Coastal surveillance
The Security Industry Association (SIA) has named new members and leadership of the steering committee for SIA RISE, a community that fosters the careers of young professionals and emerging pioneers in the security industry. Dakota Mackie of Northland Controls serves as chair, with Kelly Ann Christensen of BCD now serving as vice chair. In these roles, Mackie and Christensen ensure that RISE delivers educational content and networking opportunities to young professional...
The International Maritime Cyber Security Organisation (IMCSO), an independent maritime standards organisation, has released its cybersecurity testing methodology for those maritime vessels looking to assess their risk and join the Cyber Risk Registry, a risk register database maintained by the IMCSO. The methodology aims to provide IMCSO-accredited cyber consultants and the senior maritime personnel they will be assessing with standardised testing by outlining test scope and the language...
Playhouse Square is a jewel of Northeast Ohio. Thousands of people live, work, and visit the area. “We want to make sure whoever the resident is, whoever the visitor is, they’re having the same great experience day in and day out,” said Nathan Kelly, President of Playhouse Square Real Estate. ROSA Safety is part of that experience. Last October, ROSA, a remote observation security agent, moved into Public Square. Equipped with AI technology, ROSA never blinks and can issue v...
Moxa is extending the advantages of IP video surveillance to challenging transit applications with the debut of its new VPort 07-3, an EN 50155-compliant onboard dome camera. An ideal surveillance solution Hardened against service interruptions caused by heavy vibration, impact, or water ingress, the new camera is an ideal surveillance solution for light rail, buses, and passenger rail fleets. Built around a 3MP progressive-scan CMOS sensor, it captures sharp 2048 x 1536 pixel images at...
Sentrycs, a technology pioneer in the Counter-Unmanned Aerial Systems (C-UAS) industry, announced its continued progress globally within the public safety market. The company recently closed agreements with two new law enforcement organisations, including one in North America. These new agreements will deliver core protocol manipulation sensor solutions across a wide variety of scenarios, from fixed sites to vehicle-mounted (mobile) operations. Drone sightings The company has seen a noticeabl...
Matrix, a trusted provider of security solutions, has rolled out a series of exciting updates to its IP Video Surveillance Solutions. These new features are designed to provide enhanced functionality, better integration, and ease of surveillance management for users across industries. Here’s what’s new: Supercharged version for NVRs Matrix Network Video Recorders now come with improved performance parameters, ensuring smoother operations for users managing high-resolution surveilla...
News
The Security Industry Authority (SIA) mounted a series of coordinated, surprise operations across England to tackle suspected security licence fraud, labour exploitation and immigration offences. SIA investigators launched the day of action on 31 October in partnership with Home Office Immigration Enforcement targeting 11 locations spanning the length and breadth of the country. Section 22 of PSIA Two people were arrested by Home Office Immigration Enforcement (HOIE) officers for overstaying their visas during the joint investigation in Yeovil and Ilkeston. One individual in Ilkeston was also cautioned under section 22 of the Private Security Industry Act (PSIA). The synchronised, unannounced visits were aimed at disrupting potential organised criminal activity linked to security company staff working at construction sites throughout the country, from the South Coast to the Northwest. SIA’s Intelligence Team The extensive enforcement and intelligence-gathering operation was devised after the SIA’s Intelligence Team The extensive enforcement and intelligence-gathering operation was devised after the SIA’s Intelligence Team received allegations of serious criminal activity, including SIA licence fraud, organised immigration crime, labour exploitation and money laundering. Pete Easterbrook, Head of Criminal Enforcement at the SIA said: “This operation was a result of intelligence originating from within the private security industry which was developed and analysed by our Intelligence team and involved collaboration by our Criminal Enforcement and Compliance and Inspections teams." Private security industry Easterbrook added: "Investigators from the SIA and Home Office Immigration worked together to plan and execute intelligence-led enforcement action up and down the country, from East Sussex to Lancashire." "Thanks to these combined efforts we have struck a significant blow against those seeking to use the private security industry as a vehicle for criminality including the exploitation of vulnerable people." Public and legitimate security Easterbrook added: “Operations like this are vital in our mission to protect the public by ensuring that those who seek to seriously undermine the regulatory regime are brought to justice. Our message is clear. There is no place for criminality within the UK private security industry and we will take action to disrupt criminal operations and bring offenders to justice." "We are resolute in our efforts to safeguard