Beach security
LOOKOUT, a pioneering provider of marine AI systems for safety, announced the expansion of its product line by introducing a new camera featuring an integrated navigation light. This new camera system offers enhanced safety and greater installation flexibility and is available in LOOKOUT's classic blue and white, matte black with carbon accents and custom colours by request, to complement a wider range of vessel designs. Advanced AI vision cameras LOOKOUT has solved a common installation dile...
Magenta Security Services, one of the UK’s pioneer security firms, has achieved an exceptional score of 87.5% in its most recent SIA Approved Contractor Scheme (ACS) audit - placing the company firmly within the top 5% of security companies nationwide. With only the top 10% of security firms scoring above 75%, Magenta’s remarkable result reflects the company’s consistent dedication to quality, compliance, and operational excellence across every area of its business. Exceeding...
Smiths Detection, a global pioneer in threat detection and security screening and a business of Smiths Group, has announced a new partnership with NeuralGuard to advance AI-driven threat detection in security screening. NeuralGuard’s AI technology is undergoing integration and certification for use with Smiths Detection’s HI SCAN 6040 2-is. This collaboration was undertaken as part of Smiths Detection’s Ada Initiative, the company’s structured framework for accelerating...
Sielox LLC President and CEO Karen Evans announced its annual Certified Sielox Integrators Award recipients for 2024. For the 30th time overall, MCM Integrated Systems of Van Nuys, California, was awarded National Certified Sielox Integrator of the Year. Sielox access control software “MCM Integrated has a remarkable 26 consecutive years of commitment to Sielox access control software and controllers,” said Evans. “Rich McMillan and his team define what experts are when it...
iDenfy, a global pioneer in identity verification and fraud prevention, announced a new partnership with Coast, an innovative blockchain platform simplifying crypto-to-fiat transactions on PulseChain. This partnership will focus on enhancing security and streamlining KYC/AML compliance processes while boosting the platform’s security and addressing critical challenges in the blockchain ecosystem. Securing decentralised finance This partnership represents a crucial step forward, equippin...
Data isn’t just the driver for project planning and design. The Eplan Data Portal offers users access to high-quality product catalogues from a continually growing pool of renowned component manufacturers. The portal has now passed the mark of more than two-million sets of static device data from around five hundred manufacturers! By using integrated configurators, users have far more than four million data sets at their fingertips. It’s a nearly limitless and ever-incr...
News
The Security Industry Association (SIA) has named new members and leadership of the steering committee for SIA RISE, a community that fosters the careers of young professionals and emerging pioneers in the security industry. Dakota Mackie of Northland Controls serves as chair, with Kelly Ann Christensen of BCD now serving as vice chair. In these roles, Mackie and Christensen ensure that RISE delivers educational content and networking opportunities to young professional employees and rising stars at SIA member companies, college students and recent graduates interested in the global security industry. Prior roles of Mackie Mackie joined Northland Controls in 2020 as the content marketing specialist Dakota Mackie is the business development manager at Northland Controls. Prior to joining the security industry, she worked as a client services coordinator at the Washington Commanders (then the Washington Redskins) before beginning a role with a military nonprofit, Luke’s Wings, where she ultimately ended her tenure as the executive director. Mackie joined Northland Controls in 2020 as the content marketing specialist, and in her current role, she is responsible for supporting the entire sales cycle with a focus on the growth of Northland’s managed services offering. Mackie has been honoured as a SIA Women in Security Forum Power 100 honouree and is a graduate of the University of South Carolina. Outside of work, she has a passion for travelling the world and learning about new cultures. Prior roles of Ann Christensen Kelly Ann Christensen is a digital marketing specialist at BCD, an IP video data infrastructure manufacturer, and has spent nearly five years specialising in the security industry. With a focus on digital advertising and marketing analytics, she has certifications in ROI marketing, marketing management, SEO and PPC marketing. Prior to becoming RISE vice chair, she served as head of the RISE Scholarship subcommittee, which provides scholarships to young professionals in the security industry to assist with furthering education, attending industry events, obtaining new certifications and furthering their professional development, and was awarded the SIA RISE Scholarship in 2022 and one of SIA’s 2024 Sandy Jones Volunteers of the Year. Christensen has also participated in SIA’s Talent Inclusion Mentorship Education (TIME) program, which is designed to promote diversity, equity, inclusion and empowerment of underrepresented identities in the security industry by creating a well-defined pathway for learning and development. SIA RISE Steering Committee The SIA RISE Steering Committee now includes the following members: Chair: Dakota Mackie, business development manager, Northland Controls (Term ends 2025) Vice Chair: Kelly Ann Christensen, marketing manager, BCD (Term ends 2027) AcceleRISE Subcommittee Chair: Erin Grippo, senior manager, product operations, Brivo (Term ends 2025) Content Subcommittee Chair: Tanner LaRocque, marketing director, Evolon (Term ends 2026) Scholarship Subcommittee Chair: Kristin Shockley, manager, segment marketing, Genetec (Term ends 2026) Diversity, Equity & Inclusion Subcommittee Chair: Tristin Vaccaro, owner, Vaccaro Copywriting & Marketing Solutions (Term ends 2025) Jonah Azarcon, deputy project pioneer, M.C. Dean (Term ends 2027) Krystina Beach, marketing communications manager, ASSA ABLOY (Term ends 2027) Andres Capous, regional sales manager, Velasea (Term ends 2027) Joey Joy, distribution channel account manager, March Networks (Term ends 2027) Ryan Knoll, business relations manager, Pro-Tec Design (Term ends 2027) Tim Loth, sales engineer team lead, i-PRO (Term ends 2026) Jackie Paryz, director, sales, technology solutions, Securitas (Term ends 2027) Itzel Portillo, marketing specialist, Allegion (Term ends 2027) Amanda Powell, marketing manager, Boon Edam (Term ends 2025) Nicole Rigby, team lead, distribution operations, Axis Communications (Term ends 2026) Keyser Santana, global security strategist and business execution senior manager, Pratt & Whitney (Term ends 2025) Constantine Tremouliaris, integrated solutions specialist, ASSA ABLOY (Term ends 2025) KeShia Thomas, brand and solutions manager, Allegion (Term ends 2027) Mfon Ubaha, business development manager, i-PRO (Term ends 2027) Sarah Webel, human resources generalist, SAGE Integration (Term ends 2027) Lauren Yonis, global events manager, acre (Term ends 2027) New RISE committee members “SIA RISE is a vibrant community of accomplished young security pioneers and driven industry newcomers that offers a robust array of opportunities for learning, professional development, engagement and relationship building in our industry. This community and its meaningful initiatives would not be possible without our dedicated, talented volunteers, like RISE chair Dakota Mackie, new vice chair Kelly Ann Christensen and our subcommittee chairs, Erin Grippo, Tanner LaRocque, Kristin Shockley and Tristin Vaccaro,” said SIA CEO Don Erickson. “We welcome our new RISE committee members, and we thank outgoing committee members and past RISE chairs Jake Brown and Matt Feenan for their leadership and support over the years. We look forward to working together with the 2025 RISE committee to further advance the reach and impact of RISE and its programs and propel the security workforce of the future.” RISE Awards and annual AcceleRISE conference SIA RISE is a community that fosters the careers of young professionals in the security industry. SIA RISE’s offerings include an annual scholarship to further young talent’s education and career goals, fun in-person and virtual networking events for young professionals, the TIME program for early and mid-career professionals, recognition of new and emerging industry pioneers through the 25 on the RISE Awards and the annual AcceleRISE conference – an essential experience for young security talent. The SIA RISE community is open to all employees at SIA member companies who are young professionals under 40 or have been in the security industry for less than two years.
Playhouse Square is a jewel of Northeast Ohio. Thousands of people live, work, and visit the area. “We want to make sure whoever the resident is, whoever the visitor is, they’re having the same great experience day in and day out,” said Nathan Kelly, President of Playhouse Square Real Estate. ROSA Safety is part of that experience. Last October, ROSA, a remote observation security agent, moved into Public Square. Equipped with AI technology, ROSA never blinks and can issue verbal warnings to deter criminal activity in real time. Now, the high-tech cameras are expanding to Playhouse Square. “The new cameras will be mounted to be able to look at all areas around Playhouse District more discreetly,” added Kelly. Real-Time Crime Center The combination of high-tech cameras, as well as dedicated police officers assigned to Public Square Developed by Robotic Assistance Devices (RAD), these cameras are linked to Cleveland’s Real-Time Crime Center, but they are also monitored by Downtown Cleveland Inc. ambassadors in their headquarters from 7 a.m. until midnight. Ed Eckart, Senior Vice President of Operations at Downtown Cleveland Inc., said that the combination of high-tech cameras, as well as other security measures like dedicated police officers assigned to Public Square, has led to a significantly improved environment. Drop in crime rates “Both the statistics bear that out but also the feedback we’re getting from residents, visitors, property owners, they have shared with us that the environment here is noticeably better, ” added Eckart. While specific crime statistics for Public Square are not available, Eckart said there is a 12% decrease in serious crimes in the area and a 34% drop in crimes like car break-ins in the surrounding neighbourhoods. Smart camera network “Our goal is to have a network of these smart cameras throughout all of downtown,” he says. By spring, there are expected to be a dozen cameras operating, all of which will be monitored from the Downtown Cleveland Inc. headquarters. Two extra cameras will be placed in Public Square and four at North Coast Harbor.
Sentrycs, a technology pioneer in the Counter-Unmanned Aerial Systems (C-UAS) industry, announced its continued progress globally within the public safety market. The company recently closed agreements with two new law enforcement organisations, including one in North America. These new agreements will deliver core protocol manipulation sensor solutions across a wide variety of scenarios, from fixed sites to vehicle-mounted (mobile) operations. Drone sightings The company has seen a noticeable spike in C-UAS interest heading into 2025 The deals mark another significant milestone for the company, which has seen its business quadruple, year over year, along with continued adoption of its pioneering technology which is now deployed across sensitive facilities and strategic assets worldwide. The company has seen a noticeable spike in C-UAS interest heading into 2025, especially as, in recent weeks, concerns have grown over unexplained drone sightings throughout several East Coast states in the US. These sightings have prompted calls from both officials and citizens for swift action to identify and mitigate these mysterious flights. Risks to public safety Unregulated or malicious drone activity poses significant risks to public safety and critical infrastructure, ranging from unauthorised surveillance and smuggling to potential terrorist threats where commercially available drones can quickly and inexpensively be weaponized. Addressing these challenges requires sophisticated solutions capable of countering such threats effectively while ensuring no interference with other communication systems that rely on the same frequency bands as the drones themselves. Sentrycs' solution Sentrycs' passively detects, identifies and tracks drones, significantly reducing the possibility of false detections Sentrycs' solution is one of the few available technologies that address these challenges head-on, offering reliable and field-proven capability designed to safeguard public safety with no collateral damage. Leveraging proprietary technology, Sentrycs' passively detects, identifies and tracks drones, significantly reducing the possibility of false detections, a constant challenge encountered with other technologies. Need for kinetic engagements The platform also allows the operator to mitigate (or neutralise) the drone in seconds, directing it to a designated safe landing spot or returning the device to its original home location, avoiding the need for kinetic engagements that often cause collateral damage. "Recent events here in the US, specifically those in New Jersey really highlight the need to monitor unregulated drone activity, as it poses significant risks to public safety and critical infrastructure. Every single day our technology is supporting missions to monitor or mitigate illegal drone activity," said Jason Moore, Chief Revenue Officer at Sentrycs. Challenges of sophisticated solutions Moore added: "Our global footprint means we address a variety of threats from ISR (Intelligence, Surveillance, and Reconnaissance) to enable human trafficking and drug smuggling, to even improvised explosive devices being delivered by the drones themselves." "Addressing these challenges demands sophisticated solutions that counter such threats immediately and effectively without interfering with critical communication systems or causing collateral damage."
