (GSX) 2024 on 25 Wednesday. All law enforcement, military, and first responders received a free one-day pass to attend GSX. To honour those who serve and protect, ASIS began the day with a special breakfast event. This gathering celebrated the dedication of active duty and retired professionals from law enforcement,...
A £175 million communications network connecting 163 remote radio sites across 11,000 miles of UK coastline is now operational ensuring His Majesty’s (HM) Coastguard’s effective frontline emergency response continues for thousands of distress calls from the UK’s waters. Stretching from the Shetland Islands to the Isles of Scilly, it is one of the UK’s largest private broadband networks, with technology partner Telent helping to install 1,220km of new infrastructure...
The Foundation for Advancing Security Talent (FAST) has named Jim Lantrip of Allied Universal Technology Services to the FAST Board of Directors. The FAST Board of Directors, drawn from the membership of the Electronic Security Association (ESA) and the Security Industry Association (SIA), defines and refines FAST’s strategic plan, as well as the foundation’s annual goals. Jim Lantrip Jim Lantrip is a seasoned security industry veteran with over 30 years of experience. Currently s...
In August 2024, Speco Technologies announced the addition of five new teammates to their roster, expanding their product management, marketing, and sales teams. Speco’s newest employees include Mike Martin, National Sales Director; Adrian Tameguia, West Coast Regional Sales Manager; Andrew Escoto, Marketing Manager; Jordan Gaffney, Inside Sales; and Vinod Moorjani, Product Manager. Welcoming new members “We’re very excited to welcome this group of talented professional...
News
The Generation Ready conference is set to return for its third edition on 2nd July at the Avani Pemba Beach Hotel, Cabo Delgado, hosted as a prelude to the 3rd Mozambique Energy & Industry Summit (MEIS 2024), in a first-time unique collaboration between Field Ready and GEP. Youth employability Gilberto Botas, Chairman of Field Ready Mozambique explained, “Bringing together a community of like-minded people devoted to youth employability is central to the Field Ready’s work in Mozambique." "We are delighted to partner with the Mozambique Energy and Industry Summit (MEIS) to run the Generation Ready event, where we will bring together the Government of Mozambique, industry pioneers, educators, and young people.” Local training and recruitment The event will bring together young Mozambicans with business pioneers, government, and educators to network and share ideas about how to prepare the youth of Mozambique for the future of work. Specifically, it will highlight how sustainable social impacts are being delivered across Mozambique, with real examples of how working together can support youth employability, promote local training and recruitment, support communities, and unlock a universe of opportunities for young people. Speakers and panel discussions Prominent speakers and panel discussions will cover various themes during the day, including practical applications Prominent speakers and panel discussions will cover various themes during the day, including practical applications to support the youth's transition from education to employment, the role of major projects in creating job opportunities, collaboration between education and industry, and strategies for attracting and retaining top talent. Following Generation Ready, the Mozambique Energy and Industry Summit (MEIS) edition will open on the 3 July, hosted by the Provincial Government of Cabo Delgado and the Mozambican Local Content Association (ACLM). Over two days, MEIS 2024 will bring together key national and international stakeholders, made up of respective governments and pioneering organisations across the region to share knowledge and drive business opportunities across the continent in the energy sector. Key challenges and opportunities Speaking of the collaboration with Field Ready, Elthon Chemane, MEIS Chairman and President of the Mozambique Local Content Association (ACLM) added, "The highly successful 2nd Mozambique Energy and Industry Summit in 2023 was attended by a record number of delegates, engaged in a world-class programme led by prominent pioneers from across the continent, who addressed the key challenges and opportunities throughout Mozambique’s energy and enterprise industry." "Local content will be positioned as the nucleus of MEIS 2024, providing access to the projects requiring expertise and best practices both short-term and long-term as well as direct access for participants to the stakeholders throughout the country, enabling businesses to establish their position in one of the world’s true last frontiers."
New Government regulations mandate that all internet-connected smart devices, spanning from phones to TVs to smart doorbells, adhere to minimum-security standards by law. Groundbreaking legislation is in effect in the UK, aimed at shielding consumers and businesses from cyber threats. Cyber laws This initiative, spearheaded by the Department for Science, Innovation and Technology, the National Cyber Security Centre, and the Office for Product Safety and Standards, along with the efforts of Julia Lopez MP and Viscount Camrose, marks a pivotal moment in safeguarding against cyber criminals. Under these world-first laws, manufacturers are compelled to defend their products against hackers and cyber intrusions, effectively making the UK the global frontrunner in such protective measures. Key provisions This proactive approach aims to mitigate threats such as the notorious Mirai attack of 2016 Key provisions include the prohibition of easily guessed default passwords like 'admin' or '12345', with users prompted to change any common passwords upon setup. This proactive approach aims to mitigate threats such as the notorious Mirai attack of 2016, which exploited weak security features in over 300,000 smart devices, wreaking havoc on major internet platforms and services, including significant disruptions on the US East Coast. Recent findings to address cyber assaults The significance of this legislation extends beyond immediate protection, as recent statistics reveal that nearly all UK adults possess at least one smart device, with households averaging nine connected devices. By instating these measures, not only are consumers shielded from potential cyber assaults, but their confidence in purchasing and utilising such products are bolstered, fostering economic growth and business expansion. Robust network visibility Oseloka Obiora, CTO, RiverSafe said, “There is no doubt smart devices have become a big part of our day-to-day lives, creating an open door for hackers to gain all kinds of personal information and data. Now, we must aim to make the UK a safer place online, in response to the increasing rise of cyber attacks.” "To enhance readiness, security teams require robust network visibility to promptly identify and resolve vulnerabilities across systems, minimising the impact of cyber threats." Cyber resilience Andy Ward, VP of International for Absolute Security, commented, “With smart devices being increasingly hacked, new rules must be put in place to toughen cyber resilience and make the UK a safer place online." "As the UK confronts rising cyber threats, it's crucial to strengthen cybersecurity by focusing on threat protection, deterring attacks, and preparing for defence for all internet-connected gadgets, especially in a world where smart devices are an integral part of our daily lives. Achieving this involves ensuring clear visibility and effective control over networks, and demanding a robust framework to improve network supervision and establish a solid defencive stance."