both the public and legitimate security operatives from these illegal practices. Where we get credible intelligence of illegal activity, we have the will and capability to act decisively and take robust action.” Investigators targeted locations Yorkshire Somerset Norfolk Derbyshire Staffordshire East and West Sussex Berkshire Lancashire Safety and rights Eddy Montgomery, Director of Enforcement, Compliance and Crime at the Home Office said: “Exploitation of illegal workers within the UK construction industry is on the rise, with rogue employers showing complete disregard to the safety and rights of legal foreign workers who contribute significantly to this sector." “Our Immigration Enforcement officers are working closely with other government agencies to intensify efforts to tackle illegal working in construction as part of a broad series of operations across multiple sectors." Future criminal prosecutions Montgomery added: “I would like to thank the Security Industry Authority for their effective collaboration in cracking down on fraudulent employers who are violating laws, impacting public finances, and exploiting vulnerable people for financial gain.” The SIA is unable to give further details of the arrests at this stage, given the potential impact on any future criminal prosecutions. Anyone who is concerned about labour exploitation within the private security industry can report it to the SIA and other agencies.
Apricorn, the manufacturer of software-free, 256-bit AES XTS hardware-encrypted USB drives, announces new findings from its annual survey and FoI (Freedom of Information) requests, revealing a concerning disregard for cyber insurance across both public and private sectors. Despite the escalating risks of ransomware, phishing, and insider threats, many organisations, including government entities, remain unprepared for cyber incidents, with inadequate backup strategies and a lack of cyber insurance coverage. Cyber insurance Cyber insurance offers a vital layer of protection in the wake of a breach, yet there is a persistent lack of understanding and investment, particularly in the public sector. In a series of Freedom of Information requests made to local councils and government departments across the UK, only two out of the 41 local councils questioned had a cyber insurance policy in place. Flintshire County Council which adopted its policy in October 2022 and London Councils, whose policy covers the period 2021 to 2024. Cyber coverage policies A number of government bodies have either declined to answer, confirmed that they have no cyber insurance Additionally, only two others - Ards and North Down Borough Council and Greater Manchester Combined Authority (GMCA) - mentioned plans to invest in such policies within the next year. This leaves the vast majority of local authorities without sufficient cyber coverage, despite the high stakes. Shockingly, a significant number of government bodies have either declined to answer, confirmed that they have no cyber insurance, or indicated that they do not intend to invest in cyber insurance shortly. Despite this, Suffolk County Council, which disclosed 334 breaches in the same request, noted that they manage cyber risks in-house, raising concerns about their ability to cost-effectively recover from future incidents. Lack of government uptake “Local councils and government departments are responsible for large amounts of sensitive data and should lead by example by adopting stronger cyber insurance policies and more robust data protection measures,” said Jon Fielding, Managing Director of EMEA at Apricorn. The lack of government uptake contrasts with the private sector's recognition of the growing need for insurance. Insurance v/s adoption cover According to separate findings from Apricorn’s annual 2024 research, 78% of IT security decision-makers surveyed confirmed that they do have cyber insurance in place. However, it would seem that their trust in the insurance cover is not in line with its adoption rates with just 28% noting that they have cyber insurance in place and trust that they will be covered in the event of a breach. Cyber insurance claim Positively, 21% noted that they have cyber insurance in place but have not had to make a claim A further 15% highlighted that they either have cyber insurance in place but are unsure that it covers them adequately in the event of a cyber breach (7%) or have cyber insurance in place and have been unsuccessful in claiming financial assistance (8%). Positively, 21% noted that they have cyber insurance in place but have not had to make a claim. Ransomware and phishing attacks Delving deeper into their need for cyber insurance, ransomware attacks rank as the most important cyber risk to cover in insurance policies, with 31% of surveyed IT security decision-makers, identifying it as a key concern, a stark increase from just 16% in 2023. This is unsurprising given the same number (31%) noted that ransomware had been one of the main causes of a data breach within their organisation. Meanwhile, phishing attacks also continue to pose a significant risk, increasing from 19% in 2023 to 23% in 2024, with third-party attacks and lost and stolen devices not far behind at 13%. Increasing backup strategies The survey also found an increasing reliance on backup strategies, with 46% of respondents citing data backups as an essential tool to meet cyber insurance compliance