In a powerful show of solidarity, the U.S. security industry gathered for a crucial information-sharing webcast concerning recovery efforts for the Los Angeles-area wildfires disaster. Hosted by the Security Industry Association (SIA) and coordinated by Elite Interactive Solutions Marketing Director Scott Goldfine — with official endorsements from the Electronic Security Association (ESA), The Monitoring Association (TMA) and PSA Security Network (PSA) Collaborating for wildfire recovery The presentation featured security, law enforcement, local government and construction leaders discussing the current situation, recovery plan, and critical safety and security needs and challenges. L.A. Wildfires Session is dedicated effort to foster a united public-private partnership in response to a historic disaster“L.A. Wildfires Info Session: Overview of Security’s Role in the Recovery & Rebuild” is not sponsored or related to monetary or promotional interests or gains. It is a dedicated effort to foster a united public-private partnership in response to a historic disaster and establish cooperation and best practices to deploy when other widescale tragedies occur. Participating in the discussion Michael Zatulov, President, Elite Interactive Solutions, and co-organizer of the Palisades Rebuild group; his and his family’s homes were destroyed in the fire. Keith Bushey, LAPD Commander (retired); Deputy Chief, San Bernardino County Sheriff’s Department; also served as U.S. Marine Corps Reserve Colonel. Randy Johnson, Managing Partner, RSJ & Associates Development Services; Adviser to Palisades recovery officer Steve Soboroff. Mitch Tavera, Palisades Rebuild member; ex-Police Chief (39 years with El Segundo, Calif., PD). Industry’s role in recovery The Pacific Palisades’ rebuilding process is expected to take many years and faces significant logistical hurdles, including debris removal, infrastructure repair, and obtaining necessary permits and resources. Through viewing this presentation, security channel professionals hear an impactful and personal assessment of the tragic and devasting wildfires upon the surrounding communities and learn of the opportunity for interested industry stakeholders to pursue a potential role in the recovery efforts. Focused solutions “Being successful is dependent on the unity of the community. They must be informed on how the different facets of the electronic security world can help, from the integration side to the remote guarding side to the traffic control side,” Zatulov said during the roundtable. “There are political challenges we need to rally the community to work through, and we need law enforcement support. The biggest challenge is to focus on one problem at a time. One solution is better than a bunch of questions.” Stronger together for security Central to overcoming this disaster and ensuring better tomorrows is expanding the co-operative public-private partnership between the security industry channel businesses and law enforcement. Thus, the panelists strongly advocate for a collaborative effort that also includes other government agencies and developers to streamline the rebuilding process and improve security.
ISS (Intelligent Security Systems), a pioneering provider of video intelligence and data awareness solutions, is excited to announce the appointment of Phil Jensen as its new Director of Sales for Under Vehicle Surveillance Systems (UVSS). Jensen brings a wealth of experience and expertise to ISS, particularly in government sales, technical security solutions, and growth-focused strategies. Prior to joining ISS, he held the position of Director of Government Business Development and Sales at Atmospheric Plasma Solutions, where he drove market expansion and fostered strategic partnerships in the government sector. Jensen leadership roles A 21-year U.S. Coast Guard veteran, Jensen is a proven pioneer with ample training in strategic operations Throughout his career, Jensen has held leadership roles at multiple organisations, including Advanced Detection Technology, SureID, Securewest International, and Lyon Workspace Products. A 21-year U.S. Coast Guard veteran, Jensen is a proven pioneer with extensive training in strategic operations. Alongside his military background, Phil holds a Master of Business Administration from Keller Graduate School of Management. His experience in delivering customer-focused solutions complements the ISS mission to revolutionise the market for AI-driven surveillance. Advanced security solutions "Joining ISS was an easy decision for me. The company’s commitment to innovation and delivering advanced security solutions will help us redefine the UVSS space across North America," said Jensen. "Phil’s expertise in key vertical markets, combined with his ability to foster customer success through innovative solutions, makes him an invaluable addition to the ISS team," said Matt Powell, Managing Director for North America at ISS. "His leadership will be instrumental in shaping the future of our Under Vehicle Surveillance Systems portfolio and driving our mission to provide cutting-edge security offerings." SecurOS® UVSS platform from ISS The UVSS provides critical insights to protect high-security venues, critical infrastructure The SecurOS® UVSS platform from ISS offers a compact, high-performance surveillance solution capable of scanning the undercarriage of vehicles to detect threats and other anomalies in as little as three seconds. Leveraging advanced analytics, including magnetic anomaly detection, 3D magnifying glass capabilities, and dewarping technology, the UVSS provides critical insights to protect high-security venues, critical infrastructure, and other sensitive locations. ISS’ dedicated mission A resident of Chesapeake, VA, and the father of two daughters, Jensen now joins ISS’ dedicated mission to provide impactful, AI-powered solutions for complex security challenges. His experience in establishing long-term government and industry partnerships will be critical in expanding the adoption of the award-winning UVSS technology throughout the security industry.
Allied Universal® today announced that Taylor Carr has joined its Technology Services business unit as senior vice president of operations. In this role, Carr will oversee operations and drive growth across all revenue segments of the business. Experienced industry leader Carr has more than 25 years of experience in the technology and security industriesCarr has more than 25 years of experience in the technology and security industries. Most recently he served as president for Vision Technologies, a national systems integrator specializing in security, audio-visual, wireless, networking, and structured cabling solutions. In his professional past, he held leadership and management positions at a wide range of national and global technology companies. Expertise driving excellence "We are pleased to welcome Taylor to Allied Universal’s Technology Services business unit," said Carey Boethel, president Allied Universal Technology Services. "With his extensive experience in technology and security, he brings a strong track record of leadership and operational excellence.” “His expertise will be instrumental in driving growth, enhancing service delivery and advancing our commitment to providing innovative security solutions to our clients." Industry affiliations Carr earned a bachelor’s degree in criminology and criminal justice from the University of Maryland and is a member of SIA (Security Industry Association) and ASIS International.
The Security Industry Association (SIA) has named new members and leadership of the steering committee for SIA RISE, a community that fosters the careers of young professionals and emerging pioneers in the security industry. Dakota Mackie of Northland Controls serves as chair, with Kelly Ann Christensen of BCD now serving as vice chair. In these roles, Mackie and Christensen ensure that RISE delivers educational content and networking opportunities to young professional employees and rising stars at SIA member companies, college students and recent graduates interested in the global security industry. Prior roles of Mackie Mackie joined Northland Controls in 2020 as the content marketing specialist Dakota Mackie is the business development manager at Northland Controls. Prior to joining the security industry, she worked as a client services coordinator at the Washington Commanders (then the Washington Redskins) before beginning a role with a military nonprofit, Luke’s Wings, where she ultimately ended her tenure as the executive director. Mackie joined Northland Controls in 2020 as the content marketing specialist, and in her current role, she is responsible for supporting the entire sales cycle with a focus on the growth of Northland’s managed services offering. Mackie has been honoured as a SIA Women in Security Forum Power 100 honouree and is a graduate of the University of South Carolina. Outside of work, she has a passion for travelling the world and learning about new cultures. Prior roles of Ann Christensen Kelly Ann Christensen is a digital marketing specialist at BCD, an IP video data infrastructure manufacturer, and has spent nearly five years specialising in the security industry. With a focus on digital advertising and marketing analytics, she has certifications in ROI marketing, marketing management, SEO and PPC marketing. Prior to becoming RISE vice chair, she served as head of the RISE Scholarship subcommittee, which provides scholarships to young professionals in the security industry to assist with furthering education, attending industry events, obtaining new certifications and furthering their professional development, and was awarded the SIA RISE Scholarship in 2022 and one of SIA’s 2024 Sandy Jones Volunteers of the Year. Christensen has also participated in SIA’s Talent Inclusion Mentorship Education (TIME) program, which is designed to promote diversity, equity, inclusion and empowerment of underrepresented identities in the security industry by creating a well-defined pathway for learning and development. SIA RISE Steering Committee The SIA RISE Steering Committee now includes the following members: Chair: Dakota Mackie, business development manager, Northland Controls (Term ends 2025) Vice Chair: Kelly Ann Christensen, marketing manager, BCD (Term ends 2027) AcceleRISE Subcommittee Chair: Erin Grippo, senior manager, product operations, Brivo (Term ends 2025) Content Subcommittee Chair: Tanner LaRocque, marketing director, Evolon (Term ends 2026) Scholarship Subcommittee Chair: Kristin Shockley, manager, segment marketing, Genetec (Term ends 2026) Diversity, Equity & Inclusion Subcommittee Chair: Tristin Vaccaro, owner, Vaccaro Copywriting & Marketing Solutions (Term ends 2025) Jonah Azarcon, deputy project pioneer, M.C. Dean (Term ends 2027) Krystina Beach, marketing communications manager, ASSA ABLOY (Term ends 2027) Andres Capous, regional sales manager, Velasea (Term ends 2027) Joey Joy, distribution channel account manager, March Networks (Term ends 2027) Ryan Knoll, business relations manager, Pro-Tec Design (Term ends 2027) Tim Loth, sales engineer team lead, i-PRO (Term ends 2026) Jackie Paryz, director, sales, technology solutions, Securitas (Term ends 2027) Itzel Portillo, marketing specialist, Allegion (Term ends 2027) Amanda Powell, marketing manager, Boon Edam (Term ends 2025) Nicole Rigby, team lead, distribution operations, Axis Communications (Term ends 2026) Keyser Santana, global security strategist and business execution senior manager, Pratt & Whitney (Term ends 2025) Constantine Tremouliaris, integrated solutions specialist, ASSA ABLOY (Term ends 2025) KeShia Thomas, brand and solutions manager, Allegion (Term ends 2027) Mfon Ubaha, business development manager, i-PRO (Term ends 2027) Sarah Webel, human resources generalist, SAGE Integration (Term ends 2027) Lauren Yonis, global events manager, acre (Term ends 2027) New RISE committee members “SIA RISE is a vibrant community of accomplished young security pioneers and driven industry newcomers that offers a robust array of opportunities for learning, professional development, engagement and relationship building in our industry. This community and its meaningful initiatives would not be possible without our dedicated, talented volunteers, like RISE chair Dakota Mackie, new vice chair Kelly Ann Christensen and our subcommittee chairs, Erin Grippo, Tanner LaRocque, Kristin Shockley and Tristin Vaccaro,” said SIA CEO Don Erickson. “We welcome our new RISE committee members, and we thank outgoing committee members and past RISE chairs Jake Brown and Matt Feenan for their leadership and support over the years. We look forward to working together with the 2025 RISE committee to further advance the reach and impact of RISE and its programs and propel the security workforce of the future.” RISE Awards and annual AcceleRISE conference SIA RISE is a community that fosters the careers of young professionals in the security industry. SIA RISE’s offerings include an annual scholarship to further young talent’s education and career goals, fun in-person and virtual networking events for young professionals, the TIME program for early and mid-career professionals, recognition of new and emerging industry pioneers through the 25 on the RISE Awards and the annual AcceleRISE conference – an essential experience for young security talent. The SIA RISE community is open to all employees at SIA member companies who are young professionals under 40 or have been in the security industry for less than two years.