SONITROL, the pioneering provider of integrated business security solutions, has achieved a significant milestone by reaching 60 years in business. The company will commemorate its six decades of achievements over the coming months and to mark the occasion has joined the Partner Alliance for Safer Schools (PASS) in order to work with the education community to better secure schools and create safer learning environments. In 1963 Robert Baxter met Al Cronk in Anderson, Indiana. Baxter was an inventor who coined the name SONITROL by combining the words sound and control, while Cronk was a local police officer who also owned an alarm company. After discussing how they could help eliminate false alarms by using technology to listen-in and verify whether intruders were in a building, they founded SONITROL in 1964. Franchise and distribution network "Like many successful businesses, SONITROL was the result of a great idea that solved a problem," commented Julie Beach, the company’s vice president. "Not only did Baxter and Cronk pioneer impact-activated audio sensor technology, but they took it to market via a franchise and distribution network. In 1968 SONITROL sold its first franchise in Detroit, Michigan, and its first project was to provide a school security system." Network of expert dealers Network of expert dealers provides cutting-edge integrated verified security solutions for intrusion SONITROL soon became the largest franchise-based security network in the United States and now has a network of 71 franchises and 43 corporate offices across North America. This network of expert dealers provides cutting-edge integrated verified security solutions for intrusion, video, access control and fire, providing some of the fastest police response times, lowest false alarm rates and the best apprehension record – over 187,000 and counting – in the security industry. Given its proud history of working within educational environments, SONITROL has chosen to mark its 60th anniversary by becoming a PASS Partner. Established in 2014, PASS is a non-profit group that brings together expertise from the education, public safety, and industry communities to support a coordinated approach to proven security practices specific to K-12 environments, while enabling school administrators and school boards to make informed decisions on security investments. Supporting PASS's mission SONITROL’s employees will have PASS access, five full days of on-site training As a Tier 4 PASS Partner, which is the highest level of corporate partnership, SONITROL joins a select group of organisations that share a commitment to supporting PASS's mission of providing resources, guidelines, and best practices to help create safer environments for students, educators, and staff. As well as being able to use PASS branding, SONITROL’s employees will have PASS access, five full days of on-site training and the availability of all PASS webinars. SONITROL’s support "It gives me great pleasure to welcome SONITROL," stated Chuck Wilson, Board Chairman and co-founder of PASS. "PASS continues to develop valuable resources, such as the PASS Safety and Security Guidelines for K-12 Schools, which serve as a cornerstone for proactive safety planning. SONITROL’s support enables us to further our efforts in promoting comprehensive approaches to school safety, encompassing everything from infrastructure enhancements to emergency preparedness. Together, PASS and SONITROL will work tirelessly to ensure that schools remain safe, nurturing environments where students can thrive." SONITROL dealer network Attendees from SONITROL dealer web will also be able to take part in product education sessions SONITROL is getting set to celebrate its 60th anniversary at its annual SONITROL National Dealers Association (SNDA) Convention, which this year takes place in Louisville, Kentucky, on March 14th-17th. Dealers, employees, and their families will gather to recognise the best in leadership, sales, marketing, administration, customer service, operations, human resources, and technical support throughout North America. Attendees from the SONITROL dealer network will also be able to take part in product education sessions and there will also be an exhibit hall with a variety of vendors. There will also be a very special event at the famous Churchill Downs horse racing complex on Friday 15th to celebrate SONITROL’s 60th anniversary. An awards banquet will then be held on Saturday 16th, where various accolades will be presented to winners across the dealer network for their outstanding performance. Nation's educational establishments "2024 is a very special year for SONITROL and our 60th anniversary provides an excellent opportunity to reflect on the company’s many achievements," concluded Julie Beach. "Given that Robert Baxter and Al Cronk built the early franchise network around providing impact-activated audio detection technology to schools, becoming a PASS Partner is particularly appropriate, and we are honoured to contribute to the collective goal of safeguarding our nation's educational establishments. The SNDA Convention is a great opportunity to celebrate SONITROL’s past, present and future, and I look forward to welcoming members of our dealer network to Louisville."
Allied Universal®, the world’s renowned security and facility services company, is proud to announce that its client, the Helen Delich Bently Port of Baltimore has received a top U.S. Coast Guard security assessment for the 15th consecutive year. Security assessment The assessment which included a detailed review of all security protocols and procedures is for the six state-owned, public marine terminals that are managed by the Maryland Port Administration (MPA). The U.S. Coast Guard Sector Maryland conducts an annual inspection at Maryland’s Port of Baltimore to ensure compliance with federal security regulations. Robust security solutions Allied Universal recognises the importance of maintaining the highest level of security for the port Allied Universal recognises the importance of maintaining the highest level of security for the Port of Baltimore and is committed to continually providing robust, industry-renowned security solutions to keep the port’s workers and visitors safe. “Allied Universal is honoured to serve the Helen Delich Bently Port of Baltimore, and we are pleased to learn of this outstanding ranking by the U.S. Coast Guard,” said Tracey Fuller, President of Government Services for Allied Universal. Facility-specific solutions Tracey Fuller adds, “We take pride in our ability to provide a range of highly effective, facility-specific security solutions to the port so it can continue to serve the greater Baltimore community as a hub for economic growth, a stronghold for hundreds of thousands of jobs and traveling visitors.” Of the nation’s more than 300 ports, the Port of Baltimore is ranked first for the volume of autos and light trucks, farm and construction machinery, and imported sugar and gypsum. It also includes a cruise passenger terminal.
Barrier1 Systems, the industry pioneer in perimeter-hardening physical security vehicle barriers, invites NATSO Connect 2024 attendees to interact with their range of crash-rated security bollards at booth #219, February 20-22 at Disney’s Yacht and Beach Club Resort. Vehicle barrier experts will be positioned alongside the company’s storefront bollards to communicate the value of anti-ram vehicle barrier solutions as they apply to truck stops and the travel centre industry. Effective security solutions “Travel centres, truck stops, and gas stations invest heavily in traditional security systems to keep their customers safe, but may not always be thinking about the risks and liabilities that occur when a vehicle slams into a storefront,” said Mark Borto, CEO, Barrier1. “From personal injury to unforeseen downtime and higher insurance premiums, our field-proven solutions address these unforeseen threats.” Barrier1 Systems provides high-quality, crash-rated security bollards that prevent vehicle accidents Barrier1 Systems provides high-quality, crash-rated security bollards that prevent vehicle ramming accidents before they happen. By investing in these simple, yet effective security solutions, truck stop business owners can protect their customers from bodily harm and themselves from the costly liabilities associated with storefront crashes. Barrier1 safety bollards Unlike conventional bollards available, Barrier1 safety bollards undergo rigorous crash testing and meet the standards set by the American Society for Testing and Materials (ASTM). Barrier1 offers bollards that are crash-tested and rated F3016 S10/P1 all the way up to ASTM F2656 M50/P1. That will cover the against impacts from a 5,000 lb pickup truck travelling at 10 mph up to a 15,000 lb medium duty truck travelling at 50 mph. NATSO Connect attendees can stop by booth #219 to see the Tomcat S10-P1 Storefront Bollard NATSO Connect attendees can stop by booth #219 to see the Tomcat S10-P1 Storefront Bollard, a crash-rated bollard designed to stop a 5,000 lb vehicle travelling at 10 mph. Tailored to provide enhanced safety in high-traffic, low-speed locales, including retail locations, fast food restaurants, banks, and sidewalks, the Tomcat S10 ensures pedestrian well-being is a top priority. Ideal bollard solution Also on display is the Tomcat S30 Storefront Bollard (crash test pending), capable of halting a 5,000 lb vehicle travelling at 30mph, making it an essential tool for areas with increased security and safety needs. As with other Barrier1 products, the Tomcat S30 is designed for easy retrofitting with same-day excavation and installation. Barrier1 Systems’ complete range of safety bollards are available in a variety of types, designs, and colours, ensuring consistent levels of performance and quality that seamlessly match storefront aesthetics. The dedicated team at Barrier1 Systems is available for collaboration and committed to finding the ideal bollard solution that meets an organisation’s specific design and security requirements.