requirements, up from 28% in 2023. This is likely a result of so many failed recoveries. A worrying 33% of IT security decision-makers admitted they failed to completely recover data following a breach due to weak backup processes. Data backup "Data breaches not only pose a financial threat but can severely disrupt operations. Yet, our research shows that many organisations are still failing to prioritise effective data backup strategies and appropriate insurance coverage,” said Fielding. "Ransomware and phishing attacks are only increasing in frequency and sophistication. Organisations need to ensure that they have a robust multi-layered approach to backups and security measures to recover swiftly from such incidents.” Compliance strategies Password hygiene (41%) and employee training and awareness (43%) are two key strategies to ensure compliance Password hygiene (41%) and employee training and awareness (43%) are two further key strategies organisations incorporate to ensure compliance with cyber insurance policies. These efforts, combined with encrypted storage (both at rest 35% and on the move 39%), regular patch updates (35%), and access controls (36%), are essential components of a robust cyber defence strategy. Impact of cyber insurance benefits "Cyber insurance is not just a safeguard for financial recovery; it encourages organisations to shore up their defences, ensuring better compliance with regulatory standards and promoting best practices in data security," Fielding continued. "The findings from both the FoI requests and our annual survey underscore the urgent need for organisations, both public and private, to reassess their priorities, invest in better recovery strategies, and consider the benefits of cyber insurance in mitigating both financial and operational risks.” Methodology The research was conducted by Censuswide with 604 IT security Decision Makers across the UK and US between 30.03.2023 and 10.05.2024. Censuswide abides by and employs members of the Market Research Society which is based on the ESOMAR principles and are members of The British Polling Council.
Available with full support from the UK motion control specialists Mclennan, the STF series open loop micro-stepping drives from Applied Motion Products Inc. (AMP) are designed for optimal use in Industrial Ethernet-based automation systems that demand deterministic, real-time motion control. STF series The STF series is available in three power versions covering up to 3.0, 6.0, and 10.0 A/phase with a choice of interface options that include the EtherCAT, EtherNet/IP, and Modbus industry standards, as well as CANopen over EtherCAT (CoE) and AMP’s proprietary Serial Command Language (SCL) for network communication over Ethernet (UDP or TCP) and RS-485. The STF series offers a range of operation modes including program storage in non-volatile memory or directly streamed commands from a host controller. AMP’s Q programming The Q language provides a range of motion profiles, multi-tasking, math functions, conditional processing AMP’s Q programming, a simple text-based programming language, is complemented with the STF Configurator software which includes set-up and commissioning. The Q language provides a range of motion profiles, multi-tasking, math functions, conditional processing, data register manipulation, and more. Daisy-chain connections A complement of 8 digital inputs and 4 digital outputs provide local control of machine functions, and dual-port communications provide daisy-chain connections for multiple drives, HMIs, or other host-controlled connected devices. The panel-mount STF series includes short circuit, over & under voltage, and over temperature protection, and drives are DC powered (12...48 VDC for the 3 A and 6 A versions and 24…70 VDC for the 10 A drive). Well-proven drive architecture Like other micro-stepping drives from AMP, the STF series features a well-proven drive architecture with advanced current control, anti-resonance, and torque ripple smoothing for maximum performance and optimal power over a wide speed range. With their three power versions, the STF series is a perfect match for Mclennan’s range of MSM stepper motors. Cost-optimised range Together with STF drives, MSM series micro-stepping motors are aimed at the unique demands of OEM users This cost-optimised range is available in NEMA sizes 08 through 34 (1.8 degrees, two-phase, bipolar) with extended torque performance and smooth operation that perfectly suits dynamic motion positioning and speed control applications. Together with STF drives, MSM series micro-stepping motors are aimed at the unique demands of OEM users with stock availability for standard products and fast turnaround for application customisation. Open-loop control of step motors STF stepper drives provide open-loop control of step motors. Where position verification may be required in automation systems, Mclennan can offer alternative Industrial Ethernet-equipped drives from its panel-mounted ST series with encoder options for MSM stepper motors. For applications where full closed-loop control of a micro-stepping motor is demanded, AMP’s competitively priced stepSERVOtm products offer proven performance with increased torque, higher acceleration, and ultimately superior throughput over traditional stepper motor systems. Mclennan supplies and fully supports AMP’s comprehensive range of stepper- and servo-based motion control products.
