Coastal surveillance
It is the launch of the International Maritime Cyber Security Organisation (IMCSO), an organisation that aims to raise the standard of cybersecurity risk assessment across the maritime industry. IMCSO The IMCSO has devised a certification programme for security consultants and a professional register, helping shipping organisations to confidently select experienced personnel. Alongside this, the IMCSO will also validate report outputs to ensure consistency with those reports then held on a ce...
Inverclyde security firm, Safer Group, has appointed Mark Walsh to the newly-created position of Chief Revenue Officer amid continued strong growth. Founded in 2016 by Greenock entrepreneur Ryan Clark, the Port Glasgow-based company specialises in protecting construction sites, infrastructure and assets with its high-tech intruder detection system, known as Safer PODs. It recently opened a second 6,000 sq ft unit at Kelburn Business Park as its new head office, after enjoying a record-breaking...
The Generation Ready conference is set to return for its third edition on 2nd July at the Avani Pemba Beach Hotel, Cabo Delgado, hosted as a prelude to the 3rd Mozambique Energy & Industry Summit (MEIS 2024), in a first-time unique collaboration between Field Ready and GEP. Youth employability Gilberto Botas, Chairman of Field Ready Mozambique explained, “Bringing together a community of like-minded people devoted to youth employability is central to the Field Ready’s wor...
Control and automation manufacturer RTI announced that Eric Randt has joined the company as National Sales Director for the United States and Canada. Reporting to CEO Joe Roberts, Randt will oversee RTI initiatives that grow RTI and Blustream sales with commercial and residential integrators across the country. National Sales Director "We are happy to welcome Eric as our National Sales Director. I've known Eric and worked with him before. His experience with strategic customers in our key cha...
Automated Logic is proud to announce the expansion of its OptiFlex controller line for the WebCTRL® building automation system. Two new controllers join the OptiFlex family, including the OptiFlex 022 (OF022-E2) zone controller and the OptiFlex compact segment router (OFCSR-E2). These controllers feature dual IP ports for convenient daisy-chain deployment and a compact footprint for a more flexible system design. Automated Logic, a provider of innovative building-management solutions,...
With the ability to provide power and data via Ethernet cable, this injector is compatible with high-power PoE+ IEEE 802.3at and PoE IEEE 802.3af devices, ensuring versatile compatibility. The user enjoys lightning-fast 1000-Mbit/s gigabit Ethernet transmission speed and effortless setup with its Plug and Play functionality – no configuration required! Its Auto-Sensing LAN Port supports 10/100/1000 Mbit/s for optimal performance. Plus, with simple and fast installation options for m...
News
barox Kommunikation AG, the global manufacturer of professional standard managed and unmanaged switches, PoE media converters, and IP extenders, will be showing their range of Ethernet switches and Device Management System (DMS) VMS integration technology, at The Security Event (TSE), taking place between 30 April - 2 May 2024 at the NEC, Birmingham. Visitors can find barox at stand number 5/P90, where they will be showing their support of professional systems integrators by demonstrating the ease and depth of integration to a wide range of 3rd party VMS/PSIM control systems - via an unparalleled range of integration plugins, including those for Milestone, Genetec, and Genesys by ISM. Advanced barox integration capability Ethernet switch products and advanced DMS network monitoring tool are integrated with Genesys by ISM Among the integrations on display, for the first time at TSE, barox will show how their ethernet switch products and advanced DMS network monitoring tool are integrated with Genesys by ISM - the NPSA-approved command and control platform due to its CAPSS certification. With this advanced barox integration capability, security surveillance solutions for Government, MOD, data centres, and other high-security sectors, to name but a few, now have access to sophisticated network diagnostic tools, across site-wide security systems and Building Management Solutions, via - Genesys by ISM integrated command and Control platform. Biotechnology benefits barox advanced third-party integration enables access to the full range of biotechnology benefits, including Active Camera Monitoring, PoE monitoring, Active PoEPower-up Management, and Non-Stop PoE-while their easy-to-use graphical interface and diagnostic tools give the ability for network switches to act as ‘health centres’ devices on the network. In addition, providing ultimate peace of mind, barox integration delivers strengthened cyber security between the camera and command and control platform including authentication certificate login. Ethernet switch integration barox switches can be used to autonomously send a re-boot command, saving invaluable device downtime With barox Ethernet switch integration, enhanced diagnostic data showing the status of cameras and switches in a graphical chart enables the fast pinpointing of network or device issues enabling faults and outages to be diagnosed remotely. For example, suppose a network camera fails to respond. In that case, barox switches can be used to autonomously send a re-boot command, saving invaluable device downtime and in many cases can bring a device back online/resolve the issue with no engineer involvement. Video surveillance management In the case of a security breach, devices can be disabled at the user level to maintain operation, while full remote control of PoE on ports allows users to reset or switch them off if required. This advanced capability stands barox apart from other network equipment manufacturers and has proven to be an invaluable asset and quite literally, ‘game-changing’ in managing high security video surveillance networks. RY-LGSO38-10 19" 10Gb Ethernet switch Layer 2 and Layer 3 devices were developed to cater to the ever-increasing bandwidth demands Also to be seen at the show, barox will reveal their new RY-LGSO38-10 19" 10Gb Ethernet switch, featuring 10 x 10Gb port capability with a substantial 200Gb backplane, DMS, strong security features, and dynamic routing. The first of a new range of 10Gb SFP switches, the Layer 2 and Layer 3 devices were developed specifically to cater to the ever-increasing bandwidth demands of modern video over IP and video streaming in conjunction with multicast for large projects and the latest camera advancements. Extensive security features The new switch also boasts extensive security features, that protect both the switch itself and network traffic. The most complex network requirements can be met with its extensive management options. Commenting on the show, Sarah Moss, barox Sales Manager UK & Eire says, “We are looking forward to exhibiting at this year’s The Security Event, demonstrating how barox’s unique depth of switch and integration technology can optimise video network performance, management and efficiencies.” Extensive integration capability Rudolf Rohr, barox Co-founder & Managing partner said, “We are looking forward to demonstrating barox’s technical ability to integrate its DMS network monitoring tool into third-party VMS platforms at this year’s TSE." "This ability is unique in the CCTV market and has the potential to dramatically reduce support engineering calls and costs, by helping to quickly pinpoint and potentially resolve network, device, and cable issues without any user interaction. This extensive integration capability sets barox apart from other switch providers and is just one step on our journey to further build our international brand.”
SALTO WECOSYSTEM, a provider of access control, ID management, and smart locker solutions, proudly announced the recipients of its esteemed partner awards during a special breakfast ceremony held on Thursday, April 11, 2024, at the annual ISC West trade show in Las Vegas. Colin DePree, Sales Strategy, SALTO WECOSYSTEM North America, extended his heartfelt congratulations to the award winners, expressing gratitude for their relentless commitment to excellence. Access control and security "We are immensely proud to honour our business partners who continuously demonstrate unparalleled dedication to enhancing access control and security solutions,” said DePree. “Their hard work and innovation play a pivotal role in helping us shape the future of access control. Thank you to all of our partners for their invaluable contributions." Four pillars of success Every year, SALTO WECOSYSTEM recognises select business partners for their dedication Every year, SALTO WECOSYSTEM recognises select business partners for their dedication to delivering access control solutions and for their emphasis on the company's four pillars of success: Fostering a culture of learning and impact, getting closer to the customer, building the brand, and achieving sustainable growth. The awards ceremony, held amidst physical security industry pioneers and innovators at ISC West, celebrated the outstanding contributions of these partners in advancing security technology and fostering customer satisfaction. 2023 Partner Awards The recipients of the SALTO WECOSYSTEM 2023 Partner Awards are as follows: Eagle Award Apex Systems Group, Colorado Integration Technology Partner of the Year Motorola Solutions Video Security and Analytics, Texas National Partner of the Year Convergint Inspired Business Partner Awards West - Integrated Protection Systems, Inc., Brooklyn Park, MN Southeast - Tex-Oma Builders Supply Company, Wichita Falls, TX Northeast - Central Security Integration Solutions, New York City Regional Business Partner of the Year West Pacific Northwest - Fire Power Inc., Spokane, WA West Central - PRO SECURITY PRODUCTS, Sandy, UT Southwest - Netronix, Fullerton, CA Mountain West - Volta Systems Group, Las Vegas, NV Plain States - Nex-Tech, Hays KS Western Canada - Smart Tek Communications, Richmond, BC Southeast South Texas/Louisiana - Communications Cabling Innovations, Houston, TX North Texas, OK and AR - Ntouch Networks, Hurst, TX Southeast Region - Basesix, Atlanta GA Northeast New York City - LIF Industries, Port Washington, NY Great Lakes - All Secured Security Services, Columbus, OH Northeast Region - Hogan Security Group, Pennington, NJ Quebec - Groupe Central, Saint-Leonard, Canada Ontario - JPW Systems, Ontario, Canada Breakout Business Partner of the Year West Pacific Northwest - Ednetics Inc., Post Falls, ID West Central - COMER COMMUNICATIONS, Redding, CA Southwest - Security 101 San Diego, San Diego, CA Mountain West - Colorado Doorways, Inc., Denver, CO Plain States - Turnkey Solutions, Fargo ND Western Canada - Complete Security Installs, Surrey, BC Southeast South Texas/Louisiana - York Access Control, Corpus Christi, TX North Texas, OK and AR - Ascenda Services, Tuscola, TX Southeast Region - Invision Technologies, Albany GA Florida Region - Infrastructure Solutions Co. /Infrasol, Miami Lakes, FL Northeast New York City - Signitel Inc, Brooklyn, NY Mid Atlantic - Empire Communication Systems, Altoona, PA Northeast Region - Setronics Inc., Billerica, MA Eastern Canada - AZ Serrurier, Québec, QC Central Canada - Security Locksmith and Design, Mississauga, ON
ZE Government Solutions (ZEGS) announces it has been selected by AFWERX for an SBIR Phase II contract in the amount of $1,247,962.00 focused on coastal security and awareness to address the most pressing challenges in the Department of the Air Force (DAF). The ZE Coastal Alert System (Z-CAS) solution will be digital, portable, and self-sustaining designed to protect valuable USAF assets on Joint Base Charleston including the $7.5 billion in base property and capital assets spread across three seaports, two civilian-military airfields, 39 miles of rail, and 22 miles of coastline. Deploying the ZeroEyes solution with lightweight, portable platforms equipped with state-of-the-art radars, artificial intelligence for threat identification, and an aggregation platform for critical C2 operations will leave forces stronger equipped for future challenges. Small business experience DAF began offering the Open Topic SBIR/STTR program in 2018 which grew the range of innovations The Air Force Research Laboratory and AFWERX have partnered to streamline the Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR) process by accelerating the small business experience through faster proposal to award timelines, changing the pool of potential applicants by expanding opportunities to small business and eliminating bureaucratic overhead by continually implementing process improvement changes in contract execution. The DAF began offering the Open Topic SBIR/STTR program in 2018 which expanded the range of innovations the DAF funded and now in March 2024, ZEGS will start its journey to create and provide innovative capabilities that will strengthen the national defence of the United States of America. SBIR Phase II award “The ZE Coastal Alert System will proactively identify, track, and respond to imminent threats in real-time, providing warning and actionable intelligence where traditional coastal security may face challenges,” said Mike Lahiff, CEO and co-founder of ZeroEyes, parent company of ZEGS. “We are thrilled to receive this SBIR Phase II award, and remain committed to excellence in national security innovation.”