Elite Interactive Solutions (EIS), the pioneer in manned guard replacement using proprietary intelligence and 100% verified police calls, announces its final 2023 year-end crime prevention results have shattered the company’s previous high-water marks. Elite’s industry-pioneering remote guarding services are making a dramatic impact in preventing crimes as verifiably proven by having achieved more than double the voice-down command centre interventions since 2021 and teaming with law enforcement on 80% more arrests as compared to 2022. Elite’s 24/7/365 SOCC The culmination of a five-year stretch in which Elite has consistently grown its client base By the time 2023 reached its conclusion, Elite’s 24/7/365 Security Operations Command Centre (SOCC) directly had prevented nearly 73,000 incidents and actively assisted with police in nearly 1,700 other real-time crime situations that concluded with suspects being detained or arrested 60% of the time. Those are all record highs, as are the nearly eight million events that were managed and 1,010 detainments and arrests. It’s the culmination of a five-year stretch in which Elite has consistently grown its client base as well as its crime prevention metrics. Author's quote “Utilising and leveraging the technology appropriately to remote guard several hundreds of properties across the nation has immensely helped in crime prevention and dispatching officers to crimes in an efficient and timely manner,” says EIS Security Director Noel Delgado. “These past years' numbers show and prove that when a system is calibrated correctly you can prevent numerous amounts of crime without engaging officers, which our SOCC does 96% of the time." “For the other 4% of the time, when we do engage officers to respond, we have a 60% rate of arrest/detainments. This is a testament to the hardworking men and women at Elite who contribute in all areas to make sure a site is forensically engineered, installed, serviced and commissioned perfectly.” LEAB reviews LEAB reviews SOCC activities daily to ensure EIS renews to help first responders do their jobs Equipped with either law enforcement or military experience, Elite’s command centre agents represent one of the four key areas the company has focused on to optimise effectiveness in preventing crime. Along with personnel, the other three elements are expert best practices, pioneering-edge technology and partnering with law enforcement. Regarding the latter, Elite maintains an internal Law Enforcement Advisory Board (LEAB) comprised of former law enforcement executives who act as a liaison to agencies across the country. The LEAB reviews SOCC activities daily to ensure EIS continues to help first responders do their jobs more effectively and safely. Remote guarding solution “Understanding how to structure and deploy Elite’s essential components evolved from my longtime vision to bring a more proactive approach of true crime prevention to the security industry,” says EIS Founder and CEO Aria Kozak. “These latest metrics show that what many had viewed as impossible is now achievable through the right blend of expertise, technologies, best practices, trained personnel and police relationships.” Nationwide customer base contains more than a dozen commercial and industrial vertical markets Elite’s diverse, nationwide customer base encompasses more than a dozen commercial and industrial vertical markets. According to the final 2023 data, the applications in which the remote guarding solution has had the greatest effect, in terms of arrest/detainments percentage, are in retail and shopping centres (77%) and general commercial deployments such as office, parking structures and warehouses (70%). Kozak and Elite Interactive Solutions “Considering that, according to a recent market report, security incidents cost corporate America in excess of $1 trillion annually, it’s gratifying to know that Elite’s customers are not part of those losses,” adds Kozak. “The only people that might be happier about that than the customer and Elite are the insurance companies that don’t have to process or pay out those claims. This is a solution where everybody wins, except the bad guys.” Kozak and Elite Interactive Solutions President Michael Zatulov are scheduled to speak about the company’s success in a February 8 presentation at the Barnes Buchanan Security Conference in Palm Beach, Florida.
Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Global transportation networks are becoming increasingly interconnected, with digital systems playing a crucial role in ensuring the smooth operation of ports and supply chains. However, this reliance on technology can also create vulnerabilities, as demonstrated by the recent ransomware attack on Nagoya Port. As Japan's busiest shipping hub, the port's operations were brought to a standstill for two days, highlighting the potential for significant disruption to national economies and supply chains. Transportation sector The attack began with the port's legacy computer system, which handles shipping containers, being knocked offline. This forced the port to halt the handling of shipping containers that arrived at the terminal, effectively disrupting the flow of goods. The incident was a stark reminder of the risks associated with the convergence of information technology (IT) and operational technology (OT) in ports and other critical infrastructures. This is not an isolated incident, but part of a broader trend of escalating cyber threats targeting critical infrastructure. The transportation sector must respond by bolstering its defences, enhancing its cyber resilience, and proactively countering these threats. The safety and efficiency of our transportation infrastructure, and by extension our global economy, depend on it. Rising threat to port security and supply chains XIoT, from sensors on shipping containers to automatic cranes, are vital to trendy port functions OT, once isolated from networked systems, is now increasingly interconnected. This integration has expanded the attack surface for threat actors. A single breach in a port's OT systems can cause significant disruption, halting the movement of containers and impacting the flow of goods. This is not a hypothetical scenario, but a reality that has been demonstrated in recent cyberattacks on major ports. Adding another layer of complexity is the extended Internet of Things (XIoT), an umbrella term for all cyber-physical systems. XIoT devices, from sensors on shipping containers to automated cranes, are now integral to modern port operations. These devices are delivering safer, more efficient automated vehicles, facilitating geo-fencing for improved logistics, and providing vehicle health data for predictive maintenance. XIoT ecosystem However, the XIoT ecosystem also presents new cybersecurity risks. Each connected device is a potential entry point for cybercriminals, and the interconnected nature of these devices means that an attack on one, which can move laterally and can have a ripple effect throughout the system. The threat landscape is evolving, with cybercriminals becoming more sophisticated and their attacks more damaging with a business continuity focus. The growing interconnectivity between OT and XIoT in port operations and supply chains is also presenting these threat actors with a greater attack surface. Many older OT systems were never designed to be connected in this way and are unlikely to be equipped to deal with modern cyber threats. Furthermore, the increasing digitisation of ports and supply chains has led to a surge in the volume of data being generated and processed. This data, if not properly secured, can be a goldmine for cybercriminals. The potential for data breaches adds another dimension to the cybersecurity challenges facing the transportation sector. Role of cyber resilience in protecting service availability Cyber resilience refers to organisation's ability to prepare for, respond to, and recover from threats As the threats to port