Playhouse Square is a jewel of Northeast Ohio. Thousands of people live, work, and visit the area. “We want to make sure whoever the resident is, whoever the visitor is, they’re having the same great experience day in and day out,” said Nathan Kelly, President of Playhouse Square Real Estate. ROSA Safety is part of that experience. Last October, ROSA, a remote observation security agent, moved into Public Square. Equipped with AI technology, ROSA never blinks and can issue verbal warnings to deter criminal activity in real time. Now, the high-tech cameras are expanding to Playhouse Square. “The new cameras will be mounted to be able to look at all areas around Playhouse District more discreetly,” added Kelly. Real-Time Crime Center The combination of high-tech cameras, as well as dedicated police officers assigned to Public Square Developed by Robotic Assistance Devices (RAD), these cameras are linked to Cleveland’s Real-Time Crime Center, but they are also monitored by Downtown Cleveland Inc. ambassadors in their headquarters from 7 a.m. until midnight. Ed Eckart, Senior Vice President of Operations at Downtown Cleveland Inc., said that the combination of high-tech cameras, as well as other security measures like dedicated police officers assigned to Public Square, has led to a significantly improved environment. Drop in crime rates “Both the statistics bear that out but also the feedback we’re getting from residents, visitors, property owners, they have shared with us that the environment here is noticeably better, ” added Eckart. While specific crime statistics for Public Square are not available, Eckart said there is a 12% decrease in serious crimes in the area and a 34% drop in crimes like car break-ins in the surrounding neighbourhoods. Smart camera network “Our goal is to have a network of these smart cameras throughout all of downtown,” he says. By spring, there are expected to be a dozen cameras operating, all of which will be monitored from the Downtown Cleveland Inc. headquarters. Two extra cameras will be placed in Public Square and four at North Coast Harbor.
Sentrycs, a technology pioneer in the Counter-Unmanned Aerial Systems (C-UAS) industry, announced its continued progress globally within the public safety market. The company recently closed agreements with two new law enforcement organisations, including one in North America. These new agreements will deliver core protocol manipulation sensor solutions across a wide variety of scenarios, from fixed sites to vehicle-mounted (mobile) operations. Drone sightings The company has seen a noticeable spike in C-UAS interest heading into 2025 The deals mark another significant milestone for the company, which has seen its business quadruple, year over year, along with continued adoption of its pioneering technology which is now deployed across sensitive facilities and strategic assets worldwide. The company has seen a noticeable spike in C-UAS interest heading into 2025, especially as, in recent weeks, concerns have grown over unexplained drone sightings throughout several East Coast states in the US. These sightings have prompted calls from both officials and citizens for swift action to identify and mitigate these mysterious flights. Risks to public safety Unregulated or malicious drone activity poses significant risks to public safety and critical infrastructure, ranging from unauthorised surveillance and smuggling to potential terrorist threats where commercially available drones can quickly and inexpensively be weaponized. Addressing these challenges requires sophisticated solutions capable of countering such threats effectively while ensuring no interference with other communication systems that rely on the same frequency bands as the drones themselves. Sentrycs' solution Sentrycs' passively detects, identifies and tracks drones, significantly reducing the possibility of false detections Sentrycs' solution is one of the few available technologies that address these challenges head-on, offering reliable and field-proven capability designed to safeguard public safety with no collateral damage. Leveraging proprietary technology, Sentrycs' passively detects, identifies and tracks drones, significantly reducing the possibility of false detections, a constant challenge encountered with other technologies. Need for kinetic engagements The platform also allows the operator to mitigate (or neutralise) the drone in seconds, directing it to a designated safe landing spot or returning the device to its original home location, avoiding the need for kinetic engagements that often cause collateral damage. "Recent events here in the US, specifically those in New Jersey really highlight the need to monitor unregulated drone activity, as it poses significant risks to public safety and critical infrastructure. Every single day our technology is supporting missions to monitor or mitigate illegal drone activity," said Jason Moore, Chief Revenue Officer at Sentrycs. Challenges of sophisticated solutions Moore added: "Our global footprint means we address a variety of threats from ISR (Intelligence, Surveillance, and Reconnaissance) to enable human trafficking and drug smuggling, to even improvised explosive devices being delivered by the drones themselves." "Addressing these challenges demands sophisticated solutions that counter such threats immediately and effectively without interfering with critical communication systems or causing collateral damage."
In a powerful show of solidarity, the U.S. security industry gathered for a crucial information-sharing webcast concerning recovery efforts for the Los Angeles-area wildfires disaster. Hosted by the Security Industry Association (SIA) and coordinated by Elite Interactive Solutions Marketing Director Scott Goldfine — with official endorsements from the Electronic Security Association (ESA), The Monitoring Association (TMA) and PSA Security Network (PSA) Collaborating for wildfire recovery The presentation featured security, law enforcement, local government and construction leaders discussing the current situation, recovery plan, and critical safety and security needs and challenges. L.A. Wildfires Session is dedicated effort to foster a united public-private partnership in response to a historic disaster“L.A. Wildfires Info Session: Overview of Security’s Role in the Recovery & Rebuild” is not sponsored or related to monetary or promotional interests or gains. It is a dedicated effort to foster a united public-private partnership in response to a historic disaster and establish cooperation and best practices to deploy when other widescale tragedies occur. Participating in the discussion Michael Zatulov, President, Elite Interactive Solutions, and co-organizer of the Palisades Rebuild group; his and his family’s homes were destroyed in the fire. Keith Bushey, LAPD Commander (retired); Deputy Chief, San Bernardino County Sheriff’s Department; also served as U.S. Marine Corps Reserve Colonel. Randy Johnson, Managing Partner, RSJ & Associates Development Services; Adviser to Palisades recovery officer Steve Soboroff. Mitch Tavera, Palisades Rebuild member; ex-Police Chief (39 years with El Segundo, Calif., PD). Industry’s role in recovery The Pacific Palisades’ rebuilding process is expected to take many years and faces significant logistical hurdles, including debris removal, infrastructure repair, and obtaining necessary permits and resources. Through viewing this presentation, security channel professionals hear an impactful and personal assessment of the tragic and devasting wildfires upon the surrounding communities and learn of the opportunity for interested industry stakeholders to pursue a potential role in the recovery efforts. Focused solutions “Being successful is dependent on the unity of the community. They must be informed on how the different facets of the electronic security world can help, from the integration side to the remote guarding side to the traffic control side,” Zatulov said during the roundtable. “There are political challenges we need to rally the community to work through, and we need law enforcement support. The biggest challenge is to focus on one problem at a time. One solution is better than a bunch of questions.” Stronger together for security Central to overcoming this disaster and ensuring better tomorrows is expanding the co-operative public-private partnership between the security industry channel businesses and law enforcement. Thus, the panelists strongly advocate for a collaborative effort that also includes other government agencies and developers to streamline the rebuilding process and improve security.
ISS (Intelligent Security Systems), a pioneering provider of video intelligence and data awareness solutions, is excited to announce the appointment of Phil Jensen as its new Director of Sales for Under Vehicle Surveillance Systems (UVSS). Jensen brings a wealth of experience and expertise to ISS, particularly in government sales, technical security solutions, and growth-focused strategies. Prior to joining ISS, he held the position of Director of Government Business Development and Sales at Atmospheric Plasma Solutions, where he drove market expansion and fostered strategic partnerships in the government sector. Jensen leadership roles A 21-year U.S. Coast Guard veteran, Jensen is a proven pioneer with ample training in strategic operations Throughout his career, Jensen has held leadership roles at multiple organisations, including Advanced Detection Technology, SureID, Securewest International, and Lyon Workspace Products. A 21-year U.S. Coast Guard veteran, Jensen is a proven pioneer with extensive training in strategic operations. Alongside his military background, Phil holds a Master of Business Administration from Keller Graduate School of Management. His experience in delivering customer-focused solutions complements the ISS mission to revolutionise the market for AI-driven surveillance. Advanced security solutions "Joining ISS was an easy decision for me. The company’s commitment to innovation and delivering advanced security solutions will help us redefine the UVSS space across North America," said Jensen. "Phil’s expertise in key vertical markets, combined with his ability to foster customer success through innovative solutions, makes him an invaluable addition to the ISS team," said Matt Powell, Managing Director for North America at ISS. "His leadership will be instrumental in shaping the future of our Under Vehicle Surveillance Systems portfolio and driving our mission to provide cutting-edge security offerings." SecurOS® UVSS platform from ISS The UVSS provides critical insights to protect high-security venues, critical infrastructure The SecurOS® UVSS platform from ISS offers a compact, high-performance surveillance solution capable of scanning the undercarriage of vehicles to detect threats and other anomalies in as little as three seconds. Leveraging advanced analytics, including magnetic anomaly detection, 3D magnifying glass capabilities, and dewarping technology, the UVSS provides critical insights to protect high-security venues, critical infrastructure, and other sensitive locations. ISS’ dedicated mission A resident of Chesapeake, VA, and the father of two daughters, Jensen now joins ISS’ dedicated mission to provide impactful, AI-powered solutions for complex security challenges. His experience in establishing long-term government and industry partnerships will be critical in expanding the adoption of the award-winning UVSS technology throughout the security industry.
Allied Universal® today announced that Taylor Carr has joined its Technology Services business unit as senior vice president of operations. In this role, Carr will oversee operations and drive growth across all revenue segments of the business. Experienced industry leader Carr has more than 25 years of experience in the technology and security industriesCarr has more than 25 years of experience in the technology and security industries. Most recently he served as president for Vision Technologies, a national systems integrator specializing in security, audio-visual, wireless, networking, and structured cabling solutions. In his professional past, he held leadership and management positions at a wide range of national and global technology companies. Expertise driving excellence "We are pleased to welcome Taylor to Allied Universal’s Technology Services business unit," said Carey Boethel, president Allied Universal Technology Services. "With his extensive experience in technology and security, he brings a strong track record of leadership and operational excellence.” “His expertise will be instrumental in driving growth, enhancing service delivery and advancing our commitment to providing innovative security solutions to our clients." Industry affiliations Carr earned a bachelor’s degree in criminology and criminal justice from the University of Maryland and is a member of SIA (Security Industry Association) and ASIS International.


Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Global transportation networks are becoming increasingly interconnected, with digital systems playing a crucial role in ensuring the smooth operation of ports and supply chains. However, this reliance on technology can also create vulnerabilities, as demonstrated by the recent ransomware attack on Nagoya Port. As Japan's busiest shipping hub, the port's operations were brought to a standstill for two days, highlighting the potential for significant disruption to national economies and supply chains. Transportation sector The attack began with the port's legacy computer system, which handles shipping containers, being knocked offline. This forced the port to halt the handling of shipping containers that arrived at the terminal, effectively disrupting the flow of goods. The incident was a stark reminder of the risks associated with the convergence of information technology (IT) and operational technology (OT) in ports and other critical infrastructures. This is not an isolated incident, but part of a broader trend of escalating cyber threats targeting critical infrastructure. The transportation sector must respond by bolstering its defences, enhancing its cyber resilience, and proactively countering these threats. The safety and efficiency of our transportation infrastructure, and by extension our global economy, depend on it. Rising threat to port security and supply chains XIoT, from sensors on shipping containers to automatic cranes, are vital to trendy port functions OT, once isolated from networked systems, is now increasingly interconnected. This integration has expanded the attack surface for threat actors. A single breach in a port's OT systems can cause significant disruption, halting the movement of containers and impacting the flow of goods. This is not a hypothetical scenario, but a reality that has been demonstrated in recent cyberattacks on major ports. Adding another layer of complexity is the extended Internet of Things (XIoT), an umbrella term for all cyber-physical systems. XIoT devices, from sensors on shipping containers to automated cranes, are now integral to modern port operations. These devices are delivering safer, more efficient automated vehicles, facilitating geo-fencing for improved logistics, and providing vehicle health data for predictive maintenance. XIoT ecosystem However, the XIoT ecosystem also presents new cybersecurity risks. Each connected device is a potential entry point for cybercriminals, and the interconnected nature of these devices means that an attack on one, which can move laterally and can have a ripple effect throughout the system. The threat landscape is evolving, with cybercriminals becoming more sophisticated and their attacks more damaging with a business continuity focus. The growing interconnectivity between OT and XIoT in port operations and supply chains is also presenting these threat actors with a greater attack surface. Many older OT systems were never designed to be connected in this way and are unlikely to be equipped to deal with modern cyber threats. Furthermore, the increasing digitisation of ports and supply chains has led to a surge in the volume of data being generated and processed. This data, if not properly secured, can be a goldmine for cybercriminals. The potential for data breaches adds another dimension to the cybersecurity challenges facing the transportation sector. Role of cyber resilience in protecting service availability Cyber resilience refers to organisation's ability to prepare for, respond to, and recover from threats As the threats to port security and supply chains become increasingly complex, the concept of cyber resilience takes on a new level of importance. Cyber resilience refers to an organisation's ability to prepare for, respond to, and recover from cyber threats. It goes beyond traditional cybersecurity measures, focusing not just on preventing attacks, but also on minimising the impact of attacks that do occur and ensuring a quick recovery. In the context of port operations and supply chains, cyber resilience is crucial. The interconnected nature of these systems means that a cyberattack can have far-reaching effects, disrupting operations not just at the targeted port, but also at other ports and throughout the supply chain. A resilient system is one that can withstand such an attack and quickly restore normal operations. Port operations and supply chains The growing reliance on OT and the XIoT in port operations and supply chains presents unique challenges for cyber resilience. OT systems control physical processes and are often critical to safety and service availability. A breach in an OT system can have immediate and potentially catastrophic physical consequences. Similarly, XIoT devices are often embedded in critical infrastructure and can be difficult to patch or update, making them vulnerable to attacks. Building cyber resilience in these systems requires a multi-faceted approach. It involves implementing robust security measures, such as strong access controls and network segmentation, to prevent attacks. It also involves continuous monitoring and detection to identify and respond to threats as they occur. But perhaps most importantly, it involves planning and preparation for the inevitable breaches that will occur, ensuring that when they do, the impact is minimised, and normal operations can be quickly restored. Building resilience across port security and supply chains In the face of cyber threats, the transport sector must adopt a complete method of cybersecurity In the face of escalating cyber threats, the transportation sector must adopt a comprehensive approach to cybersecurity. This involves not just implementing robust security measures, but also fostering a culture of cybersecurity awareness and compliance throughout the organisation. A key component of a comprehensive cybersecurity strategy is strong access controls. This involves ensuring that only authorised individuals have access to sensitive data and systems. It also involves implementing multi-factor authentication and regularly reviewing and updating access permissions. Strong access controls can prevent unauthorised access to systems and data, reducing the risk of both internal and external threats. Network segmentation Network segmentation is another crucial measure. By dividing a network into separate segments, organisations can limit the spread of a cyberattack within their network. This can prevent an attack on one part of the network from affecting the entire system. Network segmentation also makes it easier to monitor and control the flow of data within the network, further enhancing security. Regular vulnerability assessments and patch management are also essential. Vulnerability assessments involve identifying and evaluating potential security weaknesses in the system, while patch management involves regularly updating and patching software to fix these vulnerabilities. These measures can help organisations stay ahead of cybercriminals and reduce the risk of exploitation. EU’s NIS2 Directive EU’s NIS2 Directive came into effect, and member states have until October 2024 to put it into law The transportation sector must also be prepared for greater legislative responsibility in the near future. The EU’s NIS2 Directive recently came into effect, and member states have until October 2024 to put it into law. The Directive aims to increase the overall level of cyber preparedness by mandating capabilities such as Computer Security Incident Response Teams (CSIRTs). Transport is among the sectors labelled as essential by the bill, meaning it will face a high level of scrutiny. Getting to grips with the complexities of XIoT and OT integration will be essential for organisations to achieve compliance and avoid fines. Global transportation infrastructure Finally, organisations must prepare for the inevitable breaches that will occur. This involves developing an incident response plan that outlines the steps to be taken in the event of a breach. It also involves regularly testing and updating this plan to ensure its effectiveness. A well-prepared organisation can respond quickly and effectively to a breach, minimising its impact and ensuring a quick recovery. In conclusion, mastering transportation cybersecurity requires a comprehensive, proactive approach. It involves implementing robust technical measures, fostering a culture of cybersecurity awareness, and preparing for the inevitable breaches that will occur. By taking these steps, organisations can enhance their cyber resilience, protect their critical operations, and ensure the security of our global transportation infrastructure.
Security beat
Fueled by mounting concerns about the cybersecurity vulnerability of U.S. ports, President Joe Biden has signed an Executive Order aimed at shoring up defences against cyberattacks. Cybersecurity initiative The cybersecurity initiative marks a significant shift in policy, empowering key agencies and outlining concrete actions to bolster defences. By empowering agencies, establishing clear standards, and fostering collaboration, the initiative aims to strengthen U.S. ports against the evolving threat of cyberattacks, safeguarding the nation's maritime economy and national security. Expanded authority for DHS The proactive approach aims to prevent incidents before they occur The Executive Order grants expanded authority to the Department of Homeland Security (DHS) and the Coast Guard to address maritime cyber threats. DHS gains the power to directly tackle these challenges, while the Coast Guard receives specific tools. The Coast Guard can compel vessels and waterfront facilities to address cyber vulnerabilities that endanger safety. The proactive approach aims to prevent incidents before they occur. Real-time information sharing Reporting any cyber threats or incidents targeting ports and harbors becomes mandatory. This real-time information sharing allows for swifter response and mitigation efforts. The Coast Guard also gains the authority to restrict the movement of vessels suspected of posing cyber threats. Inspections can be conducted on vessels and facilities deemed risky. Mandatory cybersecurity standards The standardisation aims to eliminate weak links in the chain and prevent attackers from exploiting Beyond these broad powers, the Executive Order establishes foundational elements for improved cybersecurity. Mandatory cybersecurity standards will be implemented for U.S. ports' networks and systems, ensuring a baseline level of protection across the board. This standardisation aims to eliminate weak links in the chain and prevent attackers from exploiting individual vulnerabilities. Importance of collaboration and transparency Furthermore, the initiative emphasises the importance of collaboration and information sharing. Mandatory reporting of cyber incidents fosters transparency and allows government agencies and private sector partners to work together in mitigating threats. Additionally, the Executive Order encourages increased information sharing among all stakeholders, facilitating a unified response to potential attacks. Maritime Security Directive The Executive Order encourages investment in research and development for innovative cybersecurity solutions To address specific concerns, the Coast Guard will issue a Maritime Security Directive targeting operators of Chinese-manufactured ship-to-shore cranes. This directive outlines risk management strategies to address identified vulnerabilities in these critical pieces of port infrastructure. The long-term success of this initiative hinges on effective implementation. The Executive Order encourages investment in research and development for innovative cybersecurity solutions, recognising the need for continuous improvement and adaptation to evolving threats. Recognising the urgency of cyber threats The initiative has been met with widespread support from port authorities, industry stakeholders, and cybersecurity experts who recognise the urgency of addressing cyber threats. However, some concerns exist regarding the potential burden of complying with new regulations for smaller port operators. Effective communication, resource allocation, and collaboration among all stakeholders will be crucial to ensure the successful implementation of this comprehensive plan. Enhancing cybersecurity The more impactful and noteworthy piece is the associated NPRM from the U.S. Coast Guard (USCG) “This Executive Order is a positive move that will give the U.S. Coast Guard (USCG) additional authority to enhance cybersecurity within the marine transportation system and respond to cyber incidents,” comments Josh Kolleda, practice director, transport at NCC Group, a cybersecurity consulting firm. The more impactful and noteworthy piece is the associated Notice of Proposed Rulemaking (NPRM) from the U.S. Coast Guard (USCG) on “Cybersecurity in the Marine Transportation System,” adds Kolleda. Portions of the notice of proposed rulemaking (NPRM) look similar to the Transportation Security Administration (TSA) Security Directive for the rail industry and the Emergency Amendment for the aviation industry. Coordinating with TSA on lessons learned The USCG should be coordinating with TSA on lessons learned and incorporating them into additional guidance to stakeholders and processes to review plans and overall compliance, says Kolleda. “At first glance, the NPRM provides a great roadmap to increase cybersecurity posture across the various stakeholders, but it underestimates the cost to private companies in meeting the requirements, particularly in areas such as penetration testing,” says Kolleda. Cyber espionage and threats The focus is on PRC because nearly 80% of cranes operated at U.S. ports are manufactured there “It is unclear if or how the federal government will provide support for compliance efforts. As this seems to be an unfunded mandate, many private companies will opt for the bare minimum in compliance.” “Cyber espionage and threats have been reported by the Director of National Intelligence from multiple nation-states including China, Russia, and Iran,” adds Paul Kingsbury, principal security consultant & North America Maritime Lead at NCC Group. The focus here is on the People’s Republic of China (PRC) because nearly 80% of cranes operated at U.S. ports are manufactured there, he says. Destructive malware “The state-sponsored cyber actors’ goal is to disrupt critical functions by deploying destructive malware resulting in disruption to the U.S. supply chain,” says Kingsbury. “These threat actors do not only originate in China or other nation-states but also include advanced persistent threats (APTs) operated by criminal syndicates seeking financial gain from such disruptions." "The threat actors don’t care where the crane was manufactured but rather seek targets with limited protections and defences. The minimum cyber security requirements outlined within the NPRM should be adopted by all crane operators and all cranes, regardless of where they are manufactured.” PRC-manufactured cranes Kingsbury adds, “The pioneering risk outlined in the briefing is that these cranes (PRC manufactured) are controlled, serviced, and programmed from remote locations in China." "While this is a valid concern and should be assessed, there are certainly instances where PRC-manufactured cranes do not have control systems manufactured in PRC. For example, there are situations in maritime transportation system facilities where older cranes have been retrofitted with control systems of European Union or Japanese origin.” Monitoring wireless threats “The Biden Administration’s recent Executive Order is a critical step forward in protecting U.S. ports from cyberattacks and securing America’s supply chains,” says Dr. Brett Walkenhorst, CTO at Bastille, a wireless threat intelligence technology company. “To ensure proper defence against malicious actors accessing port-side networks, attention must also be paid to common wireless vulnerabilities." "Attacks leveraging Wi-Fi, Bluetooth, and IoT protocols may be used to access authorised infrastructure including IT and OT systems. Monitoring such wireless threats is an important element in a comprehensive approach to upgrading the defences of our nation’s critical infrastructure.”