SONITROL, the pioneering provider of integrated business security solutions, has achieved a significant milestone by reaching 60 years in business. The company will commemorate its six decades of achievements over the coming months and to mark the occasion has joined the Partner Alliance for Safer Schools (PASS) in order to work with the education community to better secure schools and create safer learning environments. In 1963 Robert Baxter met Al Cronk in Anderson, Indiana. Baxter was an inventor who coined the name SONITROL by combining the words sound and control, while Cronk was a local police officer who also owned an alarm company. After discussing how they could help eliminate false alarms by using technology to listen-in and verify whether intruders were in a building, they founded SONITROL in 1964. Franchise and distribution network "Like many successful businesses, SONITROL was the result of a great idea that solved a problem," commented Julie Beach, the company’s vice president. "Not only did Baxter and Cronk pioneer impact-activated audio sensor technology, but they took it to market via a franchise and distribution network. In 1968 SONITROL sold its first franchise in Detroit, Michigan, and its first project was to provide a school security system." Network of expert dealers Network of expert dealers provides cutting-edge integrated verified security solutions for intrusion SONITROL soon became the largest franchise-based security network in the United States and now has a network of 71 franchises and 43 corporate offices across North America. This network of expert dealers provides cutting-edge integrated verified security solutions for intrusion, video, access control and fire, providing some of the fastest police response times, lowest false alarm rates and the best apprehension record – over 187,000 and counting – in the security industry. Given its proud history of working within educational environments, SONITROL has chosen to mark its 60th anniversary by becoming a PASS Partner. Established in 2014, PASS is a non-profit group that brings together expertise from the education, public safety, and industry communities to support a coordinated approach to proven security practices specific to K-12 environments, while enabling school administrators and school boards to make informed decisions on security investments. Supporting PASS's mission SONITROL’s employees will have PASS access, five full days of on-site training As a Tier 4 PASS Partner, which is the highest level of corporate partnership, SONITROL joins a select group of organisations that share a commitment to supporting PASS's mission of providing resources, guidelines, and best practices to help create safer environments for students, educators, and staff. As well as being able to use PASS branding, SONITROL’s employees will have PASS access, five full days of on-site training and the availability of all PASS webinars. SONITROL’s support "It gives me great pleasure to welcome SONITROL," stated Chuck Wilson, Board Chairman and co-founder of PASS. "PASS continues to develop valuable resources, such as the PASS Safety and Security Guidelines for K-12 Schools, which serve as a cornerstone for proactive safety planning. SONITROL’s support enables us to further our efforts in promoting comprehensive approaches to school safety, encompassing everything from infrastructure enhancements to emergency preparedness. Together, PASS and SONITROL will work tirelessly to ensure that schools remain safe, nurturing environments where students can thrive." SONITROL dealer network Attendees from SONITROL dealer web will also be able to take part in product education sessions SONITROL is getting set to celebrate its 60th anniversary at its annual SONITROL National Dealers Association (SNDA) Convention, which this year takes place in Louisville, Kentucky, on March 14th-17th. Dealers, employees, and their families will gather to recognise the best in leadership, sales, marketing, administration, customer service, operations, human resources, and technical support throughout North America. Attendees from the SONITROL dealer network will also be able to take part in product education sessions and there will also be an exhibit hall with a variety of vendors. There will also be a very special event at the famous Churchill Downs horse racing complex on Friday 15th to celebrate SONITROL’s 60th anniversary. An awards banquet will then be held on Saturday 16th, where various accolades will be presented to winners across the dealer network for their outstanding performance. Nation's educational establishments "2024 is a very special year for SONITROL and our 60th anniversary provides an excellent opportunity to reflect on the company’s many achievements," concluded Julie Beach. "Given that Robert Baxter and Al Cronk built the early franchise network around providing impact-activated audio detection technology to schools, becoming a PASS Partner is particularly appropriate, and we are honoured to contribute to the collective goal of safeguarding our nation's educational establishments. The SNDA Convention is a great opportunity to celebrate SONITROL’s past, present and future, and I look forward to welcoming members of our dealer network to Louisville."
The eighth edition of the Doha International Maritime Defence Exhibition and Conference (DIMDEX 2024), held under the patronage of HH Sheikh Tamim Bin Hamad Al-Thani, Amir of the State of Qatar, and hosted and organised by the Qatar Armed Forces at the Qatar National Convention Centre (QNCC), concluded on March 6th, 2024 with a strong presence from international and local exhibitors and a large number of visitors. The eighth edition, which ran from 4 to 6 March and was held under the theme of “Igniting the Future Of Maritime Security and Beyond,” achieved unprecedented success, surpassing all previous editions. Contracts, MoUs, and LoIs Participation of more than 200 international and national companies that showcased their latest innovations During the show, more than QAR 5 billion worth of contracts were signed in addition to various MoUs and Letters of Intent, and welcomed over 25,000 visitors, witnessing the participation of more than 200 international and national companies that showcased their latest innovations, technologies, and comprehensive defence and maritime security solutions in addition to 9 international pavilions that included various companies, authorities, and institutions. Staff Brigadier (Sea) Abdulbaqi Saleh Al-Ansari, Chairman of the Organising Committee of DIMDEX 2024, stated, “The eighth edition of DIMDEX was a resounding success, with a large number of international and local companies participating, as well as more than 110 official VIP delegations." Technology, cyber security, and artificial intelligence "This year, the value of contracts exceeded QAR 5 billion, reaffirming the international exhibition's position as a major platform for companies to facilitate agreements and lock in commercial contracts, while the number of visitors was over 25,000, emphasising its importance as one of the specialised events in the international maritime defence and security domain - in line with the country's strategy to strengthen its global position in hosting expertise-led major events." "DIMDEX also highlighted the latest innovations in the fields of technology, cyber security, and artificial intelligence, which have all proven critical to the success of the current defence missions.” Modern defence innovations He added, “DIMDEX demonstrates the State of Qatar's commitment to offering a platform for showcasing the most modern defence innovations, as well as an opportunity for major companies to showcase solutions to the most pressing current and future challenges." "The event also highlights the country’s efforts to build long-term partnerships, expand economic prospects, and stimulate growth. We look forward to a new and successful edition of DIMDEX in 2026, as we continue to contribute to the goals of the National Vision 2030 of achieving economic diversification and promoting development across various fields.” Project 401 for Special Operations Special Operations Training Centres dedicated to enhancing the capabilities of special forces National companies, authorities, and institutions had a notable presence, with active participation from the Qatar Armed Forces and its various branches. The event also witnessed the inauguration of Project 401 for Special Operations, which features Special Operations Training Centres dedicated to enhancing the capabilities of special forces and counter-terrorism units globally. Maritime ecosystem's safety and security The maritime defence exhibition expanded its offerings to include other critical defence categories that complement the maritime ecosystem's safety and security, with exhibitors showcasing their latest innovations and integrated solutions in this domain. In addition to the main exhibition, the event hosted the Middle East Naval Commanders Conference in partnership with the Strategic Studies Centre, themed ‘Economic Growth Prospects Amidst Security Challenges and Their Global Impact’, and featured international speakers, academics, and military pioneers. Hamad Port also welcomed 8 warships as part of the visiting warships display.