security and supply chains become increasingly complex, the concept of cyber resilience takes on a new level of importance. Cyber resilience refers to an organisation's ability to prepare for, respond to, and recover from cyber threats. It goes beyond traditional cybersecurity measures, focusing not just on preventing attacks, but also on minimising the impact of attacks that do occur and ensuring a quick recovery. In the context of port operations and supply chains, cyber resilience is crucial. The interconnected nature of these systems means that a cyberattack can have far-reaching effects, disrupting operations not just at the targeted port, but also at other ports and throughout the supply chain. A resilient system is one that can withstand such an attack and quickly restore normal operations. Port operations and supply chains The growing reliance on OT and the XIoT in port operations and supply chains presents unique challenges for cyber resilience. OT systems control physical processes and are often critical to safety and service availability. A breach in an OT system can have immediate and potentially catastrophic physical consequences. Similarly, XIoT devices are often embedded in critical infrastructure and can be difficult to patch or update, making them vulnerable to attacks. Building cyber resilience in these systems requires a multi-faceted approach. It involves implementing robust security measures, such as strong access controls and network segmentation, to prevent attacks. It also involves continuous monitoring and detection to identify and respond to threats as they occur. But perhaps most importantly, it involves planning and preparation for the inevitable breaches that will occur, ensuring that when they do, the impact is minimised, and normal operations can be quickly restored. Building resilience across port security and supply chains In the face of cyber threats, the transport sector must adopt a complete method of cybersecurity In the face of escalating cyber threats, the transportation sector must adopt a comprehensive approach to cybersecurity. This involves not just implementing robust security measures, but also fostering a culture of cybersecurity awareness and compliance throughout the organisation. A key component of a comprehensive cybersecurity strategy is strong access controls. This involves ensuring that only authorised individuals have access to sensitive data and systems. It also involves implementing multi-factor authentication and regularly reviewing and updating access permissions. Strong access controls can prevent unauthorised access to systems and data, reducing the risk of both internal and external threats. Network segmentation Network segmentation is another crucial measure. By dividing a network into separate segments, organisations can limit the spread of a cyberattack within their network. This can prevent an attack on one part of the network from affecting the entire system. Network segmentation also makes it easier to monitor and control the flow of data within the network, further enhancing security. Regular vulnerability assessments and patch management are also essential. Vulnerability assessments involve identifying and evaluating potential security weaknesses in the system, while patch management involves regularly updating and patching software to fix these vulnerabilities. These measures can help organisations stay ahead of cybercriminals and reduce the risk of exploitation. EU’s NIS2 Directive EU’s NIS2 Directive came into effect, and member states have until October 2024 to put it into law The transportation sector must also be prepared for greater legislative responsibility in the near future. The EU’s NIS2 Directive recently came into effect, and member states have until October 2024 to put it into law. The Directive aims to increase the overall level of cyber preparedness by mandating capabilities such as Computer Security Incident Response Teams (CSIRTs). Transport is among the sectors labelled as essential by the bill, meaning it will face a high level of scrutiny. Getting to grips with the complexities of XIoT and OT integration will be essential for organisations to achieve compliance and avoid fines. Global transportation infrastructure Finally, organisations must prepare for the inevitable breaches that will occur. This involves developing an incident response plan that outlines the steps to be taken in the event of a breach. It also involves regularly testing and updating this plan to ensure its effectiveness. A well-prepared organisation can respond quickly and effectively to a breach, minimising its impact and ensuring a quick recovery. In conclusion, mastering transportation cybersecurity requires a comprehensive, proactive approach. It involves implementing robust technical measures, fostering a culture of cybersecurity awareness, and preparing for the inevitable breaches that will occur. By taking these steps, organisations can enhance their cyber resilience, protect their critical operations, and ensure the security of our global transportation infrastructure.
Security beat
Fueled by mounting concerns about the cybersecurity vulnerability of U.S. ports, President Joe Biden has signed an Executive Order aimed at shoring up defences against cyberattacks. Cybersecurity initiative The cybersecurity initiative marks a significant shift in policy, empowering key agencies and outlining concrete actions to bolster defences. By empowering agencies, establishing clear standards, and fostering collaboration, the initiative aims to strengthen U.S. ports against the evolving threat of cyberattacks, safeguarding the nation's maritime economy and national security. Expanded authority for DHS The proactive approach aims to prevent incidents before they occur The Executive Order grants expanded authority to the Department of Homeland Security (DHS) and the Coast Guard to address maritime cyber threats. DHS gains the power to directly tackle these challenges, while the Coast Guard receives specific tools. The Coast Guard can compel vessels and waterfront facilities to address cyber vulnerabilities that endanger safety. The proactive approach aims to prevent incidents before they occur. Real-time information sharing Reporting any cyber threats or incidents targeting ports and harbors becomes mandatory. This real-time information sharing allows for swifter response and mitigation efforts. The Coast Guard also gains the authority to restrict the movement of vessels suspected of posing cyber threats. Inspections can be conducted on vessels and facilities deemed risky. Mandatory cybersecurity standards The standardisation aims to eliminate weak links in the chain and prevent attackers from exploiting Beyond these broad powers, the Executive Order establishes foundational elements for improved cybersecurity. Mandatory cybersecurity standards will be implemented for U.S. ports' networks and systems, ensuring a baseline level of protection across the board. This standardisation aims to eliminate weak links in the chain and prevent attackers from exploiting individual vulnerabilities. Importance of collaboration and transparency Furthermore, the initiative emphasises the importance of collaboration and information sharing. Mandatory reporting of cyber incidents fosters transparency and allows government agencies and private sector partners to work together in mitigating threats. Additionally, the Executive Order encourages increased information sharing among all stakeholders, facilitating a unified response to potential attacks. Maritime Security Directive The Executive Order encourages investment in research and development for innovative cybersecurity solutions To address specific concerns, the Coast Guard will issue a Maritime Security Directive targeting operators of Chinese-manufactured ship-to-shore cranes. This directive outlines risk management strategies to address identified vulnerabilities in these critical pieces of port infrastructure. The long-term