AMG Systems of the United Kingdom and USA introduced the AMG265M industrially hardened, ultra-compact fibre optic Gigabit Ethernet media converter directly powered by available 85–264 VAC power. Models within the series feature either screw terminals or IEC connectors. Available as both non-PoE and PoE models with IEEE802.3at 30W or IEEE802.3bt 60/90W PoE available. Installation density challenges AMG265M PoE PSE models are fit for the latest power need PoE IP devices in difficult applications The AMG265M PoE PSE models are suitable for powering the latest high-power requirement PoE IP devices in difficult applications requiring equipment to be industrially hardened and immune from temperature, shock, and vibration. The ultra-compact AMG265M models are produced in a rugged, thermally efficient enclosure designed to be DIN-Rail, wall mounted, or with an industry-first magnetic mount option. The AMG265M ultra-compact size equates to a 74% reduction in volumetric size compared to other industrial DIN rail media converters, solving installation density challenges. AMG265M series miniature media converters The fully hardened line can operate outdoors in suitable IP-rated housing and extreme temperatures (−30 to +75°C). Integrating smart functionality provides the user with numerous field-selectable intelligent features such as link-fault pass-through, remote device reset, and extended distance mode for the copper cable. The AMG265M series miniature media converters are suited for connecting IP equipment to Ethernet networks that require optical fibre to achieve longer transmission distances. The AMG265M uses a dual-speed 100Mb/1Gb SFP port for connectivity, and AMG offers a wide range of SFPs for fibre, connector type, and distance. NEMA standards: TAA and NDAA compliant AMG265M Series converters are designed in the USA and UK and simulated in ISO9001-certified facility The AMG265M Series media converters are designed in the USA and UK and manufactured in an ISO9001-certified UK facility, are designed to NEMA standards and are fully TAA and NDAA compliant, and unlike similar products from other Asian countries, can be used in all US Government installations. Steve Clarke, AMG's Managing Director, said, “AMG is known for our innovative approach to product design. With space being at a premium in most installations, the AMG 265M is easily the smallest, most full-featured media converter available today.” “Our unparalleled manufacturing process allows AMG to offer a wide range of transmission products at very cost-effective levels while maintaining ISO9001 quality, the AMG 265M is another example,” Clarke concluded. Added layer of security Tom Exley, AMG Technical Director, adds: “The AMG265M continues our quality standard. Our engineering team looked at what was currently available, identified weaknesses, and engineered the AMG265M to overcome those weaknesses. Offering a media converter that requires no external power supply and can be easily connected to any available AC power supply is a simple solution for our customers and one less thing to potentially fail." "The AMG265M has no equal in terms of this unique ultra-compact size, industrially hardened, with full 90W PoE capability, made in an ISO9001-certified facility, and most importantly, available when you need them. We believe in the quality and stand behind them with lifetime support. This media converter solves the density challenge, allowing the user to utilise more devices in a smaller area. Plus having a product made in the UK gives your network an added layer of security.” AMG Lifetime Warranty AMG believes having products in stock, being fully supported by the AMG design team, and being covered by the AMG Lifetime Warranty gives AMG customers worldwide a measurable advantage in today’s competitive marketplace. AMG Systems offers an extensive line of fibre optic, copper, and wireless Ethernet, video, and data transmission equipment that is uniquely designed to meet the needs of the Security, Intelligent Transportation Systems, Utility, and Industrial markets.