Allied Universal®, the world’s renowned security and facility services company, is proud to announce that its client, the Helen Delich Bently Port of Baltimore has received a top U.S. Coast Guard security assessment for the 15th consecutive year. Security assessment The assessment which included a detailed review of all security protocols and procedures is for the six state-owned, public marine terminals that are managed by the Maryland Port Administration (MPA). The U.S. Coast Guard Sector Maryland conducts an annual inspection at Maryland’s Port of Baltimore to ensure compliance with federal security regulations. Robust security solutions Allied Universal recognises the importance of maintaining the highest level of security for the port Allied Universal recognises the importance of maintaining the highest level of security for the Port of Baltimore and is committed to continually providing robust, industry-renowned security solutions to keep the port’s workers and visitors safe. “Allied Universal is honoured to serve the Helen Delich Bently Port of Baltimore, and we are pleased to learn of this outstanding ranking by the U.S. Coast Guard,” said Tracey Fuller, President of Government Services for Allied Universal. Facility-specific solutions Tracey Fuller adds, “We take pride in our ability to provide a range of highly effective, facility-specific security solutions to the port so it can continue to serve the greater Baltimore community as a hub for economic growth, a stronghold for hundreds of thousands of jobs and traveling visitors.” Of the nation’s more than 300 ports, the Port of Baltimore is ranked first for the volume of autos and light trucks, farm and construction machinery, and imported sugar and gypsum. It also includes a cruise passenger terminal.
Expert commentary
When a bomb detonated in the Port of Beirut, I had hundreds of employees under my care inside the blast zone. Within just two hours, I was able to determine who was impacted, understand their safety conditions, and share resources for on-the-ground support—all thanks to mobile technology. For Chief Security Officers, receiving calls like these launches a variety of protocols and necessary decision-making with the safety and security of people and assets as a top priority. And these calls are only becoming more common. Dependence on threat intelligence Mobile phones have dominated the post-COVID environment where people work from anywhere Threats ranging from natural disasters to geopolitical conflicts are becoming more frequent and complicate the responsibility organisations have in keeping their people safe. To meet these needs CSO’s are staying ahead of negative outcomes through creating a greater dependence on threat intelligence. In these times, effective, real-time risk management depends on hyper-local data from technology that is accessible, portable, and dynamic–such as cell phones. Mobile phones have revolutionised the way people live and work. They allow us all to walk around with a computer in our pocket, bringing the world to our fingertips and eliminating digital borders for over 90% of the world's population. Mobile phones have dominated the post-COVID environment where people work from anywhere and have geographically distributed teams but are also more vulnerable to threatening events. Mobile-friendly risk management platforms Mobile technology assigns workers with easy entry to data that can help keep them and their teams safe As we approach 2024, many organisations are adopting comprehensive risk management tools that empower personnel across the organisation with the intelligence and knowledge they need to stay safe wherever they are. Mobile-friendly risk management platforms, such as Crisis24 Horizon, provide always-on awareness, on-hand threat intelligence, and immediate communications and distress signalling through location monitoring. Users receive location risk assessments and push notifications directly to their devices about nearby issues and threats no matter if they are on or off the job. While only select risk managers have complete control of the platform and all sensitive employee data is protected through encryption, the app distributes critical intel to foster a culture of shared awareness and responsibility. Thus, mobile technology empowers employees with easy access to information that can help keep them and their teams safe. Creating a culture of mobile technology adoption In the last few years, the world has proven the importance of being well-informed of risks and mitigation plans to minimise harm. However, psychological barriers tend to trump physical barriers when it comes to accessing the vast array of tools our mobile devices offer. World has proven the matter of being well-informed of risks and relief plans to minimise harm Adopting this technology and establishing a culture that enforces risk management across an organisation is a daunting challenge that demands substantial commitment from leadership to be successful. Some companies have tackled this challenge by positioning security technology as part of the organisation’s employee benefits package, such as commuter benefits and health insurance, to encourage people to take advantage of these resources and learn how to use them. Cohesive risk management culture Technology is only as effective as the people whose actions it informs, which is why adoption and integration are so important. When a cohesive risk management culture meets a powerful technology platform, individuals are enabled to receive threat alerts and counter their impacts, letting others know when and how to take the necessary precautions to protect themselves and their team. For more information on mobile technology and other security trends, check out the Global Risk Forecast, an annual report by Crisis24 that provides a comprehensive analysis of key events around the world most likely to affect operations in the coming year.
Global transportation networks are becoming increasingly interconnected, with digital systems playing a crucial role in ensuring the smooth operation of ports and supply chains. However, this reliance on technology can also create vulnerabilities, as demonstrated by the recent ransomware attack on Nagoya Port. As Japan's busiest shipping hub, the port's operations were brought to a standstill for two days, highlighting the potential for significant disruption to national economies and supply chains. Transportation sector The attack began with the port's legacy computer system, which handles shipping containers, being knocked offline. This forced the port to halt the handling of shipping containers that arrived at the terminal, effectively disrupting the flow of goods. The incident was a stark reminder of the risks associated with the convergence of information technology (IT) and operational technology (OT) in ports and other critical infrastructures. This is not an isolated incident, but part of a broader trend of escalating cyber threats targeting critical infrastructure. The transportation sector must respond by bolstering its defences, enhancing its cyber resilience, and proactively countering these threats. The safety and efficiency of our transportation infrastructure, and by extension our global economy, depend on it. Rising threat to port security and supply chains XIoT, from sensors on shipping containers to automatic cranes, are vital to trendy port functions OT, once isolated from networked systems, is now increasingly interconnected. This integration has expanded the attack surface for threat actors. A single breach in a port's OT systems can cause significant disruption, halting the movement of containers and impacting the flow of goods. This is not a hypothetical scenario, but a reality that has been demonstrated in recent cyberattacks on major ports. Adding another layer of complexity is the extended Internet of Things (XIoT), an umbrella term for all cyber-physical systems. XIoT devices, from sensors on shipping containers to automated cranes, are now integral to modern port operations. These devices are delivering safer, more efficient automated vehicles, facilitating geo-fencing for improved logistics, and providing vehicle health data for predictive maintenance. XIoT ecosystem However, the XIoT ecosystem also presents new cybersecurity risks. Each connected device is a potential entry point for cybercriminals, and the interconnected nature of these devices means that an attack on one, which can move laterally and can have a ripple effect throughout the system. The threat landscape is evolving, with cybercriminals becoming more sophisticated and their attacks more damaging with a business continuity focus. The growing interconnectivity between OT and XIoT in port operations and supply chains is also presenting these threat actors with a greater attack surface. Many older OT systems were never designed to be connected in this way and are unlikely to be equipped to deal with modern cyber threats. Furthermore, the increasing digitisation of ports and supply chains has led to a surge in the volume of data being generated and processed. This data, if not properly secured, can be a goldmine for cybercriminals. The potential for data breaches adds another dimension to the cybersecurity challenges facing the transportation sector. Role of cyber resilience in protecting service availability Cyber resilience refers to organisation's ability to prepare for, respond to, and recover from threats As the threats to port security and supply chains become increasingly complex, the concept of cyber resilience takes on a new level of importance. Cyber resilience refers to an organisation's ability to prepare for, respond to, and recover from cyber threats. It goes beyond traditional cybersecurity measures, focusing not just on preventing attacks, but also on minimising the impact of attacks that do occur and ensuring a quick recovery. In the context of port operations and supply chains, cyber resilience is crucial. The interconnected nature of these systems means that a cyberattack can have far-reaching effects, disrupting operations not just at the targeted port, but also at other ports and throughout the supply chain. A resilient system is one that can withstand such an attack and quickly restore normal operations. Port operations and supply chains The growing reliance on OT and the XIoT in port operations and supply chains presents unique challenges for cyber resilience. OT systems control physical processes and are often critical to safety and service availability. A breach in an OT system can have immediate and potentially catastrophic physical consequences. Similarly, XIoT devices are often embedded in critical infrastructure and can be difficult to patch or update, making them vulnerable to attacks. Building cyber resilience in these systems requires a multi-faceted approach. It involves implementing robust security measures, such as strong access controls and network segmentation, to prevent attacks. It also involves continuous monitoring and detection to identify and respond to threats as they occur. But perhaps most importantly, it involves planning and preparation for the inevitable breaches that will occur, ensuring that when they do, the impact is minimised, and normal operations can be quickly restored. Building resilience across port security and supply chains In the face of cyber threats, the transport sector must adopt a complete method of cybersecurity In the face of escalating cyber threats, the transportation sector must adopt a comprehensive approach to cybersecurity. This involves not just implementing robust security measures, but also fostering a culture of cybersecurity awareness and compliance throughout the organisation. A key component of a comprehensive cybersecurity strategy is strong access controls. This involves ensuring that only authorised individuals have access to sensitive data and systems. It also involves implementing multi-factor authentication and regularly reviewing and updating access permissions. Strong access controls can prevent unauthorised access to systems and data, reducing the risk of both internal and external threats. Network segmentation Network segmentation is another crucial measure. By dividing a network into separate segments, organisations can limit the spread of a cyberattack within their network. This can prevent an attack on one part of the network from affecting the entire system. Network segmentation also makes it easier to monitor and control the flow of data within the network, further enhancing security. Regular vulnerability assessments and patch management are also essential. Vulnerability assessments involve identifying and evaluating potential security weaknesses in the system, while patch management involves regularly updating and patching software to fix these vulnerabilities. These measures can help organisations stay ahead of cybercriminals and reduce the risk of exploitation. EU’s NIS2 Directive EU’s NIS2 Directive came into effect, and member states have until October 2024 to put it into law The transportation sector must also be prepared for greater legislative responsibility in the near future. The EU’s NIS2 Directive recently came into effect, and member states have until October 2024 to put it into law. The Directive aims to increase the overall level of cyber preparedness by mandating capabilities such as Computer Security Incident Response Teams (CSIRTs). Transport is among the sectors labelled as essential by the bill, meaning it will face a high level of scrutiny. Getting to grips with the complexities of XIoT and OT integration will be essential for organisations to achieve compliance and avoid fines. Global transportation infrastructure Finally, organisations must prepare for the inevitable breaches that will occur. This involves developing an incident response plan that outlines the steps to be taken in the event of a breach. It also involves regularly testing and updating this plan to ensure its effectiveness. A well-prepared organisation can respond quickly and effectively to a breach, minimising its impact and ensuring a quick recovery. In conclusion, mastering transportation cybersecurity requires a comprehensive, proactive approach. It involves implementing robust technical measures, fostering a culture of cybersecurity awareness, and preparing for the inevitable breaches that will occur. By taking these steps, organisations can enhance their cyber resilience, protect their critical operations, and ensure the security of our global transportation infrastructure.