success of this initiative hinges on effective implementation. The Executive Order encourages investment in research and development for innovative cybersecurity solutions, recognising the need for continuous improvement and adaptation to evolving threats. Recognising the urgency of cyber threats The initiative has been met with widespread support from port authorities, industry stakeholders, and cybersecurity experts who recognise the urgency of addressing cyber threats. However, some concerns exist regarding the potential burden of complying with new regulations for smaller port operators. Effective communication, resource allocation, and collaboration among all stakeholders will be crucial to ensure the successful implementation of this comprehensive plan. Enhancing cybersecurity The more impactful and noteworthy piece is the associated NPRM from the U.S. Coast Guard (USCG) “This Executive Order is a positive move that will give the U.S. Coast Guard (USCG) additional authority to enhance cybersecurity within the marine transportation system and respond to cyber incidents,” comments Josh Kolleda, practice director, transport at NCC Group, a cybersecurity consulting firm. The more impactful and noteworthy piece is the associated Notice of Proposed Rulemaking (NPRM) from the U.S. Coast Guard (USCG) on “Cybersecurity in the Marine Transportation System,” adds Kolleda. Portions of the notice of proposed rulemaking (NPRM) look similar to the Transportation Security Administration (TSA) Security Directive for the rail industry and the Emergency Amendment for the aviation industry. Coordinating with TSA on lessons learned The USCG should be coordinating with TSA on lessons learned and incorporating them into additional guidance to stakeholders and processes to review plans and overall compliance, says Kolleda. “At first glance, the NPRM provides a great roadmap to increase cybersecurity posture across the various stakeholders, but it underestimates the cost to private companies in meeting the requirements, particularly in areas such as penetration testing,” says Kolleda. Cyber espionage and threats The focus is on PRC because nearly 80% of cranes operated at U.S. ports are manufactured there “It is unclear if or how the federal government will provide support for compliance efforts. As this seems to be an unfunded mandate, many private companies will opt for the bare minimum in compliance.” “Cyber espionage and threats have been reported by the Director of National Intelligence from multiple nation-states including China, Russia, and Iran,” adds Paul Kingsbury, principal security consultant & North America Maritime Lead at NCC Group. The focus here is on the People’s Republic of China (PRC) because nearly 80% of cranes operated at U.S. ports are manufactured there, he says. Destructive malware “The state-sponsored cyber actors’ goal is to disrupt critical functions by deploying destructive malware resulting in disruption to the U.S. supply chain,” says Kingsbury. “These threat actors do not only originate in China or other nation-states but also include advanced persistent threats (APTs) operated by criminal syndicates seeking financial gain from such disruptions." "The threat actors don’t care where the crane was manufactured but rather seek targets with limited protections and defences. The minimum cyber security requirements outlined within the NPRM should be adopted by all crane operators and all cranes, regardless of where they are manufactured.” PRC-manufactured cranes Kingsbury adds, “The pioneering risk outlined in the briefing is that these cranes (PRC manufactured) are controlled, serviced, and programmed from remote locations in China." "While this is a valid concern and should be assessed, there are certainly instances where PRC-manufactured cranes do not have control systems manufactured in PRC. For example, there are situations in maritime transportation system facilities where older cranes have been retrofitted with control systems of European Union or Japanese origin.” Monitoring wireless threats “The Biden Administration’s recent Executive Order is a critical step forward in protecting U.S. ports from cyberattacks and securing America’s supply chains,” says Dr. Brett Walkenhorst, CTO at Bastille, a wireless threat intelligence technology company. “To ensure proper defence against malicious actors accessing port-side networks, attention must also be paid to common wireless vulnerabilities." "Attacks leveraging Wi-Fi, Bluetooth, and IoT protocols may be used to access authorised infrastructure including IT and OT systems. Monitoring such wireless threats is an important element in a comprehensive approach to upgrading the defences of our nation’s critical infrastructure.”
Case studies
Hotel managers require security, flexibility, durability and aesthetics in an access management system that can cover guest rooms and shared spaces, on one hand, and private staff areas on the other. With multiple buildings, a private beach and sports areas, the new TH Resorts Capo Rizzuto on Calabria’s Ionian coast receives high daily traffic from guests and staff, who must have access at different times according to their specific needs. On taking over resort, TH management quickly identified the need for a new locking system that would allow each staff member to access different, specific areas of the facility. In specifying a new master key system, they had two more important criteria. Firstly, the solution should be mechanical rather than digital, to preserve existing hotel aesthetics. Secondly, they required a hierarchical system, where different staff members could have levels of access authority based on their roles. A CYS10 system makes fine-grained customisation possible Security of the comfy nickel-silver key is protected against unauthorised copying by two patents Working closely with the expert specification team at ASSA ABLOY Italia, managers at TH Capo Rizzuto chose a CYS10 master key locking system with Euro profile double cylinders for common area access points and staff-only zones. For guest room doors they selected CYS10 thumbturn cylinders, which lock securely for privacy and quickly unlock from the inside. The CYS10 platform consists of 6-pin sawn key cylinders; it is tested and certified according to EN 1303:2015 and SKG security standards. Security of the comfortable nickel-silver key is protected against unauthorised copying by two separate patents. Their robust design makes them ideally suited to challenging environments such as a busy hotel. Effective master key system design With 63 available key profiles, CYS10 cylinders enable the creation of a complex master key setup with several levels and sub-levels – perfect for access customisation. Effective master key system design reduces the number of keys they need to cut, track or replace. It saves hotel managers time and money. “It is a truly flexible solution and allows us to limit the quantity of keys assigned as much as possible,” says Carmelo Sava, Head of Maintenance at TH Resorts. Effective master key system design reduces the number of keys they need to cut, track or replace Five distinct master key systems – numbering more than 500 CYS10 cylinders in total – were implemented at TH Capo Rizzuto, one for each of the resort’s individual facilities. Each cylinder has its own paired key and, for each building, a master key opens all cylinders. The entire property is controlled by a single grand master key entrusted to management. Future-proof setup at Capo Rizzuto “The ASSA ABLOY master key system allows us to manage the access of all our staff without any security problems,” adds Carmelo Sava. To ensure future-proof setup at Capo Rizzuto, their key systems can adapt or expand at any time: The CYS10 device range includes single, double, thumbturn, screw-in and rim cylinders for interior and exterior doors, switch cylinders for control panels, plus cam locks for letterboxes or furniture. The CYS10 padlock secures gates, lockers, and more.