Intellian Technologies Inc., a pioneering global provider of resilient multi-constellation satellite user terminals and communications solutions, has announced the opening of its new GMDSS Development Centre in Busan, South Korea. This centre is dedicated to advancing Global Maritime Distress and Safety System (GMDSS) solutions, including the development of GMDSS VHF and MF/HF radio systems and NAVTEX, with the first products expected to launch in 2025. GMDSS Safety Display Terminals Building on the development of the GMDSS Safety Display Terminals announced last year for Inmarsat and Iridium, Intellian’s expansion into GMDSS radio solutions demonstrates a significant commitment to enhancing maritime safety. The GMDSS, overseen by the United Nations' International Maritime Organisation (IMO) under the Safety Of Life At Sea (SOLAS) convention, is a critical regulatory framework designed to protect the 1.9 million seafarers worldwide. It mandates essential global maritime safety requirements, including radio and satellite communications, for vessels over 300 gross tons and passenger ships carrying more than twelve passengers on international voyages. Intellian’s expanding GMDSS portfolio The GMDSS Development Centre is strategically located in Busan, home to South Korea's busiest port The new GMDSS radios from Intellian will include Medium Frequency (MF) and High Frequency (HF), and Very High Frequency (VHF) systems, forming a comprehensive part of Intellian’s expanding GMDSS portfolio. A NAVTEX (navigational telex) solution is also being developed. This is an international automated system used on ships to distribute Maritime Safety Information (MSI) such as navigational warnings, weather forecasts, weather warnings, and search and rescue notices. The GMDSS Development Centre is strategically located in Busan, home to South Korea's busiest port and the sixth-busiest port globally. Positioned within the Southeastern Maritime Industrial Region, the centre benefits from a thriving maritime industry and access to highly-experienced marine electronics professionals. Development of GMDSS systems Eric Sung, CEO of Intellian Technologies Inc., commented: "The development of GMDSS systems represents an exciting new chapter for Intellian. By integrating GMDSS systems into our product portfolio, we are providing our partners and maritime customers with the ability to meet all their communication needs through Intellian." "The establishment of the GMDSS Development Centre in Busan, supported by R&D teams in HQ and the L-band Centre of Excellence in London, underscores our commitment to delivering high-quality GMDSS products that will set a new standard in maritime safety."
Secure Logiq is proud to mark the second anniversary of its regional headquarters in Business Bay, Dubai, on November 7, 2024. Impact in Dubai Since opening the office in 2022, Secure Logiq has made significant strides in the Middle East, forging impactful partnerships, winning industry awards, and supporting high-profile projects across the region. Driven by the immense potential and unique demands of the Middle Eastern market, Secure Logiq’s Dubai office has made its presence known over the past two years. Support and localised approach Where large-scale projects and extended video retention periods are the norms, the regional headquarters has enabled Secure Logiq to respond to the needs of the market with dedicated support and a localised approach, which has led to major milestones and high-impact collaborations: Intersec Saudi Arabia 2022 – Partnered with industry leaders Milestone and Seagate, strengthening the company’s presence in the Saudi market. Intersec Dubai 2023 – Powered the technology solutions on the Axis stand, showcasing advanced integrations with BriefCam, Vaxtor, and Quanika, among other technology partners. Award-winning sustainability efforts – Honoured with the Intersec Award for Security Sustainability Product/Service of the Year in 2023 for efforts to offset carbon emissions in the electronic security manufacturing sector Expansion of the regional network – Developed partnerships with distributors such as Agility Grid, Anixter, VNS, and 360 Security, creating a robust distribution network. Major project wins – Delivered solutions for prestigious clients such as Dubai Holdings, Dubai Dry Docks, and the Saudi Port Authority, alongside completing Secure Logiq’s first multi-million-dollar smart cities project in Iraq. Secure Logiq’s collaborative approach has also led to the formation of technology alliances with major players including Axis Communications, Milestone Systems, Lenel, Seagate, Bosch, and IntelexVision. Key additions The Dubai office has also welcomed key additions to the team since its opening, including experienced professionals like Uttunga Jayewardene, Shee Yusuf, and Elie Georges El Murr. Anand Subbiah, Regional Director at Secure Logiq comments, “This growing team has been instrumental in driving our expansion and enhancing customer support across the region.” Memorable moments In addition to its business milestones, Secure Logiq’s journey in the Middle East has included a few memorable (and quirky) moments, such as: Consuming 1,270 litres of bottled water in the Dubai office. Accumulating 432 tube journeys and 48 wet shaves along the way. And, of course, donning 8 different bow ties for various special occasions and events. Subbiah reflects on the two-year journey, “With our amazing team and strong partnerships, we feel ready to support the Middle East’s growing needs of video technology and we are excited to continue contributing to this region’s fascinating security landscape.”