Open platform video technology software is more than just a product; it's a tool that helps customers achieve their desired business outcomes. Safety, round-the-clock security, and increased operational efficiencies are now the norm due to video technology. Responsible Technology Despite humanity’s impressive technological advances, we also recognise the immense responsibility that comes with technological innovation. It's not enough to focus solely on the positive impact video technology can make, we must also be vigilant in identifying and addressing any potential negative consequences it can have on society and its citizens. This is the role of Responsible Technology. Data privacy We want to use all the good things that technology innovation brings, whether it be video, AI, ML, facial recognition, etc. We want to use all the good things that technology innovation brings, whether it be video, Artificial Intelligence, machine learning, facial recognition, etc. to serve people in societies in a responsible way. That means making sure that we regulate technology in a way that respects human rights and data privacy. Addressing the challenges The challenge is, that rather often technology leaders and policymakers either have conflicting interests or collaborate too late. To be responsible, business leaders must support their societies and policymakers in making regulations in the interest of the common good. At Milestone Systems, we are actively looking at how we develop our software responsibly, how our partners responsibly sell our software, and very importantly, how our customers use our software with a responsible mindset. Ensuring good corporate governance As a long-time partner within the security industry, we’re celebrating our 25th Anniversary this year, we are supporting the regulation of video technology for the good of society. However, it of course needs to strike the fine line between the right legislation and not hindering innovation. UNGP The UNGP is the most authoritative and widely adopted set of principles for responsible business At Milestone Systems, we want to play an active role in this and that is why we have pledged our support to the UN's Guiding Principles on Business and Human Rights (UNGP). The UNGP is the most authoritative and widely adopted set of principles for responsible business. The principles call on governments and companies to identify, prevent, mitigate, and remedy actual and potential human rights abuses. Since its launch in 2011, the UNGPs have received wide support from states, civil society organisations, and the private sector, making them the key global foundation for business and human rights. Protect, respect, and remedy Through this commitment, we are taking steps to ensure good corporate governance and ethical standards in the development of our technology. We're generating mechanisms to prevent misuse and we are building educational practices internally. Based on the UNGP’s three pillars: protect, respect, and remedy, we are developing a set of Responsible Technology Principles and procedures for the development, selling, and use of our products. Need for video technology regulation In addition, we are currently evaluating all the various technology areas in which our video software can be used, such as with third-party integrations that utilise e.g., facial recognition. We are mapping out the advantages and disadvantages for societies. One key area of concern is how local authorities are mapping and storing data about us as individuals. This is the reason why we're inviting more legislation to regulate video technology rather than less. Engaging With policymakers We are meeting ministers and trade organisations as we believe this needs to be a joint effort where all parties are heard We are proactively reaching out to and connecting with policymakers and other relevant stakeholders to discuss our approach to and take on Responsible Technology and encouraging the political landscape to work with us around regulation and legislation. We are meeting ministers and trade organisations as we believe this needs to be a joint effort where all parties are heard and where we can openly weigh the advantages and the challenges of technology, whether it is video, facial recognition, machine learning, Artificial Intelligence, or other technologies. Striking a balance Implementing Responsible Technology is a journey, not a destination. To give it the focus needed, we have created a dedicated team to implement this initiative at Milestone Systems. At the same time, we are reaching out to the political landscape to discuss how we balance regulation without hindering innovation. Video technology used ethically We are a global company with worldwide operations, and we are having dialogues about how video technology is being used and how we can have meaningful talks about what regulation and legislation should look like. However, we don’t necessarily want to limit access to the technology itself. Facial recognition We encourage the policymakers to engage with us in the industry so that together we can strike the fine line Facial recognition is a great example of this. The EU is considering making live facial recognition illegal. That would be a huge inhibitor of proactive terrorism prevention. For example, if a well-known terrorist is walking down the street and is being mapped out against Interpol’s most wanted list, the authorities should be able to react. However, if a person walking down the street but is not mapped out or does not have any priors then the city should not be allowed to store the data of that individual’s whereabouts at that point in time. This potential legislation is concerning to me as a citizen of Europe. Instead, we encourage the policymakers to engage with us in the industry so that together we can strike the fine line for the better good of all of us. Maintaining high ethical standards We have a firm understanding and expectation that ethical standards are a huge driver in the security business. Citizens are not in favour of technology companies abusing data about them and monetising from things that they have not opted in to do. Soon, I think we will see many more companies and governments leaning toward suppliers that do have a responsible mindset and high ethical standards for partnerships. Ethical practices Our journey toward Responsible Technology is an ongoing process, and we must remain steadfast in our commitment to ethical practices and the protection of human rights. We recognise that the rapidly changing technological landscape continually presents new challenges and opportunities. For this reason, we continuously look into how we can improve, for example, our end user licence agreements to avoid potential human rights abuses. An industry responsibility Security companies must prioritise careful planning and preparation, including developing policies and procedures For Responsible Technology to truly become a reality, compliance with international human rights laws and data privacy regulations is critical. Security companies must prioritise careful planning and preparation, including developing policies and procedures that govern the ethical use of video surveillance systems. The secure and ethical community In today's technology environment where deep integrations, machine learning, and artificial intelligence are becoming the norm, Responsible Technology is more relevant than ever. The security industry has a unique opportunity to set an example for other sectors by promoting a secure and ethical development community that prioritises Responsible Technology, trustworthy data collection, and the protection of human rights. We must all rise to this challenge and embrace our role as ethical leaders for the greater good of both people and societies.