“BCD’s solution perfectly fit our scenario. All I needed to hear was ‘we have storage and scalability for the future’. As Suffolk is growing fast and is very land rich, we’re predicting a lot of growth and definitely need scalability,” Tim Forbes, Physical Security Administrator, City of Suffolk, Virginia. Customer overview When a mass shooting in which 12 people died occurred at a municipal building in Virginia Beach in 2019, it served as a wake-up call for nearby Suffolk, a city of around 95,000 people and the largest city in land area in the state of Virginia. As a result, a "crime prevention through environmental design" (CPTED) committee was immediately formed. One of the committee’s key recommendations was to hire a physical security administrator to act as a single point of contact for all security issues. In addition to being tasked with being liaison with Suffolk police, public safety and city leadership, the administrator would be responsible for overseeing security technology, including access control, alarming and cameras. These systems had been installed when the towers went up but were left fully unmanaged After a hire was made, a needs assessment was conducted which quickly determined that the existing security technology infrastructure was poorly functioning or, in some cases, not functioning at all. Many of these systems had been installed when the buildings went up but have been left completely unmanaged since. The number one priority became to construct a security “foundation” at the data centre in Suffolk City Hall. In terms of a video management system, a new backbone was needed to ensure the ability to view all cameras from this central location. The approach Suffolk determined it needed an integration partner that could provide unified technologies and common knowledge around its security parameters. It initiated an RFP process to which it considered four responses. Based upon credentials, years of experience, and other qualifications (including expertise in ticketing and records management), the city selected Integrated Security and Communications (ISC). ISC had, in turn, been partnering with BCD for IP video data infrastructure solutions for several years. In particular, they had jointly worked on several server environment deployments using the company’s high availability, purpose-built appliances and trusted BCD to be the right partner for the city of Suffolk. After extensive evaluation of site requirements and recommendations provided by BCD, the REVOLV Hybrid Hyperconverged Infrastructure (hHCI), DEEPSTOR Lite was determined by all parties to be the optimal solution. The solution Video must be captured and stored at the set frame rate and key, to be admissible in legal proceedings Most video management systems can achieve the video retention requirements and anticipated camera counts for a given application. Yet, each application has city, state and federal requirements that govern the amount of time the video must be retained, the required frame rate, and the required quality of video. Video must be captured and stored at the specified frame rate and resolution, to be admissible in legal proceedings. With a traditional bare metal implementation of a video management system, the archiver or recorder is a physical server. If that server experiences diffculties, or goes offline for an extended period, not only do the cameras stop recording, but the municipality also loses access to all the archived footage on that archiver. The city of Suffolk could not afford to experience a loss of recording, or not have access to the archived footage. The REVOLV DEEPSTOR Lite solution addressed these needs and ensured that cameras were always recording, and the customer always had access to its archived video. DEEPSTOR Lite is ideal for customers new to virtualised environments, providing a scalable solution that can support roughly 1,500 Mbps during a failed node scenario and up to 2,000 Mbps when all nodes are online. REVOLV is a hybrid HCI solution that leverages VMWare technologies to create a cluster of resources and virtualise the archivers to operate within that cluster. The server resources reside within a vSAN implementation on the cluster that acts as a shared resource pool for the servers. In the event of a node failure, the virtual machines that reside on that node will redistribute (vMotion) to the remaining nodes and continue operation. The process REVOLV provides high availability, regardless of the capabilities of the VMS, or access control software The process occurs completely unattended, and in the case of the city of Suffolk, ensured that it would never lose recorded video or be unable to record resources. REVOLV provides high availability, regardless of the capabilities of the VMS, or access control software. Suffolk’s REVOLV installation also utilised powerful GPUs. These GPUs enabled BCD to shift processing power off the appliance CPU, for a smoother display of live and recorded video and the ability to display more HD cameras at the command centre. “We got it all virtualised and it’s down to less than a quarter of a rack between servers, storage and all the networking that was required for it. Now Suffolk is in a high availability, high resiliency environment that eliminates all the pain points it had with five and seven-year-old servers,” Jim Cooper, Vice President of Technology, Integrated Security and Communications (ISC). Implementation The REVOLV system for Suffolk, including the vSAN cluster and all virtual machines, was built and pre-staged in the engineering lab at BCD’s facility in Fresno, CA. Once tested, it was shipped to the Suffolk city hall. BCD’s professional services team made an onsite visit to complete the installation with ISC. By pre-staging, BCD can ensure that the solution is ready for deployment, thus reducing the time spent on-site. Cut-over configuration and stand-up of the new environment were completed in a couple weeks’ time. Thanks to BCD’s expertise and the REVOLV solution, the city of Suffolk now has over 25 site managers and department directors who have a purpose-built, high-availability system that delivers video at their site and at multiple sites in their organisations for years to come. Says Tim Forbes, Physical Security Administrator for the city, “BCD and ISC have been great partners for us. I am 100% happy with everything.” And the scalability that the platform provides? It will be needed sooner rather than later. Three new large sites and three new small sites are already on tap to be integrated into the system.
RGB Spectrum® announced a new deployment at Red Hawk Casino, a premier destination for entertainment, dining, and gaming located just north of Sacramento. The casino has recently elevated its sports bar experience with a captivating new entertainment system. Galileo video wall processor RGB Spectrum's Galileo video wall processor was the natural choice for the project due to its versatility, support for diverse digital and IP-based signal sources, display layout flexibility, exceptional 4K image quality, and straightforward installation process. The processor seamlessly integrates with the casino's existing setup and offers many benefits that enhance the viewing experience. Video processing performance The Galileo processor powers a colossal 27.8-foot by 8.9-foot video wall, composed of Planar's brilliant TVF1.8 LED Cal Coast Telecom, an audio-visual design and installation integrator based in San Jose, California, selected RGB Spectrum's state-of-the-art Galileo video wall processor to power the casino's new video wall, resulting in an outstanding visual experience for casino patrons. The Galileo processor powers a colossal 27.8-foot by 8.9-foot video wall, composed of Planar's brilliant TVF1.8 LED displays, boasting an impressive resolution of 4480 x 1440. This cutting-edge processor delivers top-tier video processing performance, ensuring a captivating, real-time viewing experience with stunning 4K image quality. Display 44 images simultaneously With this solution, the bar offers an array of sports events and highlights that keep patrons engaged and entertained. From professional to collegiate and amateur sports, the video wall showcases football, baseball, basketball, hockey, horse racing, and much more worldwide. David Hallmark, Audio Video Engineering Manager for Cal Coast Telecom, expressed his enthusiasm for the Galileo processor, stating, "One of the key benefits of RGB Spectrum's Galileo processor is its remarkable ability to display 44 images simultaneously with the flexibility to resize and re-position the images." Customisable layouts Operators can swiftly switch and route input sources, choose from customisable, pre-set display layouts, and resize and reposition display windows using the processor's intuitive, built-in GUI. The Galileo processor supports all types of video walls, offering features such as image overlap for projector-based video walls, custom timings to accommodate LED wall resolutions, and bezel compensation for optimal viewing on LCD video walls.