The Security Industry Authority (SIA) mounted a series of coordinated, surprise operations across England to tackle suspected security licence fraud, labour exploitation and immigration offences. SIA investigators launched the day of action on 31 October in partnership with Home Office Immigration Enforcement targeting 11 locations spanning the length and breadth of the country. Section 22 of PSIA Two people were arrested by Home Office Immigration Enforcement (HOIE) officers for overstaying their visas during the joint investigation in Yeovil and Ilkeston. One individual in Ilkeston was also cautioned under section 22 of the Private Security Industry Act (PSIA). The synchronised, unannounced visits were aimed at disrupting potential organised criminal activity linked to security company staff working at construction sites throughout the country, from the South Coast to the Northwest. SIA’s Intelligence Team The extensive enforcement and intelligence-gathering operation was devised after the SIA’s Intelligence Team The extensive enforcement and intelligence-gathering operation was devised after the SIA’s Intelligence Team received allegations of serious criminal activity, including SIA licence fraud, organised immigration crime, labour exploitation and money laundering. Pete Easterbrook, Head of Criminal Enforcement at the SIA said: “This operation was a result of intelligence originating from within the private security industry which was developed and analysed by our Intelligence team and involved collaboration by our Criminal Enforcement and Compliance and Inspections teams." Private security industry Easterbrook added: "Investigators from the SIA and Home Office Immigration worked together to plan and execute intelligence-led enforcement action up and down the country, from East Sussex to Lancashire." "Thanks to these combined efforts we have struck a significant blow against those seeking to use the private security industry as a vehicle for criminality including the exploitation of vulnerable people." Public and legitimate security Easterbrook added: “Operations like this are vital in our mission to protect the public by ensuring that those who seek to seriously undermine the regulatory regime are brought to justice. Our message is clear. There is no place for criminality within the UK private security industry and we will take action to disrupt criminal operations and bring offenders to justice." "We are resolute in our efforts to safeguard both the public and legitimate security operatives from these illegal practices. Where we get credible intelligence of illegal activity, we have the will and capability to act decisively and take robust action.” Investigators targeted locations Yorkshire Somerset Norfolk Derbyshire Staffordshire East and West Sussex Berkshire Lancashire Safety and rights Eddy Montgomery, Director of Enforcement, Compliance and Crime at the Home Office said: “Exploitation of illegal workers within the UK construction industry is on the rise, with rogue employers showing complete disregard to the safety and rights of legal foreign workers who contribute significantly to this sector." “Our Immigration Enforcement officers are working closely with other government agencies to intensify efforts to tackle illegal working in construction as part of a broad series of operations across multiple sectors." Future criminal prosecutions Montgomery added: “I would like to thank the Security Industry Authority for their effective collaboration in cracking down on fraudulent employers who are violating laws, impacting public finances, and exploiting vulnerable people for financial gain.” The SIA is unable to give further details of the arrests at this stage, given the potential impact on any future criminal prosecutions. Anyone who is concerned about labour exploitation within the private security industry can report it to the SIA and other agencies.