Security beat
Fueled by mounting concerns about the cybersecurity vulnerability of U.S. ports, President Joe Biden has signed an Executive Order aimed at shoring up defences against cyberattacks. Cybersecurity initiative The cybersecurity initiative marks a significant shift in policy, empowering key agencies and outlining concrete actions to bolster defences. By empowering agencies, establishing clear standards, and fostering collaboration, the initiative aims to strengthen U.S. ports against the evolving threat of cyberattacks, safeguarding the nation's maritime economy and national security. Expanded authority for DHS The proactive approach aims to prevent incidents before they occur The Executive Order grants expanded authority to the Department of Homeland Security (DHS) and the Coast Guard to address maritime cyber threats. DHS gains the power to directly tackle these challenges, while the Coast Guard receives specific tools. The Coast Guard can compel vessels and waterfront facilities to address cyber vulnerabilities that endanger safety. The proactive approach aims to prevent incidents before they occur. Real-time information sharing Reporting any cyber threats or incidents targeting ports and harbors becomes mandatory. This real-time information sharing allows for swifter response and mitigation efforts. The Coast Guard also gains the authority to restrict the movement of vessels suspected of posing cyber threats. Inspections can be conducted on vessels and facilities deemed risky. Mandatory cybersecurity standards The standardisation aims to eliminate weak links in the chain and prevent attackers from exploiting Beyond these broad powers, the Executive Order establishes foundational elements for improved cybersecurity. Mandatory cybersecurity standards will be implemented for U.S. ports' networks and systems, ensuring a baseline level of protection across the board. This standardisation aims to eliminate weak links in the chain and prevent attackers from exploiting individual vulnerabilities. Importance of collaboration and transparency Furthermore, the initiative emphasises the importance of collaboration and information sharing. Mandatory reporting of cyber incidents fosters transparency and allows government agencies and private sector partners to work together in mitigating threats. Additionally, the Executive Order encourages increased information sharing among all stakeholders, facilitating a unified response to potential attacks. Maritime Security Directive The Executive Order encourages investment in research and development for innovative cybersecurity solutions To address specific concerns, the Coast Guard will issue a Maritime Security Directive targeting operators of Chinese-manufactured ship-to-shore cranes. This directive outlines risk management strategies to address identified vulnerabilities in these critical pieces of port infrastructure. The long-term success of this initiative hinges on effective implementation. The Executive Order encourages investment in research and development for innovative cybersecurity solutions, recognising the need for continuous improvement and adaptation to evolving threats. Recognising the urgency of cyber threats The initiative has been met with widespread support from port authorities, industry stakeholders, and cybersecurity experts who recognise the urgency of addressing cyber threats. However, some concerns exist regarding the potential burden of complying with new regulations for smaller port operators. Effective communication, resource allocation, and collaboration among all stakeholders will be crucial to ensure the successful implementation of this comprehensive plan. Enhancing cybersecurity The more impactful and noteworthy piece is the associated NPRM from the U.S. Coast Guard (USCG) “This Executive Order is a positive move that will give the U.S. Coast Guard (USCG) additional authority to enhance cybersecurity within the marine transportation system and respond to cyber incidents,” comments Josh Kolleda, practice director, transport at NCC Group, a cybersecurity consulting firm. The more impactful and noteworthy piece is the associated Notice of Proposed Rulemaking (NPRM) from the U.S. Coast Guard (USCG) on “Cybersecurity in the Marine Transportation System,” adds Kolleda. Portions of the notice of proposed rulemaking (NPRM) look similar to the Transportation Security Administration (TSA) Security Directive for the rail industry and the Emergency Amendment for the aviation industry. Coordinating with TSA on lessons learned The USCG should be coordinating with TSA on lessons learned and incorporating them into additional guidance to stakeholders and processes to review plans and overall compliance, says Kolleda. “At first glance, the NPRM provides a great roadmap to increase cybersecurity posture across the various stakeholders, but it underestimates the cost to private companies in meeting the requirements, particularly in areas such as penetration testing,” says Kolleda. Cyber espionage and threats The focus is on PRC because nearly 80% of cranes operated at U.S. ports are manufactured there “It is unclear if or how the federal government will provide support for compliance efforts. As this seems to be an unfunded mandate, many private companies will opt for the bare minimum in compliance.” “Cyber espionage and threats have been reported by the Director of National Intelligence from multiple nation-states including China, Russia, and Iran,” adds Paul Kingsbury, principal security consultant & North America Maritime Lead at NCC Group. The focus here is on the People’s Republic of China (PRC) because nearly 80% of cranes operated at U.S. ports are manufactured there, he says. Destructive malware “The state-sponsored cyber actors’ goal is to disrupt critical functions by deploying destructive malware resulting in disruption to the U.S. supply chain,” says Kingsbury. “These threat actors do not only originate in China or other nation-states but also include advanced persistent threats (APTs) operated by criminal syndicates seeking financial gain from such disruptions." "The threat actors don’t care where the crane was manufactured but rather seek targets with limited protections and defences. The minimum cyber security requirements outlined within the NPRM should be adopted by all crane operators and all cranes, regardless of where they are manufactured.” PRC-manufactured cranes Kingsbury adds, “The pioneering risk outlined in the briefing is that these cranes (PRC manufactured) are controlled, serviced, and programmed from remote locations in China." "While this is a valid concern and should be assessed, there are certainly instances where PRC-manufactured cranes do not have control systems manufactured in PRC. For example, there are situations in maritime transportation system facilities where older cranes have been retrofitted with control systems of European Union or Japanese origin.” Monitoring wireless threats “The Biden Administration’s recent Executive Order is a critical step forward in protecting U.S. ports from cyberattacks and securing America’s supply chains,” says Dr. Brett Walkenhorst, CTO at Bastille, a wireless threat intelligence technology company. “To ensure proper defence against malicious actors accessing port-side networks, attention must also be paid to common wireless vulnerabilities." "Attacks leveraging Wi-Fi, Bluetooth, and IoT protocols may be used to access authorised infrastructure including IT and OT systems. Monitoring such wireless threats is an important element in a comprehensive approach to upgrading the defences of our nation’s critical infrastructure.”
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Operational technology (OT) uses hardware and software to monitor and control physical processes, devices, and infrastructure. Historically, OT systems were not connected to the Internet and were therefore not vulnerable to cyber-threats. Internet of Things (IoT) However, today’s OT systems are increasingly part of a company’s networks as technologies converge and the Internet of Things (IoT) gains prominence. No longer can OT systems be counted on to be “air-gapped,” that is, not connected to other systems. When OT systems are vulnerable, companies face a “cyber-physical risk.” A bad actor could create a catastrophic risk in the physical security world by compromising OT systems. To understand more about OT and the related cybersecurity concerns, we spoke with Lisa Hammill, VP of Commercial Markets for Shift5, a company that applies cybersecurity best practices to OT systems and networks, thus dramatically reducing their cyber risk. Q: What is operational technology (OT)? How are the cybersecurity concerns for OT different than those for information technology (IT) systems? Hammill: Operational technology (OT) refers to the computer systems that underpin critical infrastructure, enabling it to run continuously and reliably. For example, planes and trains rely on OT to execute basic flying or driving commands. OT cybersecurity solutions for planes, trains, or weapon systems must be capable of the basics of IT cyber-hygiene Most OT is built on legacy technology manufactured before cybersecurity became a priority and relies on serial bus networks like MIL-STD 1553, CAN 2.0, or RS-232, instead of the standard TCP/IP communications protocols that IT security solutions can monitor and defend. Any effective OT cybersecurity solution for planes, trains, or weapon systems must be capable of the basics of IT cyber-hygiene, including ensuring signed software and firmware updates, full data capture, and continuous monitoring and detection aboard planes, trains, and weapon systems. This all makes cybersecurity for onboard OT difficult, but not impossible. Q: What is a “cyber-physical risk” and why is the term important? Hammill: Cyber-physical systems integrate digital components into physical objects and infrastructure; we focus on critical infrastructure like transportation as well as weapon systems. Cyber-physical risks manifest when actors intrude on these delicate processes to manipulate real-world outcomes, whether that’s grounding plane flights, or disabling train brakes. The risks of attacks facing OT within cyber-physical systems are highly consequential, can cause disruptions to civil society, economic disruption, and potential harm to citizens, as well as shift the balance of power in military conflict and geo-political matters. Q: Please describe the breadth of the risks when it comes to OT cybersecurity. Hammill: Cyber-physical attacks can jeopardise business and mission-critical operations, and risks are highly consequential when it comes to transportation systems, creating safety risks for operators and passengers, economic impact, and millions in downtime losses, remediation, and ransom payments. Transportation is a particularly vulnerable sector of critical infrastructure. An attacker could leverage a tested playbook to disrupt operations with minimal effort As we’ve seen from recent attacks demonstrating the attackers’ focus is trained on this space. The motivation of an attacker will vary, but for example, let’s say a bad actor wanted to target an aircraft to disrupt service and ground a flight. There have been examples of basic cyber-attacks targeting noncritical aircraft systems; however, many of these systems remain vulnerable. An attacker could leverage a tested playbook to disrupt operations with minimal effort. An attacker could target a system considered least critical to passenger safety systems categorised as a Design Assurance Level E (DAL E) like an in-flight entertainment system. This type of system has been hacked before and could be used as a vector for a ransomware attack. If an attacker takes control of video screens on seatbacks mid-flight, they would certainly damage passenger trust. They would also likely try to move up the design assurance level chain to gain further access. For example, when a plane pulls into a gate, communication between the aircraft and airline operations happens automatically. An attacker could exploit this connection to move from one system to another. If an attacker gets into those communications channels, they could alter data or hold it hostage, while the airline halted operations to resolve the issue. Q: What industries/markets are most vulnerable to OT cybersecurity threats and why? Hammill: Operational technology lacks the historical focus on cybersecurity that IT has, and basic best practices are nascent for OT industry-wide. Cyber-attacks targeting Colonial Pipeline and Florida's water systems (in 2021) have spurred those industries into action to prioritise cyber hygiene. The aviation and rail industries are watching and taking proactive steps to prevent such cyber-attacks. As weapons systems and vehicles on roads, rail lines, and in the air add on new technology, they are at risk of cyber-attacks Shift5 defends planes, trains, and weapon systems because these vehicles leverage a vast swath of distinct serial bus networks and protocols unseen in other critical infrastructure technologies. We have experts creating a tool that can monitor and detect traffic aboard these bespoke networks. And as weapons systems and vehicles on roads, rail lines, and in the air add on new technology, like autonomation, they are increasingly at risk of cyber-attacks. Q: What are the various sources of OT cybersecurity risks (e.g., other governments, individual hackers, criminal organisations, etc.)