Jesolo is a popular holiday resort on the Italian Adriatic coast. To ensure security for locals and tourists on the busy beach and in public places, Panomera® multifocal sensor cameras from Dallmeier are in use. Five million tourists a year Jesolo is a town of about 26,000 inhabitants and more than five million tourists a year. The large increase in the number of visitors during the summer months requires a great deal of organisation from all parties involved, also regarding the safety and security of residents and tourists. Jesolo is located on the Italian Adriatic coast in the Veneto region. The resort is popular with tourists for its 15 kilometres of golden sandy beach, which has been awarded the Blue Flag, and for the many entertainment facilities on offer: events, theme parks, sports activities, shops, restaurants, and discos. In summer, Jesolo’s nightlife pulsates, and unfortunately, the risk of accidents and crime increases. Video technology for public security The challenge has been to monitor large public areas with as few cameras as possible The city has made considerable efforts in recent years to improve its security infrastructure to create a safe environment for its residents and visitors–and video technology is an important aspect of this. The challenge has been to monitor large public areas with as few cameras as possible, while maintaining high standards of image quality and ease of use. Conventional standard cameras could not meet these requirements–the image quality was simply not good enough. The security managers therefore decided to look for a new solution and found it in the Panomera® multifocal sensor cameras from German manufacturer Dallmeier. Fewer cameras, higher quality Panomera®’s patented camera technology has a number of features that make it unique in the industry. Multiple modules resp. sensors of different focal lengths are combined into a single system. Each module can be individually focused to capture a specific area of the overall image. As a result, multifocal sensor technology enables the simultaneous monitoring of large areas with high detail and exceptionally high resolution. In this way, Panomera® achieves an overall resolution over the object space that far exceeds that of conventional single-sensor cameras. Any number of “virtual” PTZs If an incident does occur, recorded video footage can be used to solve crimes and as evidence in court Another advantage is that unlike PTZ cameras, which are limited to a specific area, the Panomera® camera provides a comprehensive and detailed image of the entire surveillance zone–no matter where the security operator is focusing, there are theoretically any number of PTZ systems virtually available. For the operator in live mode, as well as for the forensic expert in recording mode. Multifocal sensor technology provides an optimal overview of the entire event and enables comprehensive monitoring in real time. This allows security personnel to respond quickly to potential threats. If an incident does occur, the recorded video footage can be used to solve crimes and as evidence in court. A safe environment Dallmeier video technology has been used in Jesolo since 2019. The city’s security managers were so satisfied with the system’s performance that they decided to extend it a few years later. Now, Panomera® cameras keep an eye on the main squares, streets, and sections of the beach. The Panomera® cameras make a significant contribution to improving public safety “The Panomera® cameras make a significant contribution to improving public safety. Especially during the night hours, inappropriate behaviour, and crimes such as vandalism or violence can occur. Thanks to video surveillance, suspicious activities can be quickly detected, and appropriate measures can be taken to prevent crimes or identify the perpetrators,” says Daniele Sisinio, Director Dallmeier Italia. Preventive measure And of course, video surveillance also serves as a preventive measure: the presence of cameras deters potential criminals and creates a safer environment. “Panomera® offers a unique combination of high resolution, optimal overview and intuitive operation,” explains Claudio Vanin, Local Police Commander. “The level of detail is simply amazing! And even in difficult conditions, like here near the sea, the cameras are robust and durable.” Data protection: “Privacy & Security by Design” Dallmeier video surveillance systems fulfil all the criteria that are decisive for providing evidence Video security systems must comply with country-specific and other supra-regional data protection regulations, such as the European General Data Protection Regulation (GDPR). Secure data management was therefore essential for the City of Jesolo. “Our products and solutions have the highest level of technical precautions that make it easy for the customer to implement a video security solution that complies with data protection regulations,” explains Daniele Sisinio. In accordance with the “Privacy & Security by Design” guideline, Dallmeier offers comprehensive options for data protection and data security settings on the product side–from setting up “private zones” to sophisticated access concepts and secure authentication procedures according to IEEE 802.1X. In addition, Dallmeier video surveillance systems fulfil all the criteria that are decisive for providing evidence in court. Image quality, security against tampering and protection against unauthorised access meet the LGC Forensics certification. Fit for the future The video system remains flexible, scalable, and expandable. Thanks to state-of-the-art technology, it can be easily adapted to changing requirements. Additional cameras can be easily integrated, and upgrades are seamless. The video system remains a reliable and effective surveillance solution for the future.
Alarming increases in vehicle thefts, unsolved traffic collisions, and stolen cargo in the Mexican State of Tlaxcala, motivated the Executive Commission of the State Public Security System (CESESP) to expand and upgrade its video security system. To counter the rise in crime, the CESESP sought a flexible, scalable, open-platform video management system (VMS) that could seamlessly incorporate existing cameras as well as over 800 new cameras and edge devices from a range of hardware and software providers. Tlaxcala Located in East-Central Mexico, Tlaxcala is one of 32 states within the Federal Entities of Mexico. With a population of approximately 1,343,000, based on the 2020 census, Tlaxcala is the smallest yet one of the most densely populated states in Mexico. The CESESP of Tlaxcala is tasked with safeguarding residents across the state's 60 municipalities. C4 centre C4 centre has multiple teams of six security professionals who monitor the system around the clock At the core of all security operations, including the 911 emergency response and 089 confidential tip line, is the CESESP's Control, Command, Communications, and Computing centre (C4). The state’s C4 centre has multiple teams of six security professionals who monitor the system around the clock on a large, 24-screen video wall. The C4 also houses the system’s HP and Lenovo servers. Flexibility, scalability, and budget “Flexibility, scalability, and strictly adhering to the budget were top requirements for this critical, state-wide project,” said Maximino Hernández Pulido, Executive Commissioner of the State Public Security System. “We considered a variety of proposals and providers, but we ultimately followed the advice of our integrator, Digital Information Systems, and selected XProtect Corporate from Milestone Systems.” XProtect Corporate The new system includes cameras from Hanwha Vision, Bosch Security and Safety Systems, Hikvision, and Pelco The new system includes cameras from Hanwha Vision, Bosch Security and Safety Systems, Hikvision, and Pelco, all integrated within the system and managed by XProtect Corporate VMS from Milestone Systems. The system is also fully integrated with the BriefCam Video Analytics Platform, delivering video intelligence for system managers to identify, monitor, investigate, and visualise incidents plus video data to make smarter decisions. Efficient and cost-effective integration “Because state officials rely on their video system 24/7, the update needed to be gradual with no downtime. As new cameras were integrated into the Milestone platform, the previous system slowly disappeared,” said Isaac Sánchez Morales, an engineer at Digital Information Systems (SDI), an integrating company. “The XProtect Corporate open platform VMS allowed us to leverage our existing cameras and servers, integrate new equipment and devices, making the process very efficient and cost-effective, and we never had a gap in service.” Data-driven video for fast response times BriefCam video analytics technology The solution detects, identifies, and classifies video metadata to drive more efficient investigations The BriefCam video analytics technology seamlessly integrates into Milestone’s XProtect Smart Client. The solution detects, identifies, and classifies video metadata to drive more efficient investigations and business decisions, such as finding missing persons, investigating the vandalism, theft, assaults, accidents, injuries, or acts of violence, as well as extracting and analysing through heatmaps, dashboards, and visualisations. The analytics have proven beneficial in accelerating investigations, attaining situational awareness, and optimising operational intelligence for enhanced video search, alerting, and data visualisation. Real-time alerts, situational awareness “We installed the BriefCam Insights and Investigator products, and regularly use the platform’s RESPOND and RESEARCH capabilities. One of the advantages of all these XProtect-integrated analytics is that operators do not have to open additional windows or enter new credentials to access them,” said Sánchez. “With this integration of technologies, operators can trigger real-time alerts based on complex object classifications and filter combinations to increase situational awareness meaning authorities can react to events as they unfold.” Proactive policing with LPR With the BriefCam RESPOND solution, object characteristics and licence plate recognition tools can be used" Sánchez added, "With the BriefCam RESPOND solution, object characteristics such as a vehicle, person, or animal, and licence plate recognition tools can be used to trigger rule-based alerts." "These tools can help overcome the challenges of urban video surveillance and drive proactive policing in Tlaxcala." Video technologies reduce state crime rates Following the comprehensive expansion of the security infrastructure, statistics from the Executive Secretariat of the National Public Security Systems revealed Tlaxcala boasted the lowest crime rate nationwide. With the modernised system in place, officials documented a 93% reduction in pilfered freight from transport companies. Similarly, vehicle theft declined by 22.5%. A cost-efficient and flexible way Milestone Interconnect provides a cost-efficient and flexible way to gain central surveillance According to Sánchez and the SDI team, it is expected that each municipality within the territory will soon have its own locally focused VMS. With the use of Milestone Interconnect, all the municipality subsystems will integrate directly with the state-wide platform. Milestone Interconnect provides a cost-efficient and flexible way to gain central surveillance of multiple sites spread across a region. C4 video surveillance operation “The integrated solution delivered through Milestone is a robust, efficient, and secure system that provides all the necessary tools for the C4 video surveillance operation,” added Executive Commissioner Hernández-Pulido. “In addition, the excellent technical and post-sales support from Milestone and SDI has led us to meet the system and performance goals we set for ourselves.”