Case studies
“BCD’s solution perfectly fit our scenario. All I needed to hear was ‘we have storage and scalability for the future’. As Suffolk is growing fast and is very land rich, we’re predicting a lot of growth and definitely need scalability,” Tim Forbes, Physical Security Administrator, City of Suffolk, Virginia. Customer overview When a mass shooting in which 12 people died occurred at a municipal building in Virginia Beach in 2019, it served as a wake-up call for nearby Suffolk, a city of around 95,000 people and the largest city in land area in the state of Virginia. As a result, a "crime prevention through environmental design" (CPTED) committee was immediately formed. One of the committee’s key recommendations was to hire a physical security administrator to act as a single point of contact for all security issues. In addition to being tasked with being liaison with Suffolk police, public safety and city leadership, the administrator would be responsible for overseeing security technology, including access control, alarming and cameras. These systems had been installed when the towers went up but were left fully unmanaged After a hire was made, a needs assessment was conducted which quickly determined that the existing security technology infrastructure was poorly functioning or, in some cases, not functioning at all. Many of these systems had been installed when the buildings went up but have been left completely unmanaged since. The number one priority became to construct a security “foundation” at the data centre in Suffolk City Hall. In terms of a video management system, a new backbone was needed to ensure the ability to view all cameras from this central location. The approach Suffolk determined it needed an integration partner that could provide unified technologies and common knowledge around its security parameters. It initiated an RFP process to which it considered four responses. Based upon credentials, years of experience, and other qualifications (including expertise in ticketing and records management), the city selected Integrated Security and Communications (ISC). ISC had, in turn, been partnering with BCD for IP video data infrastructure solutions for several years. In particular, they had jointly worked on several server environment deployments using the company’s high availability, purpose-built appliances and trusted BCD to be the right partner for the city of Suffolk. After extensive evaluation of site requirements and recommendations provided by BCD, the REVOLV Hybrid Hyperconverged Infrastructure (hHCI), DEEPSTOR Lite was determined by all parties to be the optimal solution. The solution Video must be captured and stored at the set frame rate and key, to be admissible in legal proceedings Most video management systems can achieve the video retention requirements and anticipated camera counts for a given application. Yet, each application has city, state and federal requirements that govern the amount of time the video must be retained, the required frame rate, and the required quality of video. Video must be captured and stored at the specified frame rate and resolution, to be admissible in legal proceedings. With a traditional bare metal implementation of a video management system, the archiver or recorder is a physical server. If that server experiences diffculties, or goes offline for an extended period, not only do the cameras stop recording, but the municipality also loses access to all the archived footage on that archiver. The city of Suffolk could not afford to experience a loss of recording, or not have access to the archived footage. The REVOLV DEEPSTOR Lite solution addressed these needs and ensured that cameras were always recording, and the customer always had access to its archived video. DEEPSTOR Lite is ideal for customers new to virtualised environments, providing a scalable solution that can support roughly 1,500 Mbps during a failed node scenario and up to 2,000 Mbps when all nodes are online. REVOLV is a hybrid HCI solution that leverages VMWare technologies to create a cluster of resources and virtualise the archivers to operate within that cluster. The server resources reside within a vSAN implementation on the cluster that acts as a shared resource pool for the servers. In the event of a node failure, the virtual machines that reside on that node will redistribute (vMotion) to the remaining nodes and continue operation. The process REVOLV provides high availability, regardless of the capabilities of the VMS, or access control software The process occurs completely unattended, and in the case of the city of Suffolk, ensured that it would never lose recorded video or be unable to record resources. REVOLV provides high availability, regardless of the capabilities of the VMS, or access control software. Suffolk’s REVOLV installation also utilised powerful GPUs. These GPUs enabled BCD to shift processing power off the appliance CPU, for a smoother display of live and recorded video and the ability to display more HD cameras at the command centre. “We got it all virtualised and it’s down to less than a quarter of a rack between servers, storage and all the networking that was required for it. Now Suffolk is in a high availability, high resiliency environment that eliminates all the pain points it had with five and seven-year-old servers,” Jim Cooper, Vice President of Technology, Integrated Security and Communications (ISC). Implementation The REVOLV system for Suffolk, including the vSAN cluster and all virtual machines, was built and pre-staged in the engineering lab at BCD’s facility in Fresno, CA. Once tested, it was shipped to the Suffolk city hall. BCD’s professional services team made an onsite visit to complete the installation with ISC. By pre-staging, BCD can ensure that the solution is ready for deployment, thus reducing the time spent on-site. Cut-over configuration and stand-up of the new environment were completed in a couple weeks’ time. Thanks to BCD’s expertise and the REVOLV solution, the city of Suffolk now has over 25 site managers and department directors who have a purpose-built, high-availability system that delivers video at their site and at multiple sites in their organisations for years to come. Says Tim Forbes, Physical Security Administrator for the city, “BCD and ISC have been great partners for us. I am 100% happy with everything.” And the scalability that the platform provides? It will be needed sooner rather than later. Three new large sites and three new small sites are already on tap to be integrated into the system.
RGB Spectrum® announced a new deployment at Red Hawk Casino, a premier destination for entertainment, dining, and gaming located just north of Sacramento. The casino has recently elevated its sports bar experience with a captivating new entertainment system. Galileo video wall processor RGB Spectrum's Galileo video wall processor was the natural choice for the project due to its versatility, support for diverse digital and IP-based signal sources, display layout flexibility, exceptional 4K image quality, and straightforward installation process. The processor seamlessly integrates with the casino's existing setup and offers many benefits that enhance the viewing experience. Video processing performance The Galileo processor powers a colossal 27.8-foot by 8.9-foot video wall, composed of Planar's brilliant TVF1.8 LED Cal Coast Telecom, an audio-visual design and installation integrator based in San Jose, California, selected RGB Spectrum's state-of-the-art Galileo video wall processor to power the casino's new video wall, resulting in an outstanding visual experience for casino patrons. The Galileo processor powers a colossal 27.8-foot by 8.9-foot video wall, composed of Planar's brilliant TVF1.8 LED displays, boasting an impressive resolution of 4480 x 1440. This cutting-edge processor delivers top-tier video processing performance, ensuring a captivating, real-time viewing experience with stunning 4K image quality. Display 44 images simultaneously With this solution, the bar offers an array of sports events and highlights that keep patrons engaged and entertained. From professional to collegiate and amateur sports, the video wall showcases football, baseball, basketball, hockey, horse racing, and much more worldwide. David Hallmark, Audio Video Engineering Manager for Cal Coast Telecom, expressed his enthusiasm for the Galileo processor, stating, "One of the key benefits of RGB Spectrum's Galileo processor is its remarkable ability to display 44 images simultaneously with the flexibility to resize and re-position the images." Customisable layouts Operators can swiftly switch and route input sources, choose from customisable, pre-set display layouts, and resize and reposition display windows using the processor's intuitive, built-in GUI. The Galileo processor supports all types of video walls, offering features such as image overlap for projector-based video walls, custom timings to accommodate LED wall resolutions, and bezel compensation for optimal viewing on LCD video walls.