? Which are the most urgent and/or pervasive? Hammill: Because of their ability to cause deeply consequential impacts on the business, economy, and human safety, OT cybersecurity risks must be considered scrupulously. Attackers targeting OT could have a range of motivations, from financial gain or market advantage through the theft of intellectual property, to insider threats and geopolitical advantage in a contested environment. It’s no secret that most malicious adversaries choose the path of least resistance when developing their attack strategy. When OT is aboard planes, trains, and tanks, we’re only in the early innings of creating obstacles for those actors to overcome. One threat we’re watching closely is the evolution of ransomware targeting OT. Digital extortion could cause operational disruption and impact consumer trust. Q: What is the Shift5 approach to cybersecurity? Hammill: Shift5 extends 40 years of expertise in adversarial tactics, techniques, and procedures from IT endpoint security into the OT world. For the first time in history, operators can apply cybersecurity best practices to OT systems and networks, dramatically reducing their cyber risk. Shift5 allows rail, aerospace, and defense to generate data-informed insights and make accurate decisions Shift5 brings complete observability and threat detection to OT systems as cyber-physical attacks become an increasingly attractive strategy for digital attackers. By providing visibility into the data that powers their most expensive, longest-lived, and most consequential fleet assets, Shift5 allows rail, aerospace, and defense companies to generate data-informed insights and make timely, accurate decisions once considered impossible. Q: Has OT cybersecurity trailed IT cybersecurity in terms of awareness? If so, why is it true, and how can organisations become more aware (and more prepared) of OT cybersecurity risks? Hammill: OT cybersecurity is nascent compared to IT security, but the industry is catching up. While most organisations understand the importance of visibility and observability in IT systems to enable their defense, very few have this same level of oversight for their most expensive, consequential, and longest-lived OT-powered assets. Simple best practices geared towards defending OT can make an adversary’s job more difficult. Start with taking inventory of all OT assets, then move to gain situational awareness so you can develop your baseline for “normal” operations (and can identify any abnormal events), and finally take steps to shore up gaps in cybersecurity. Q: Tell me more about Shift5. Hammill: Shift5 was founded by Josh Lospinoso and Michael Weigand, two of 40 people hand-selected to stand up to U.S. Cyber Command, the nation’s most elite unit of cyber-defenders. There, Mike and Josh became familiar with challenges in defending weapons systems, and the idea for Shift5 was born. Shift5 provides OT cybersecurity and operational intelligence for fleet operators and military platforms Military weapon systems are built on the same OT infrastructure found within planes and trains, and today Shift5 provides OT cybersecurity and operational intelligence for fleet operators and military platforms. Our customers include the DoD, US Army, Air Force, and Navy, and several of the largest U.S. passenger rail and household-name aviation companies. Many of these industries are beginning to seek out partnerships with Shift5; for example, AEI HorizonX, the venture capital investment platform formed between AE Industrial and The Boeing Company, today works with Shift5. Q: What is the biggest misconception when it comes to OT cybersecurity? Hammill: A common misconception is that OT aboard planes, trains, or weapon systems isn’t at risk. Many security experts have implemented air gapping as a cybersecurity strategy to keep cybersecurity threats away from sensitive systems. However, due to the convergence of IT and OT, there are more inroads to OT than ever, and air gapping isn’t as effective. Transportation assets like planes and trains are flying and rolling data centers that produce valuable and useful data, and they need to be protected just as we protect client data or IP. It’s a hard problem to solve, but the stakes are high and attackers are increasingly aiming their attention at this surface area. Modern cybersecurity principles must be extended to the onboard OT networks of aerospace, rail, and defense Amid the war in Ukraine, we saw attackers target the Belarusian Rail System to thwart Russian adversaries, and Russia digitally attacked Viasat to disable this critical piece of infrastructure ahead of a kinetic strike. Digital attacks facing aerospace, rail, and defense targets are on the rise, and modern cybersecurity principles must be extended to their onboard OT networks. Q: How can organisations start to address these challenges? Hammill: Cybersecurity done well is a lot of preventative work, and when we hear no news, that’s often good news. The U.S. government has increased the levels of dialogue around cybersecurity risks facing US critical infrastructure operators and has led by example in sharing information to help critical infrastructure organisations bolster their defenses. I recommend that transportation organisations engage proactively with local FBI field offices or CISA Regional Offices to establish relationships in advance of any cyber-incidents and visit the websites of CISA and the FBI where they will find technical information and other useful resources. They should also take advantage of other resources like TSA, AAR, ICA, and relevant ISACs that have working groups focused on these challenges. I encourage every transportation operator to understand the risks for these large transportation assets through vulnerability assessments, pen testing, and exercises just as they do with their IT environments.
Case studies
“BCD’s solution perfectly fit our scenario. All I needed to hear was ‘we have storage and scalability for the future’. As Suffolk is growing fast and is very land rich, we’re predicting a lot of growth and definitely need scalability,” Tim Forbes, Physical Security Administrator, City of Suffolk, Virginia. Customer overview When a mass shooting in which 12 people died occurred at a municipal building in Virginia Beach in 2019, it served as a wake-up call for nearby Suffolk, a city of around 95,000 people and the largest city in land area in the state of Virginia. As a result, a "crime prevention through environmental design" (CPTED) committee was immediately formed. One of the committee’s key recommendations was to hire a physical security administrator to act as a single point of contact for all security issues. In addition to being tasked with being liaison with Suffolk police, public safety and city leadership, the administrator would be responsible for overseeing security technology, including access control, alarming and cameras. These systems had been installed when the towers went up but were left fully unmanaged After a hire was made, a needs assessment was conducted which quickly determined that the existing security technology infrastructure was poorly functioning or, in some cases, not functioning at all. Many of these systems had been installed when the buildings went up but have been left completely unmanaged since. The number one priority became to construct a security “foundation” at the data centre in Suffolk City Hall. In terms of a video management system, a new backbone was needed to ensure the ability to view all cameras from this central location. The approach Suffolk determined it needed an integration partner that could provide unified technologies and common knowledge around its security parameters. It initiated an RFP process to which it considered four responses. Based upon credentials, years of experience, and other qualifications (including expertise in ticketing and records management), the city selected Integrated Security and Communications (ISC). ISC had, in turn, been partnering with BCD for IP video data infrastructure solutions for several years. In particular, they had jointly worked on several server environment deployments using the company’s high availability, purpose-built appliances and trusted BCD to be the right partner for the city of Suffolk. After extensive evaluation of site requirements and recommendations provided by BCD, the REVOLV Hybrid Hyperconverged Infrastructure (hHCI), DEEPSTOR Lite was determined by all parties to be the optimal solution. The solution Video must be captured and stored at the set frame rate and key, to be admissible in legal proceedings Most video management systems can achieve the video retention requirements and anticipated camera counts for a given application. Yet, each application has city, state and federal requirements that govern the amount of time the video must be retained, the required frame rate, and the required quality of video. Video must be captured and stored at the specified frame rate and resolution, to be admissible in legal proceedings. With a traditional bare metal implementation of a video management system, the archiver or recorder is a physical server. If that server experiences diffculties, or goes offline for an extended period, not only do the cameras stop recording, but the municipality also loses access to all the archived footage on that archiver. The city of Suffolk could not afford to experience a loss of recording, or not have access to the archived footage. The REVOLV DEEPSTOR Lite solution addressed these needs and ensured that cameras were always recording, and the customer always had access to its archived video. DEEPSTOR Lite is ideal for customers new to virtualised environments, providing a scalable solution that can support roughly 1,500 Mbps during a failed node scenario and up to 2,000 Mbps when all nodes are online. REVOLV is a hybrid HCI solution that leverages VMWare technologies to create a cluster of resources and virtualise the archivers to operate within that cluster. The server resources reside within a vSAN implementation on the cluster that acts as a shared resource pool for the servers. In the event of a node failure, the virtual machines that reside on that node will redistribute (vMotion) to the remaining nodes and continue operation. The process REVOLV provides high availability, regardless of the capabilities of the VMS, or access control software The process occurs completely unattended, and in the case of the city of Suffolk, ensured that it would never lose recorded video or be unable to record resources. REVOLV provides high availability, regardless of the capabilities of the VMS, or access control software. Suffolk’s REVOLV installation also utilised powerful GPUs. These GPUs enabled BCD to shift processing power off the appliance CPU, for a smoother display of live and recorded video and the ability to display more HD cameras at the command centre. “We got it all virtualised and it’s down to less than a quarter of a rack between servers, storage and all the networking that was required for it. Now Suffolk is in a high availability, high resiliency environment that eliminates all the pain points it had with five and seven-year-old servers,” Jim Cooper, Vice President of Technology, Integrated Security and Communications (ISC). Implementation The REVOLV system for Suffolk, including the vSAN cluster and all virtual machines, was built and pre-staged in the engineering lab at BCD’s facility in Fresno, CA. Once tested, it was shipped to the Suffolk city hall. BCD’s professional services team made an onsite visit to complete the installation with ISC. By pre-staging, BCD can ensure that the solution is ready for deployment, thus reducing the time spent on-site. Cut-over configuration and stand-up of the new environment were completed in a couple weeks’ time. Thanks to BCD’s expertise and the REVOLV solution, the city of Suffolk now has over 25 site managers and department directors who have a purpose-built, high-availability system that delivers video at their site and at multiple sites in their organisations for years to come. Says Tim Forbes, Physical Security Administrator for the city, “BCD and ISC have been great partners for us. I am 100% happy with everything.” And the scalability that the platform provides? It will be needed sooner rather than later. Three new large sites and three new small sites are already on tap to be integrated into the system.