Like most stadiums worldwide, the Alsancak Mustafa Denizli Stadium suffers from vandalism and riots by individual fans. To be able to better identify and track perpetrators and thus reduce financial and non-material damage, the operator opted for a video security solution from the German manufacturer Dallmeier. The Alsancak Mustafa DenizIi Stadium in Izmir–named after former Turkish football player and current football coach Mustafa Denizli–is a multipurpose stadium that mainly hosts football matches. With over 15,000 seats, it is one of the medium-sized stadiums in Türkiye. Originally built in 1929, it was demolished in 2015 and reopened after reconstruction in November 2021. Up to 15% fewer spectators due to riots Outcomes have been painful, ranging from classic fines to the closure of an entire block of viewers In Türkiye, stadiums are usually owned by the Ministry of Sport, which then grants the rights of use to an operator. In the case of the Alsancak stadium, the operator is “Altay Izmir”, an Izmir-based football club that currently plays in Türkiye’s top professional league. The club, like so many other football stadiums, has had its fair share of repeated incidents and threats to spectators and players. These have included verbal abuse and even the throwing of objects onto the pitch. In addition to the intangible damage to the image, the consequences have been painful, ranging from traditional fines to the closure of an entire block of spectators–a loss of 1,000 to 2,000 spectators per home game, and that on a regular basis. How is image quality defined to recognise perpetrators? Under these conditions, the operators were looking for a solution that would allow them to reliably detect and track potential offenders. The tender specified a minimum resolution density of 144 pixels per metre (px/m), which is also required by law. This means that there must be at least 144 pixels in the camera image to represent every metre of “reality” in the stands. This value is between the “recognition” (125 px/m) and “identification” (250 px/m) qualities specified in the IEC EN 62676-4 standard for video surveillance systems. Only ten cameras to monitor the stands The Ministry of Sports decided to invite various manufacturers to a comparative test To find the most suitable solution for the Alsancak Stadium, the Ministry of Sports decided to invite various manufacturers to a comparative test. After receiving the proofs of concept (PoCs) of several companies, the owner chose a solution from the German manufacturer Dallmeier Electronic. In addition to around 140 single-sensor cameras for corridors, outdoor areas and entrances, only ten “Panomera®” multifocal sensor systems are required for the particularly critical grandstand surveillance. 39% more resolution than required The low number of camera systems required for grandstand surveillance is due to the patented multifocal sensor technology: Panomera® cameras combine the images from up to seven detail sensors and one overview sensor in a single camera system. This provides the user with a high-resolution overview of the entire area to be monitored, which acts as a single image of a vast environment. Within this overall picture, system operators can now open any number of detail views at the same time, while the overall scene is always available in high resolution–even during recording, which is essential for possible prosecution. This provides an optimal overview of the situation and ensures that all events can be followed in real-time, in high resolution and in detail. Thanks to this technology, a minimum of 200 px/m is now available throughout the Alsancak stadium instead of the required 144 px/m – 39 percent more than originally required. No surprises: Remote “FAT” and training from Dallmeier Türkiye Due to the COVID-19 pandemic, the stadium's technicians were unable to travel to Dallmeier's headquarters in Regensburg, Germany, to commission the system and attend classroom training. For this reason, the so-called Dallmeier Factory Acceptance Test (FAT) took place online. The entire system was set up, configured and remotely accepted in the FAT centre in Regensburg. The training of the technicians and operators was carried out by Dallmeier Türkiye experts on-site The training of the technicians and operators was carried out by Dallmeier Türkiye experts on site. Serkan Atalar, CEO of RESA Construction Electromechanical Inc. Co, the installer company that implemented the project, is very pleased: “Dallmeier's sincere and collaborative approach, as well as the high-tech products and after-sale support they offered were very impressive. We thank Dallmeier Türkiye for the great cooperation.” Author's quote “The customer is very satisfied with the Panomera® systems. The benefits are equivalent to combining a powerful megapixel camera with any number of high-resolution 'virtual' PTZ cameras. At the same time, the systems reduce the total cost of ownership for infrastructure, cables, masts, screens, workstations, etc.,” Serkan Atalar summarises. “Alsancak Stadium only needs three system operators with one monitor each. They also have two workstations for the police and management. The solution always gives them 100% control of the security situation in the stadium, allowing them to react immediately and reliably track down perpetrators. And all this at a low total cost of ownership and with minimal manpower thanks to the unique multifocal sensor technology.”
Round table discussion
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Driving the smart homes market is the convenience of simple technology solutions. Almost every home now has a “smart speaker” that makes it easier than ever for homeowners to interface and control their technology. But where does security fit into the new landscape of smart home systems? We asked this week’s Expert Panel Roundtable: What’s new in smart homes and residential security systems?
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
DownloadSelecting the right network video recorder (NVR) for any vertical market
Download