Jesolo is a popular holiday resort on the Italian Adriatic coast. To ensure security for locals and tourists on the busy beach and in public places, Panomera® multifocal sensor cameras from Dallmeier are in use. Five million tourists a year Jesolo is a town of about 26,000 inhabitants and more than five million tourists a year. The large increase in the number of visitors during the summer months requires a great deal of organisation from all parties involved, also regarding the safety and security of residents and tourists. Jesolo is located on the Italian Adriatic coast in the Veneto region. The resort is popular with tourists for its 15 kilometres of golden sandy beach, which has been awarded the Blue Flag, and for the many entertainment facilities on offer: events, theme parks, sports activities, shops, restaurants, and discos. In summer, Jesolo’s nightlife pulsates, and unfortunately, the risk of accidents and crime increases. Video technology for public security The challenge has been to monitor large public areas with as few cameras as possible The city has made considerable efforts in recent years to improve its security infrastructure to create a safe environment for its residents and visitors–and video technology is an important aspect of this. The challenge has been to monitor large public areas with as few cameras as possible, while maintaining high standards of image quality and ease of use. Conventional standard cameras could not meet these requirements–the image quality was simply not good enough. The security managers therefore decided to look for a new solution and found it in the Panomera® multifocal sensor cameras from German manufacturer Dallmeier. Fewer cameras, higher quality Panomera®’s patented camera technology has a number of features that make it unique in the industry. Multiple modules resp. sensors of different focal lengths are combined into a single system. Each module can be individually focused to capture a specific area of the overall image. As a result, multifocal sensor technology enables the simultaneous monitoring of large areas with high detail and exceptionally high resolution. In this way, Panomera® achieves an overall resolution over the object space that far exceeds that of conventional single-sensor cameras. Any number of “virtual” PTZs If an incident does occur, recorded video footage can be used to solve crimes and as evidence in court Another advantage is that unlike PTZ cameras, which are limited to a specific area, the Panomera® camera provides a comprehensive and detailed image of the entire surveillance zone–no matter where the security operator is focusing, there are theoretically any number of PTZ systems virtually available. For the operator in live mode, as well as for the forensic expert in recording mode. Multifocal sensor technology provides an optimal overview of the entire event and enables comprehensive monitoring in real time. This allows security personnel to respond quickly to potential threats. If an incident does occur, the recorded video footage can be used to solve crimes and as evidence in court. A safe environment Dallmeier video technology has been used in Jesolo since 2019. The city’s security managers were so satisfied with the system’s performance that they decided to extend it a few years later. Now, Panomera® cameras keep an eye on the main squares, streets, and sections of the beach. The Panomera® cameras make a significant contribution to improving public safety “The Panomera® cameras make a significant contribution to improving public safety. Especially during the night hours, inappropriate behaviour, and crimes such as vandalism or violence can occur. Thanks to video surveillance, suspicious activities can be quickly detected, and appropriate measures can be taken to prevent crimes or identify the perpetrators,” says Daniele Sisinio, Director Dallmeier Italia. Preventive measure And of course, video surveillance also serves as a preventive measure: the presence of cameras deters potential criminals and creates a safer environment. “Panomera® offers a unique combination of high resolution, optimal overview and intuitive operation,” explains Claudio Vanin, Local Police Commander. “The level of detail is simply amazing! And even in difficult conditions, like here near the sea, the cameras are robust and durable.” Data protection: “Privacy & Security by Design” Dallmeier video surveillance systems fulfil all the criteria that are decisive for providing evidence Video security systems must comply with country-specific and other supra-regional data protection regulations, such as the European General Data Protection Regulation (GDPR). Secure data management was therefore essential for the City of Jesolo. “Our products and solutions have the highest level of technical precautions that make it easy for the customer to implement a video security solution that complies with data protection regulations,” explains Daniele Sisinio. In accordance with the “Privacy & Security by Design” guideline, Dallmeier offers comprehensive options for data protection and data security settings on the product side–from setting up “private zones” to sophisticated access concepts and secure authentication procedures according to IEEE 802.1X. In addition, Dallmeier video surveillance systems fulfil all the criteria that are decisive for providing evidence in court. Image quality, security against tampering and protection against unauthorised access meet the LGC Forensics certification. Fit for the future The video system remains flexible, scalable, and expandable. Thanks to state-of-the-art technology, it can be easily adapted to changing requirements. Additional cameras can be easily integrated, and upgrades are seamless. The video system remains a reliable and effective surveillance solution for the future.
Jacksons Fencing successfully supplied and installed its state-of-the-art EuroGuard® Rebound sports mesh fencing at West Beach Tennis Courts in Whitstable, Kent. In partnership with LTA Tennis Foundation, this installation marks a key milestone in Canterbury City Council’s initiative to upgrade local sports infrastructure while reinforcing Jacksons Fencing’s reputation as a pioneer in high-quality, long-lasting fencing solutions for all applications, including sports and recreation. Addressing security and durability challenges The fencing had to withstand harsh weather conditions while maintaining its integrity The key challenges for the fencing were multi-faceted. First, security was a priority. The courts needed to be securely enclosed to prevent unauthorised access and vandalism, yet the boundary needed to remain welcoming and accessible to the public. Durability was another major consideration, especially given the coastal environment, where salty sea air and strong winds could quickly degrade materials that weren’t up to standard. The fencing had to withstand harsh weather conditions while maintaining its integrity and appearance over time. Visibility and safety Visibility and safety also had to be considered. The fencing needed to provide a clear boundary while ensuring that players' views of the court and the picturesque surrounding landscape weren’t obstructed. Additionally, the design needed to be aesthetically pleasing and complement the beachside location, offering a modern, sleek appearance without detracting from the natural beauty of the area. The existing chain link fencing, traditionally used for tennis courts, had fallen into disrepair and needed replacing with something smarter and more durable. A tailored fencing solution Jacksons Fencing supplied and installed EuroGuard® Rebound sports mesh fencing Understanding the unique demands of the project, Jacksons Fencing supplied and installed EuroGuard® Rebound sports mesh fencing, an advanced system engineered specifically for sports facilities. Constructed from galvanised steel mesh and finished with a marine-grade polyester powder coating in green RAL 6005, the fencing provides superior resistance to corrosion, ensuring longevity in the harsh seaside climate. Its innovative mesh configuration allows for excellent ball rebound, minimising disruptions during play while maintaining clear visibility of the surrounding landscape. Sleek and modern design The fencing’s vandal-resistant security clips and tamper-proof fixings further reinforce its integrity, preventing unauthorised interference and ensuring the facility remains safe and secure for years to come. Additionally, the sleek and modern design enhances the overall visual appeal of the courts, seamlessly integrating with the natural coastal surroundings. Enhancing community sports facilities Jacksons Fencing has played a crucial role in elevating the functionality and longevity of West Beach Tennis Courts By implementing EuroGuard® Rebound sports mesh fencing, Jacksons Fencing has played a crucial role in elevating the functionality and longevity of West Beach Tennis Courts. The installation not only secures the site but also enhances the playing experience for tennis enthusiasts, ensuring a professional and well-maintained facility for the local community. EuroGuard® Rebound system Peter Jackson, Managing Director of Jacksons Fencing, stated: “We are proud to contribute to the transformation of West Beach Tennis Courts by providing a high-performance, long-lasting fencing solution." "Our EuroGuard® Rebound system not only meets the practical demands of security and durability but also enhances the overall appearance of the facility. We believe this installation will benefit the community for years to come, offering a safe and enjoyable space for sports and recreation.”
Windsor Port Authority, one of just 17 national ports created by the 1999 Canada Marine Act, has enhanced waterway safety and security across its jurisdiction on the U.S.-Canada border with state-of-the-art cameras from Axis Communications. These cameras, combined with radar solutions from Accipiter Radar Technologies Inc., provide the port with the visibility needed to prevent collisions, better detect illegal activity, and save lives along the river. Windsor Port Located on the Detroit River, the Windsor Port serves as the passageway between Lake Huron and Lake Erie, navigating between 6,000 and 9,000 cargo vessels annually. In addition to commercial ships, over 10,000 small fishing boats and other recreational watercraft make their way through the port each year. Better visibility Windsor Port Authority realised that it needed better visibility into happenings along the river With so many vessels passing through, Windsor Port Authority realised that it needed better visibility into happenings along the river to be able to keep the waterway running safely and smoothly. “Axis’ cameras, along with Accipiter’s radar technology, have been vital to keeping the port safe for all who pass through it,” said Peter Berry, Harbour Master and Vice President of Operations for Windsor Port Authority. Real-time incident detection “Without detailed knowledge of the traffic in these waters, the risk of severe accidents increases significantly, so having the ability to both detect and visually confirm incidents in real-time is invaluable." "We’ve already been able to do some amazing things with the enhanced surveillance solution, like quickly rescuing drowning victims and helping to catch human smugglers, and we’re eager to see what the future holds as a result of this upgrade.” An effective, remote observation By integrating Axis’ bispectral cameras into Accipiter's platform, the port has a 360-degree surveillance system While radar coverage from Accipiter has monitored river activity for years, offering wide-area, real-time detection, and tracking to identify commercial vessels, small craft such as jet skiers, and even debris in the water, it lacked the visual detail needed to provide effective, remote observation. By integrating Axis’ bispectral cameras into Accipiter's platform, the port has a 360-degree surveillance system with both thermal detection and visual verification. System benefits With this enhanced system, the port can: Broadcast real-time warnings about obstructions in the channel: In one instance, the U.S. Coast Guard notified the port that they’d spotted a boat stopped in the middle of the river. The vessel had caught fire, dropped anchor, and was dead in the water. The thermal camera and radar technology allowed for continuous monitoring of the fire onboard the ship, helping them to determine that it was contained to the engine room while enabling the port to send out a navigational warning to other vessels on the river. While the darkness of the hour prevented them from seeing anything from shore, the technology also provided thermal visuals to monitor activity on the bridge and deck. Everyone was safely evacuated. Safely navigate craft through high-risk construction projects: During the construction of a new bridge, the port was concerned about potential disruptions to river traffic, but Axis cameras and integrated radars allowed them to effectively manage vessels passing underneath the site. Deliver precise coordinates for faster rescue operations: When the port got a call from the U.S. Coast Guard that they had spotted a person treading water by the Ambassador Bridge, they were able to quickly identify the location of the person using a combination of radar and camera technology and execute a life-saving rescue. Help to identify criminal activity: While using the camera-radar technology to view objects crossing from Canada to the U.S., the port identified suspicious activity from a boat that regularly sailed from Windsor to Detroit. The port turned the data and video over to the Canadian and U.S. authorities to investigate, which ultimately led to the arrest of two individuals running a human smuggling operation. Marine domain awareness “At Axis, we take pride in working with organisations like Windsor Port Authority to contribute to improved marine domain awareness and heightened safety along the border,” said Anthony Incorvati, Transportation Segment Development Manager for the Americas at Axis. “Combining advanced camera and radar technology ensures comprehensive visibility in maritime environments, providing essential detection and visual verification to resolve incidents quickly and effectively. Not only that, but powerful business intelligence capabilities contribute to improved operations across the organisation.”
Hotel managers require security, flexibility, durability and aesthetics in an access management system that can cover guest rooms and shared spaces, on one hand, and private staff areas on the other. With multiple buildings, a private beach and sports areas, the new TH Resorts Capo Rizzuto on Calabria’s Ionian coast receives high daily traffic from guests and staff, who must have access at different times according to their specific needs. On taking over resort, TH management quickly identified the need for a new locking system that would allow each staff member to access different, specific areas of the facility. In specifying a new master key system, they had two more important criteria. Firstly, the solution should be mechanical rather than digital, to preserve existing hotel aesthetics. Secondly, they required a hierarchical system, where different staff members could have levels of access authority based on their roles. A CYS10 system makes fine-grained customisation possible Security of the comfy nickel-silver key is protected against unauthorised copying by two patents Working closely with the expert specification team at ASSA ABLOY Italia, managers at TH Capo Rizzuto chose a CYS10 master key locking system with Euro profile double cylinders for common area access points and staff-only zones. For guest room doors they selected CYS10 thumbturn cylinders, which lock securely for privacy and quickly unlock from the inside. The CYS10 platform consists of 6-pin sawn key cylinders; it is tested and certified according to EN 1303:2015 and SKG security standards. Security of the comfortable nickel-silver key is protected against unauthorised copying by two separate patents. Their robust design makes them ideally suited to challenging environments such as a busy hotel. Effective master key system design With 63 available key profiles, CYS10 cylinders enable the creation of a complex master key setup with several levels and sub-levels – perfect for access customisation. Effective master key system design reduces the number of keys they need to cut, track or replace. It saves hotel managers time and money. “It is a truly flexible solution and allows us to limit the quantity of keys assigned as much as possible,” says Carmelo Sava, Head of Maintenance at TH Resorts. Effective master key system design reduces the number of keys they need to cut, track or replace Five distinct master key systems – numbering more than 500 CYS10 cylinders in total – were implemented at TH Capo Rizzuto, one for each of the resort’s individual facilities. Each cylinder has its own paired key and, for each building, a master key opens all cylinders. The entire property is controlled by a single grand master key entrusted to management. Future-proof setup at Capo Rizzuto “The ASSA ABLOY master key system allows us to manage the access of all our staff without any security problems,” adds Carmelo Sava. To ensure future-proof setup at Capo Rizzuto, their key systems can adapt or expand at any time: The CYS10 device range includes single, double, thumbturn, screw-in and rim cylinders for interior and exterior doors, switch cylinders for control panels, plus cam locks for letterboxes or furniture. The CYS10 padlock secures gates, lockers, and more.