Yalova Terminal is a roll-on roll-off (“ro-ro”) port, meaning it is designed to carry wheeled cargo. It is Turkey’s 63rd border gate and began operations in 2017. It covers 80,000 square metres with a 500-trailer capacity and 16,000 square metres of storage, which includes an ADR warehouse for the storage of hazardous goods. On-site there are X-ray facilities, a laboratory for customs, offices, and break rooms for drivers. All of these facilities require continuous monitoring to protect staff, drivers, and the stock contained within the trailers at the port. Monitoring 24/7 The Yalova Ro-Ro Terminal team was looking for a way to intelligently monitor activities at the port and quickly search footage for investigations if needed. Because of the size of the port, an efficient way to store and deliver video footage back to the control room and server rooms was also sought. AI-enabled cameras reduce false alarms Cameras provide the on-site Yalova Ro-Ro Terminal security team with alerts only to events that require their attention The team turned to installer Arte Teknoloji and Hanwha Vision to provide a robust and AI-enabled video surveillance solution comprising 48 PNO-A9081R cameras, 17 XNO-C7083Rcameras, and 7 XNP-6400RW cameras. With AI analytics carried out on the device, the cameras provide the on-site Yalova Ro-Ro Terminal security team with alerts only to events that require their attention. This frees them up to focus on other responsibilities, while the cameras constantly scan for relevant objects or possible incidents that require human input. Potential false alarms from video noise, waving trees, moving clouds, and animals are ignored by the cameras, helping to reduce operator fatigue and frustration. Effective perimetre protection In particular, the XNP-6400RW PTZ Plus camera provides a feature-rich PTZ camera that is designed for perimetre protection. With AI-based object auto-tracking, operators can efficiently monitor the movement of objects while remaining hands-free to control other cameras. This analytics feature is supported by leading AI algorithms unique to Hanwha Vision. The camera captures evidence-grade images of objects up to a distance of 200 metres in all lighting conditions, with the help of adaptive IR technology which adjusts the angle of the camera’s IR LEDs to match the level of zoom. Object detection and classification for accurate responses Object classification based on attributes can also support quick forensic searches for future investigations The PNO-A9081R is a 4K bullet AI camera that can detect people, faces, vehicles, licence plates, plus their attributes. This allows operators to understand who, and what vehicles, are entering and exiting the site, particularly around the perimetre or rolling on and off ships docked at the port. They can quickly respond to possible intrusion or unusual behaviour, reducing the risk of stock, equipment, or vehicle theft. Object classification based on attributes can also support quick forensic searches for future investigations. BestShot feature The cameras also detect loitering, audio such as shouting or screaming, tampering with the camera itself, and shock detection. The BestShot feature automatically chooses the best images of an object, helping with bandwidth and storage efficiency as well as delivering high-quality, detailed images back to the control room. Robust video system Having the best security, that’s intuitive to use and easy to install, was essential" Eyup Tetik, Corporate Sales Manager at ENTPA ELEKTRONİK A.Ş. explains, “It was important to the Yılport Ro-Ro team that they had a robust video system that improved situational awareness and response times, especially after the devastating earthquake in Kahramanmaraş." "As a busy international Ro-Ro Port with millions of dollars of stock and equipment, having the best security, that’s intuitive to use and easy to install, was essential.” Steering ahead The installation is part of the new port area and the security team looks forward to reaping the benefits of the efficiency gains, greater awareness, more detailed investigations, and faster response times as a result of the AI-powered video system.
Required a reliable Indian brand that could provide pre and post-sales support throughout India. Matrix’s competitor brands had failed to provide tech support in some remote locations in India Need for effective monitoring in critical areas of the store: Entrances, Exits, Aisles, Cash Counters, and Inventory Need for a solution that provided valuable video evidence for dispute resolution and liability claims Required efficient monitoring at night to mitigate the risk of thefts Solution offered With growing stores across India, they chose Matrix again due to satisfactory results in the past The eyewear chain relied on Matrix for its video surveillance needs as they were highly satisfied with Matrix Access Control and Matrix Telecom solutions, previously. Earlier, they had installed Matrix IP Cameras, Video Recorders, and Matrix Video Management Software for centralised monitoring. With expanding stores across India, they chose Matrix again due to satisfactory results in the past. 1500+ store locations pan India were secured with Matrix IP Cameras and NVRs. A typical deployment in the store included installing 4 to 5 Matrix Professional Series Dome IP Cameras inside the store. Placement of the camera locations The cameras were strategically placed at the following locations: Outside the Store Premises Entry/ Exit of the Store Product Display Aisle to Monitor Customer Interactions Cash Counters Inventory In the Store Matrix SATATYA SAMAS VMS An 8-channel Matrix NVR with 1 SATA Port was installed within each store to record and store video footage from these IP cameras. A particular location in South India required a centralised monitoring solution. For this purpose, Matrix SATATYA SAMAS, Enterprise Video Management Software (VMS) was provided. With the help of this solution, various multi-location cameras could be centrally monitored from a single location. Products offered SATATYA MIDR20FL36CWS (5000+): 2MP IR Dome Camera with 3.6 mm Fixed Lens SATATYA NVR0801X (1000+): 8 Channel NVR with 1 SATA Port Support SATATYA MIBR20FL28CWS: 2MP IR Bullet Camera with 2.8mm Fixed Lens SATATYA CIBR50FL28CWS (10+): 5MP IR Bullet Camera with 2.8mm Fixed Lens SATATYA PZCR20ML33CWP: 2MP PTZ Cameras with 33x Optical Zoom SATATYA NVR6408X: 64 Channel NVR with 8 SATA Ports Matrix Licence Dongle 200: USB Dongle to Run License VMS Application SATATYA SAMAS PLT: Enterprise Video Management Software SATATYA SAMAS CAM100 (3 Nos.): 100 Camera Licence for Enterprise VMS Solution diagram Benefits Pan India Pre and Post-Sales Support: The team at Matrix ensured seamless deployment of cameras and NVRs even in the most remote locations of India. Further, the eyewear chain was assured of technical support whenever required. Comprehensive Security: Matrix IP Cameras and Network Video Recorders ensured robust security coverage for the brand’s retail outlets throughout India. Preventive Crime Measures: Intelligent Video Analytics and Instant Notifications played a crucial role in deterring and preventing shoplifting, vandalism, etc. Enhanced Night-time Security: The Motion Detection IVA feature in Matrix IP Cameras specifically addressed heightened security concerns during store closure. It triggered instant SMS and email notifications to relevant staff upon detecting motion, proactively preventing incidents even after closing hours. Efficient Bandwidth and Storage: The Adaptive Streaming and Smart Streaming Feature in Matrix IP Cameras intelligently managed bandwidth and storage usage, optimising resources. Customized Recording Retention: Matrix NVRs have camera-wise recording retention, enabling tailored storage duration for each camera’s recordings and backups, further enhancing storage efficiency.