“BCD’s solution perfectly fit our scenario. All I needed to hear was ‘we have storage and scalability for the future’. As Suffolk is growing fast and is very land rich, we’re predicting a lot of growth and definitely need scalability,” Tim Forbes, Physical Security Administrator, City of Suffolk, Virginia. Customer overview When a mass shooting in which 12 people died occurred at a municipal building in Virginia Beach in 2019, it served as a wake-up call for nearby Suffolk, a city of around 95,000 people and the largest city in land area in the state of Virginia. As a result, a "crime prevention through environmental design" (CPTED) committee was immediately formed. One of the committee’s key recommendations was to hire a physical security administrator to act as a single point of contact for all security issues. In addition to being tasked with being liaison with Suffolk police, public safety and city leadership, the administrator would be responsible for overseeing security technology, including access control, alarming and cameras. These systems had been installed when the towers went up but were left fully unmanaged After a hire was made, a needs assessment was conducted which quickly determined that the existing security technology infrastructure was poorly functioning or, in some cases, not functioning at all. Many of these systems had been installed when the buildings went up but have been left completely unmanaged since. The number one priority became to construct a security “foundation” at the data centre in Suffolk City Hall. In terms of a video management system, a new backbone was needed to ensure the ability to view all cameras from this central location. The approach Suffolk determined it needed an integration partner that could provide unified technologies and common knowledge around its security parameters. It initiated an RFP process to which it considered four responses. Based upon credentials, years of experience, and other qualifications (including expertise in ticketing and records management), the city selected Integrated Security and Communications (ISC). ISC had, in turn, been partnering with BCD for IP video data infrastructure solutions for several years. In particular, they had jointly worked on several server environment deployments using the company’s high availability, purpose-built appliances and trusted BCD to be the right partner for the city of Suffolk. After extensive evaluation of site requirements and recommendations provided by BCD, the REVOLV Hybrid Hyperconverged Infrastructure (hHCI), DEEPSTOR Lite was determined by all parties to be the optimal solution. The solution Video must be captured and stored at the set frame rate and key, to be admissible in legal proceedings Most video management systems can achieve the video retention requirements and anticipated camera counts for a given application. Yet, each application has city, state and federal requirements that govern the amount of time the video must be retained, the required frame rate, and the required quality of video. Video must be captured and stored at the specified frame rate and resolution, to be admissible in legal proceedings. With a traditional bare metal implementation of a video management system, the archiver or recorder is a physical server. If that server experiences diffculties, or goes offline for an extended period, not only do the cameras stop recording, but the municipality also loses access to all the archived footage on that archiver. The city of Suffolk could not afford to experience a loss of recording, or not have access to the archived footage. The REVOLV DEEPSTOR Lite solution addressed these needs and ensured that cameras were always recording, and the customer always had access to its archived video. DEEPSTOR Lite is ideal for customers new to virtualised environments, providing a scalable solution that can support roughly 1,500 Mbps during a failed node scenario and up to 2,000 Mbps when all nodes are online. REVOLV is a hybrid HCI solution that leverages VMWare technologies to create a cluster of resources and virtualise the archivers to operate within that cluster. The server resources reside within a vSAN implementation on the cluster that acts as a shared resource pool for the servers. In the event of a node failure, the virtual machines that reside on that node will redistribute (vMotion) to the remaining nodes and continue operation. The process REVOLV provides high availability, regardless of the capabilities of the VMS, or access control software The process occurs completely unattended, and in the case of the city of Suffolk, ensured that it would never lose recorded video or be unable to record resources. REVOLV provides high availability, regardless of the capabilities of the VMS, or access control software. Suffolk’s REVOLV installation also utilised powerful GPUs. These GPUs enabled BCD to shift processing power off the appliance CPU, for a smoother display of live and recorded video and the ability to display more HD cameras at the command centre. “We got it all virtualised and it’s down to less than a quarter of a rack between servers, storage and all the networking that was required for it. Now Suffolk is in a high availability, high resiliency environment that eliminates all the pain points it had with five and seven-year-old servers,” Jim Cooper, Vice President of Technology, Integrated Security and Communications (ISC). Implementation The REVOLV system for Suffolk, including the vSAN cluster and all virtual machines, was built and pre-staged in the engineering lab at BCD’s facility in Fresno, CA. Once tested, it was shipped to the Suffolk city hall. BCD’s professional services team made an onsite visit to complete the installation with ISC. By pre-staging, BCD can ensure that the solution is ready for deployment, thus reducing the time spent on-site. Cut-over configuration and stand-up of the new environment were completed in a couple weeks’ time. Thanks to BCD’s expertise and the REVOLV solution, the city of Suffolk now has over 25 site managers and department directors who have a purpose-built, high-availability system that delivers video at their site and at multiple sites in their organisations for years to come. Says Tim Forbes, Physical Security Administrator for the city, “BCD and ISC have been great partners for us. I am 100% happy with everything.” And the scalability that the platform provides? It will be needed sooner rather than later. Three new large sites and three new small sites are already on tap to be integrated into the system.
RGB Spectrum® announced a new deployment at Red Hawk Casino, a premier destination for entertainment, dining, and gaming located just north of Sacramento. The casino has recently elevated its sports bar experience with a captivating new entertainment system. Galileo video wall processor RGB Spectrum's Galileo video wall processor was the natural choice for the project due to its versatility, support for diverse digital and IP-based signal sources, display layout flexibility, exceptional 4K image quality, and straightforward installation process. The processor seamlessly integrates with the casino's existing setup and offers many benefits that enhance the viewing experience. Video processing performance The Galileo processor powers a colossal 27.8-foot by 8.9-foot video wall, composed of Planar's brilliant TVF1.8 LED Cal Coast Telecom, an audio-visual design and installation integrator based in San Jose, California, selected RGB Spectrum's state-of-the-art Galileo video wall processor to power the casino's new video wall, resulting in an outstanding visual experience for casino patrons. The Galileo processor powers a colossal 27.8-foot by 8.9-foot video wall, composed of Planar's brilliant TVF1.8 LED displays, boasting an impressive resolution of 4480 x 1440. This cutting-edge processor delivers top-tier video processing performance, ensuring a captivating, real-time viewing experience with stunning 4K image quality. Display 44 images simultaneously With this solution, the bar offers an array of sports events and highlights that keep patrons engaged and entertained. From professional to collegiate and amateur sports, the video wall showcases football, baseball, basketball, hockey, horse racing, and much more worldwide. David Hallmark, Audio Video Engineering Manager for Cal Coast Telecom, expressed his enthusiasm for the Galileo processor, stating, "One of the key benefits of RGB Spectrum's Galileo processor is its remarkable ability to display 44 images simultaneously with the flexibility to resize and re-position the images." Customisable layouts Operators can swiftly switch and route input sources, choose from customisable, pre-set display layouts, and resize and reposition display windows using the processor's intuitive, built-in GUI. The Galileo processor supports all types of video walls, offering features such as image overlap for projector-based video walls, custom timings to accommodate LED wall resolutions, and bezel compensation for optimal viewing on LCD video walls.
Jesolo is a popular holiday resort on the Italian Adriatic coast. To ensure security for locals and tourists on the busy beach and in public places, Panomera® multifocal sensor cameras from Dallmeier are in use. Five million tourists a year Jesolo is a town of about 26,000 inhabitants and more than five million tourists a year. The large increase in the number of visitors during the summer months requires a great deal of organisation from all parties involved, also regarding the safety and security of residents and tourists. Jesolo is located on the Italian Adriatic coast in the Veneto region. The resort is popular with tourists for its 15 kilometres of golden sandy beach, which has been awarded the Blue Flag, and for the many entertainment facilities on offer: events, theme parks, sports activities, shops, restaurants, and discos. In summer, Jesolo’s nightlife pulsates, and unfortunately, the risk of accidents and crime increases. Video technology for public security The challenge has been to monitor large public areas with as few cameras as possible The city has made considerable efforts in recent years to improve its security infrastructure to create a safe environment for its residents and visitors–and video technology is an important aspect of this. The challenge has been to monitor large public areas with as few cameras as possible, while maintaining high standards of image quality and ease of use. Conventional standard cameras could not meet these requirements–the image quality was simply not good enough. The security managers therefore decided to look for a new solution and found it in the Panomera® multifocal sensor cameras from German manufacturer Dallmeier. Fewer cameras, higher quality Panomera®’s patented camera technology has a number of features that make it unique in the industry. Multiple modules resp. sensors of different focal lengths are combined into a single system. Each module can be individually focused to capture a specific area of the overall image. As a result, multifocal sensor technology enables the simultaneous monitoring of large areas with high detail and exceptionally high resolution. In this way, Panomera® achieves an overall resolution over the object space that far exceeds that of conventional single-sensor cameras. Any number of “virtual” PTZs If an incident does occur, recorded video footage can be used to solve crimes and as evidence in court Another advantage is that unlike PTZ cameras, which are limited to a specific area, the Panomera® camera provides a comprehensive and detailed image of the entire surveillance zone–no matter where the security operator is focusing, there are theoretically any number of PTZ systems virtually available. For the operator in live mode, as well as for the forensic expert in recording mode. Multifocal sensor technology provides an optimal overview of the entire event and enables comprehensive monitoring in real time. This allows security personnel to respond quickly to potential threats. If an incident does occur, the recorded video footage can be used to solve crimes and as evidence in court. A safe environment Dallmeier video technology has been used in Jesolo since 2019. The city’s security managers were so satisfied with the system’s performance that they decided to extend it a few years later. Now, Panomera® cameras keep an eye on the main squares, streets, and sections of the beach. The Panomera® cameras make a significant contribution to improving public safety “The Panomera® cameras make a significant contribution to improving public safety. Especially during the night hours, inappropriate behaviour, and crimes such as vandalism or violence can occur. Thanks to video surveillance, suspicious activities can be quickly detected, and appropriate measures can be taken to prevent crimes or identify the perpetrators,” says Daniele Sisinio, Director Dallmeier Italia. Preventive measure And of course, video surveillance also serves as a preventive measure: the presence of cameras deters potential criminals and creates a safer environment. “Panomera® offers a unique combination of high resolution, optimal overview and intuitive operation,” explains Claudio Vanin, Local Police Commander. “The level of detail is simply amazing! And even in difficult conditions, like here near the sea, the cameras are robust and durable.” Data protection: “Privacy & Security by Design” Dallmeier video surveillance systems fulfil all the criteria that are decisive for providing evidence Video security systems must comply with country-specific and other supra-regional data protection regulations, such as the European General Data Protection Regulation (GDPR). Secure data management was therefore essential for the City of Jesolo. “Our products and solutions have the highest level of technical precautions that make it easy for the customer to implement a video security solution that complies with data protection regulations,” explains Daniele Sisinio. In accordance with the “Privacy & Security by Design” guideline, Dallmeier offers comprehensive options for data protection and data security settings on the product side–from setting up “private zones” to sophisticated access concepts and secure authentication procedures according to IEEE 802.1X. In addition, Dallmeier video surveillance systems fulfil all the criteria that are decisive for providing evidence in court. Image quality, security against tampering and protection against unauthorised access meet the LGC Forensics certification. Fit for the future The video system remains flexible, scalable, and expandable. Thanks to state-of-the-art technology, it can be easily adapted to changing requirements. Additional cameras can be easily integrated, and upgrades are seamless. The video system remains a reliable and effective surveillance solution for the future.