At Scheveningen Harbour in the coastal city of The Hague in the Netherlands, an AI-based video security system from Bosch Building Technologies is now ensuring that every single ship or boat entering or leaving the harbour is logged. The customised solution developed by Bosch together with its partner BrainCreators automatically registers and classifies shipping traffic. Intelligent security solution Until now, employees at the port control centre had to keep an eye on shipping traffic around the clock from the window of the control centre and manually record the 80 or so vessels that pass through the port every day. The city council of The Hague to quickly find a tailor-made solution for the port of Scheveningen The reason for the investment in the intelligent security solution was the fear that criminals would seek alternative routes via smaller ports such as Scheveningen, now that large Dutch or Belgian ports such as Rotterdam and Antwerp have been more secure against smuggled goods for some time. This was reason enough for the city council of The Hague to quickly find a tailor-made solution for the port of Scheveningen. Challenging task in Scheveningen Special conditions require individual solutions Most boats and ships entering the port of Scheveningen are not required to register and, unlike purely commercial ports such as Rotterdam, the port cannot simply be closed off. In addition to cargo ships, there are also fishing boats and private sailing yachts at anchor, with small dinghies and rowing boats cruising between them. Keeping track of the movement of goods in particular is therefore a challenging task in Scheveningen, where the video security system with intelligent video analysis installed by Bosch provides welcome support. Author's quote The requirements for this project were very specific because the shipping traffic not only had to be filmed" "The requirements for this project were very specific because the shipping traffic not only had to be filmed, but also registered and classified. The solution also had to provide information about the speed of travel," says Niels van Doorn, Senior Manager Solutions & Portfolio at Bosch Building Technologies in the Netherlands. "Standard software can't do that. Together with our partner, we have therefore developed an AI that can identify and classify ships of all kinds–from passenger ships and freighters to sailing yachts and inflatable boats." This data aids in identifying suspicious shipping movements. Flexidome IP starlight 8000i cameras No sooner said than done – and in the shortest possible time Development, planning and implementation only took around 12 months. Two intelligent video cameras at the mouth of the harbour now record the traffic. The specially developed AI classifies the ship types and registers them in a file. Due to the difficult lighting conditions in the port, the Flexidome IP starlight 8000i cameras from Bosch were chosen. They deliver detailed images even in challenging weather and lighting conditions and enable the staff in the control centre to see every detail, even in very bright or dark image sections. Ships that are not seen in real-time by the personnel on duty appear as still images on the screen All boat identifiers are recorded, documented, stored and automatically provided with additional information on date and time, direction of travel and speed around the clock using AI. The streams from the cameras are fed directly into a video management system. Ships that are not seen in real-time by the personnel on duty appear as still images on the screen. By analysing all the data, peak times, ship types, trends and deviations from the norm are determined. New video documentation "The dashboard gives staff an overview of all activities in the port. The software protects the privacy of the people recorded by making their faces unrecognisable. The new video documentation now provides solid evidence and helps to identify suspicious and unusual situations more quickly and effectively," says Ferry Ditewig, Business Development Manager at Bosch Building Technologies in the Netherlands. The video solution is also well equipped for future challenges and can be flexibly expanded as required: for example, additional information from external sources could be integrated, such as meteorological data, tides or the automatic identification system (AIS) for exchanging ship data.
RGB Spectrum® announced a new deployment at Red Hawk Casino, a premier destination for entertainment, dining, and gaming located just north of Sacramento. The casino has recently elevated its sports bar experience with a captivating new entertainment system. Galileo video wall processor RGB Spectrum's Galileo video wall processor was the natural choice for the project due to its versatility, support for diverse digital and IP-based signal sources, display layout flexibility, exceptional 4K image quality, and straightforward installation process. The processor seamlessly integrates with the casino's existing setup and offers many benefits that enhance the viewing experience. Video processing performance The Galileo processor powers a colossal 27.8-foot by 8.9-foot video wall, composed of Planar's brilliant TVF1.8 LED Cal Coast Telecom, an audio-visual design and installation integrator based in San Jose, California, selected RGB Spectrum's state-of-the-art Galileo video wall processor to power the casino's new video wall, resulting in an outstanding visual experience for casino patrons. The Galileo processor powers a colossal 27.8-foot by 8.9-foot video wall, composed of Planar's brilliant TVF1.8 LED displays, boasting an impressive resolution of 4480 x 1440. This cutting-edge processor delivers top-tier video processing performance, ensuring a captivating, real-time viewing experience with stunning 4K image quality. Display 44 images simultaneously With this solution, the bar offers an array of sports events and highlights that keep patrons engaged and entertained. From professional to collegiate and amateur sports, the video wall showcases football, baseball, basketball, hockey, horse racing, and much more worldwide. David Hallmark, Audio Video Engineering Manager for Cal Coast Telecom, expressed his enthusiasm for the Galileo processor, stating, "One of the key benefits of RGB Spectrum's Galileo processor is its remarkable ability to display 44 images simultaneously with the flexibility to resize and re-position the images." Customisable layouts Operators can swiftly switch and route input sources, choose from customisable, pre-set display layouts, and resize and reposition display windows using the processor's intuitive, built-in GUI. The Galileo processor supports all types of video walls, offering features such as image overlap for projector-based video walls, custom timings to accommodate LED wall resolutions, and bezel compensation for optimal viewing on LCD video walls.
Jesolo is a popular holiday resort on the Italian Adriatic coast. To ensure security for locals and tourists on the busy beach and in public places, Panomera® multifocal sensor cameras from Dallmeier are in use. Five million tourists a year Jesolo is a town of about 26,000 inhabitants and more than five million tourists a year. The large increase in the number of visitors during the summer months requires a great deal of organisation from all parties involved, also regarding the safety and security of residents and tourists. Jesolo is located on the Italian Adriatic coast in the Veneto region. The resort is popular with tourists for its 15 kilometres of golden sandy beach, which has been awarded the Blue Flag, and for the many entertainment facilities on offer: events, theme parks, sports activities, shops, restaurants, and discos. In summer, Jesolo’s nightlife pulsates, and unfortunately, the risk of accidents and crime increases. Video technology for public security The challenge has been to monitor large public areas with as few cameras as possible The city has made considerable efforts in recent years to improve its security infrastructure to create a safe environment for its residents and visitors–and video technology is an important aspect of this. The challenge has been to monitor large public areas with as few cameras as possible, while maintaining high standards of image quality and ease of use. Conventional standard cameras could not meet these requirements–the image quality was simply not good enough. The security managers therefore decided to look for a new solution and found it in the Panomera® multifocal sensor cameras from German manufacturer Dallmeier. Fewer cameras, higher quality Panomera®’s patented camera technology has a number of features that make it unique in the industry. Multiple modules resp. sensors of different focal lengths are combined into a single system. Each module can be individually focused to capture a specific area of the overall image. As a result, multifocal sensor technology enables the simultaneous monitoring of large areas with high detail and exceptionally high resolution. In this way, Panomera® achieves an overall resolution over the object space that far exceeds that of conventional single-sensor cameras. Any number of “virtual” PTZs If an incident does occur, recorded video footage can be used to solve crimes and as evidence in court Another advantage is that unlike PTZ cameras, which are limited to a specific area, the Panomera® camera provides a comprehensive and detailed image of the entire surveillance zone–no matter where the security operator is focusing, there are theoretically any number of PTZ systems virtually available. For the operator in live mode, as well as for the forensic expert in recording mode. Multifocal sensor technology provides an optimal overview of the entire event and enables comprehensive monitoring in real time. This allows security personnel to respond quickly to potential threats. If an incident does occur, the recorded video footage can be used to solve crimes and as evidence in court. A safe environment Dallmeier video technology has been used in Jesolo since 2019. The city’s security managers were so satisfied with the system’s performance that they decided to extend it a few years later. Now, Panomera® cameras keep an eye on the main squares, streets, and sections of the beach. The Panomera® cameras make a significant contribution to improving public safety “The Panomera® cameras make a significant contribution to improving public safety. Especially during the night hours, inappropriate behaviour, and crimes such as vandalism or violence can occur. Thanks to video surveillance, suspicious activities can be quickly detected, and appropriate measures can be taken to prevent crimes or identify the perpetrators,” says Daniele Sisinio, Director Dallmeier Italia. Preventive measure And of course, video surveillance also serves as a preventive measure: the presence of cameras deters potential criminals and creates a safer environment. “Panomera® offers a unique combination of high resolution, optimal overview and intuitive operation,” explains Claudio Vanin, Local Police Commander. “The level of detail is simply amazing! And even in difficult conditions, like here near the sea, the cameras are robust and durable.” Data protection: “Privacy & Security by Design” Dallmeier video surveillance systems fulfil all the criteria that are decisive for providing evidence Video security systems must comply with country-specific and other supra-regional data protection regulations, such as the European General Data Protection Regulation (GDPR). Secure data management was therefore essential for the City of Jesolo. “Our products and solutions have the highest level of technical precautions that make it easy for the customer to implement a video security solution that complies with data protection regulations,” explains Daniele Sisinio. In accordance with the “Privacy & Security by Design” guideline, Dallmeier offers comprehensive options for data protection and data security settings on the product side–from setting up “private zones” to sophisticated access concepts and secure authentication procedures according to IEEE 802.1X. In addition, Dallmeier video surveillance systems fulfil all the criteria that are decisive for providing evidence in court. Image quality, security against tampering and protection against unauthorised access meet the LGC Forensics certification. Fit for the future The video system remains flexible, scalable, and expandable. Thanks to state-of-the-art technology, it can be easily adapted to changing requirements. Additional cameras can be easily integrated, and upgrades are seamless. The video system remains a reliable and effective surveillance solution for the future.
Round table discussion
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?