Jacksons Fencing successfully supplied and installed its state-of-the-art EuroGuard® Rebound sports mesh fencing at West Beach Tennis Courts in Whitstable, Kent. In partnership with LTA Tennis Foundation, this installation marks a key milestone in Canterbury City Council’s initiative to upgrade local sports infrastructure while reinforcing Jacksons Fencing’s reputation as a pioneer in high-quality, long-lasting fencing solutions for all applications, including sports and recreation. Addressing security and durability challenges The fencing had to withstand harsh weather conditions while maintaining its integrity The key challenges for the fencing were multi-faceted. First, security was a priority. The courts needed to be securely enclosed to prevent unauthorised access and vandalism, yet the boundary needed to remain welcoming and accessible to the public. Durability was another major consideration, especially given the coastal environment, where salty sea air and strong winds could quickly degrade materials that weren’t up to standard. The fencing had to withstand harsh weather conditions while maintaining its integrity and appearance over time. Visibility and safety Visibility and safety also had to be considered. The fencing needed to provide a clear boundary while ensuring that players' views of the court and the picturesque surrounding landscape weren’t obstructed. Additionally, the design needed to be aesthetically pleasing and complement the beachside location, offering a modern, sleek appearance without detracting from the natural beauty of the area. The existing chain link fencing, traditionally used for tennis courts, had fallen into disrepair and needed replacing with something smarter and more durable. A tailored fencing solution Jacksons Fencing supplied and installed EuroGuard® Rebound sports mesh fencing Understanding the unique demands of the project, Jacksons Fencing supplied and installed EuroGuard® Rebound sports mesh fencing, an advanced system engineered specifically for sports facilities. Constructed from galvanised steel mesh and finished with a marine-grade polyester powder coating in green RAL 6005, the fencing provides superior resistance to corrosion, ensuring longevity in the harsh seaside climate. Its innovative mesh configuration allows for excellent ball rebound, minimising disruptions during play while maintaining clear visibility of the surrounding landscape. Sleek and modern design The fencing’s vandal-resistant security clips and tamper-proof fixings further reinforce its integrity, preventing unauthorised interference and ensuring the facility remains safe and secure for years to come. Additionally, the sleek and modern design enhances the overall visual appeal of the courts, seamlessly integrating with the natural coastal surroundings. Enhancing community sports facilities Jacksons Fencing has played a crucial role in elevating the functionality and longevity of West Beach Tennis Courts By implementing EuroGuard® Rebound sports mesh fencing, Jacksons Fencing has played a crucial role in elevating the functionality and longevity of West Beach Tennis Courts. The installation not only secures the site but also enhances the playing experience for tennis enthusiasts, ensuring a professional and well-maintained facility for the local community. EuroGuard® Rebound system Peter Jackson, Managing Director of Jacksons Fencing, stated: “We are proud to contribute to the transformation of West Beach Tennis Courts by providing a high-performance, long-lasting fencing solution." "Our EuroGuard® Rebound system not only meets the practical demands of security and durability but also enhances the overall appearance of the facility. We believe this installation will benefit the community for years to come, offering a safe and enjoyable space for sports and recreation.”
Windsor Port Authority, one of just 17 national ports created by the 1999 Canada Marine Act, has enhanced waterway safety and security across its jurisdiction on the U.S.-Canada border with state-of-the-art cameras from Axis Communications. These cameras, combined with radar solutions from Accipiter Radar Technologies Inc., provide the port with the visibility needed to prevent collisions, better detect illegal activity, and save lives along the river. Windsor Port Located on the Detroit River, the Windsor Port serves as the passageway between Lake Huron and Lake Erie, navigating between 6,000 and 9,000 cargo vessels annually. In addition to commercial ships, over 10,000 small fishing boats and other recreational watercraft make their way through the port each year. Better visibility Windsor Port Authority realised that it needed better visibility into happenings along the river With so many vessels passing through, Windsor Port Authority realised that it needed better visibility into happenings along the river to be able to keep the waterway running safely and smoothly. “Axis’ cameras, along with Accipiter’s radar technology, have been vital to keeping the port safe for all who pass through it,” said Peter Berry, Harbour Master and Vice President of Operations for Windsor Port Authority. Real-time incident detection “Without detailed knowledge of the traffic in these waters, the risk of severe accidents increases significantly, so having the ability to both detect and visually confirm incidents in real-time is invaluable." "We’ve already been able to do some amazing things with the enhanced surveillance solution, like quickly rescuing drowning victims and helping to catch human smugglers, and we’re eager to see what the future holds as a result of this upgrade.” An effective, remote observation By integrating Axis’ bispectral cameras into Accipiter's platform, the port has a 360-degree surveillance system While radar coverage from Accipiter has monitored river activity for years, offering wide-area, real-time detection, and tracking to identify commercial vessels, small craft such as jet skiers, and even debris in the water, it lacked the visual detail needed to provide effective, remote observation. By integrating Axis’ bispectral cameras into Accipiter's platform, the port has a 360-degree surveillance system with both thermal detection and visual verification. System benefits With this enhanced system, the port can: Broadcast real-time warnings about obstructions in the channel: In one instance, the U.S. Coast Guard notified the port that they’d spotted a boat stopped in the middle of the river. The vessel had caught fire, dropped anchor, and was dead in the water. The thermal camera and radar technology allowed for continuous monitoring of the fire onboard the ship, helping them to determine that it was contained to the engine room while enabling the port to send out a navigational warning to other vessels on the river. While the darkness of the hour prevented them from seeing anything from shore, the technology also provided thermal visuals to monitor activity on the bridge and deck. Everyone was safely evacuated. Safely navigate craft through high-risk construction projects: During the construction of a new bridge, the port was concerned about potential disruptions to river traffic, but Axis cameras and integrated radars allowed them to effectively manage vessels passing underneath the site. Deliver precise coordinates for faster rescue operations: When the port got a call from the U.S. Coast Guard that they had spotted a person treading water by the Ambassador Bridge, they were able to quickly identify the location of the person using a combination of radar and camera technology and execute a life-saving rescue. Help to identify criminal activity: While using the camera-radar technology to view objects crossing from Canada to the U.S., the port identified suspicious activity from a boat that regularly sailed from Windsor to Detroit. The port turned the data and video over to the Canadian and U.S. authorities to investigate, which ultimately led to the arrest of two individuals running a human smuggling operation. Marine domain awareness “At Axis, we take pride in working with organisations like Windsor Port Authority to contribute to improved marine domain awareness and heightened safety along the border,” said Anthony Incorvati, Transportation Segment Development Manager for the Americas at Axis. “Combining advanced camera and radar technology ensures comprehensive visibility in maritime environments, providing essential detection and visual verification to resolve incidents quickly and effectively. Not only that, but powerful business intelligence capabilities contribute to improved operations across the organisation.”
Hotel managers require security, flexibility, durability and aesthetics in an access management system that can cover guest rooms and shared spaces, on one hand, and private staff areas on the other. With multiple buildings, a private beach and sports areas, the new TH Resorts Capo Rizzuto on Calabria’s Ionian coast receives high daily traffic from guests and staff, who must have access at different times according to their specific needs. On taking over resort, TH management quickly identified the need for a new locking system that would allow each staff member to access different, specific areas of the facility. In specifying a new master key system, they had two more important criteria. Firstly, the solution should be mechanical rather than digital, to preserve existing hotel aesthetics. Secondly, they required a hierarchical system, where different staff members could have levels of access authority based on their roles. A CYS10 system makes fine-grained customisation possible Security of the comfy nickel-silver key is protected against unauthorised copying by two patents Working closely with the expert specification team at ASSA ABLOY Italia, managers at TH Capo Rizzuto chose a CYS10 master key locking system with Euro profile double cylinders for common area access points and staff-only zones. For guest room doors they selected CYS10 thumbturn cylinders, which lock securely for privacy and quickly unlock from the inside. The CYS10 platform consists of 6-pin sawn key cylinders; it is tested and certified according to EN 1303:2015 and SKG security standards. Security of the comfortable nickel-silver key is protected against unauthorised copying by two separate patents. Their robust design makes them ideally suited to challenging environments such as a busy hotel. Effective master key system design With 63 available key profiles, CYS10 cylinders enable the creation of a complex master key setup with several levels and sub-levels – perfect for access customisation. Effective master key system design reduces the number of keys they need to cut, track or replace. It saves hotel managers time and money. “It is a truly flexible solution and allows us to limit the quantity of keys assigned as much as possible,” says Carmelo Sava, Head of Maintenance at TH Resorts. Effective master key system design reduces the number of keys they need to cut, track or replace Five distinct master key systems – numbering more than 500 CYS10 cylinders in total – were implemented at TH Capo Rizzuto, one for each of the resort’s individual facilities. Each cylinder has its own paired key and, for each building, a master key opens all cylinders. The entire property is controlled by a single grand master key entrusted to management. Future-proof setup at Capo Rizzuto “The ASSA ABLOY master key system allows us to manage the access of all our staff without any security problems,” adds Carmelo Sava. To ensure future-proof setup at Capo Rizzuto, their key systems can adapt or expand at any time: The CYS10 device range includes single, double, thumbturn, screw-in and rim cylinders for interior and exterior doors, switch cylinders for control panels, plus cam locks for letterboxes or furniture. The CYS10 padlock secures gates, lockers, and more.


Round table discussion
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Driving the smart homes market is the convenience of simple technology solutions. Almost every home now has a “smart speaker” that makes it easier than ever for homeowners to interface and control their technology. But where does security fit into the new landscape of smart home systems? We asked this week’s Expert Panel Roundtable: What’s new in smart homes and residential security systems?

Using artificial intelligence (AI) to automate physical security systems
Download
A modern guide to data loss prevention
Download
7 proven solutions for law enforcement key control and asset management
Download
The truth behind 9 mobile access myths
Download
Access control system planning phase 2
Download