Apricorn, the manufacturer of software-free, 256-bit AES XTS hardware-encrypted USB drives, announces new findings from its annual survey and FoI (Freedom of Information) requests, revealing a concerning disregard for cyber insurance across both public and private sectors. Despite the escalating risks of ransomware, phishing, and insider threats, many organisations, including government entities, remain unprepared for cyber incidents, with inadequate backup strategies and a lack of cyber insurance coverage. Cyber insurance Cyber insurance offers a vital layer of protection in the wake of a breach, yet there is a persistent lack of understanding and investment, particularly in the public sector. In a series of Freedom of Information requests made to local councils and government departments across the UK, only two out of the 41 local councils questioned had a cyber insurance policy in place. Flintshire County Council which adopted its policy in October 2022 and London Councils, whose policy covers the period 2021 to 2024. Cyber coverage policies A number of government bodies have either declined to answer, confirmed that they have no cyber insurance Additionally, only two others - Ards and North Down Borough Council and Greater Manchester Combined Authority (GMCA) - mentioned plans to invest in such policies within the next year. This leaves the vast majority of local authorities without sufficient cyber coverage, despite the high stakes. Shockingly, a significant number of government bodies have either declined to answer, confirmed that they have no cyber insurance, or indicated that they do not intend to invest in cyber insurance shortly. Despite this, Suffolk County Council, which disclosed 334 breaches in the same request, noted that they manage cyber risks in-house, raising concerns about their ability to cost-effectively recover from future incidents. Lack of government uptake “Local councils and government departments are responsible for large amounts of sensitive data and should lead by example by adopting stronger cyber insurance policies and more robust data protection measures,” said Jon Fielding, Managing Director of EMEA at Apricorn. The lack of government uptake contrasts with the private sector's recognition of the growing need for insurance. Insurance v/s adoption cover According to separate findings from Apricorn’s annual 2024 research, 78% of IT security decision-makers surveyed confirmed that they do have cyber insurance in place. However, it would seem that their trust in the insurance cover is not in line with its adoption rates with just 28% noting that they have cyber insurance in place and trust that they will be covered in the event of a breach. Cyber insurance claim Positively, 21% noted that they have cyber insurance in place but have not had to make a claim A further 15% highlighted that they either have cyber insurance in place but are unsure that it covers them adequately in the event of a cyber breach (7%) or have cyber insurance in place and have been unsuccessful in claiming financial assistance (8%). Positively, 21% noted that they have cyber insurance in place but have not had to make a claim. Ransomware and phishing attacks Delving deeper into their need for cyber insurance, ransomware attacks rank as the most important cyber risk to cover in insurance policies, with 31% of surveyed IT security decision-makers, identifying it as a key concern, a stark increase from just 16% in 2023. This is unsurprising given the same number (31%) noted that ransomware had been one of the main causes of a data breach within their organisation. Meanwhile, phishing attacks also continue to pose a significant risk, increasing from 19% in 2023 to 23% in 2024, with third-party attacks and lost and stolen devices not far behind at 13%. Increasing backup strategies The survey also found an increasing reliance on backup strategies, with 46% of respondents citing data backups as an essential tool to meet cyber insurance compliance requirements, up from 28% in 2023. This is likely a result of so many failed recoveries. A worrying 33% of IT security decision-makers admitted they failed to completely recover data following a breach due to weak backup processes. Data backup "Data breaches not only pose a financial threat but can severely disrupt operations. Yet, our research shows that many organisations are still failing to prioritise effective data backup strategies and appropriate insurance coverage,” said Fielding. "Ransomware and phishing attacks are only increasing in frequency and sophistication. Organisations need to ensure that they have a robust multi-layered approach to backups and security measures to recover swiftly from such incidents.” Compliance strategies Password hygiene (41%) and employee training and awareness (43%) are two key strategies to ensure compliance Password hygiene (41%) and employee training and awareness (43%) are two further key strategies organisations incorporate to ensure compliance with cyber insurance policies. These efforts, combined with encrypted storage (both at rest 35% and on the move 39%), regular patch updates (35%), and access controls (36%), are essential components of a robust cyber defence strategy. Impact of cyber insurance benefits "Cyber insurance is not just a safeguard for financial recovery; it encourages organisations to shore up their defences, ensuring better compliance with regulatory standards and promoting best practices in data security," Fielding continued. "The findings from both the FoI requests and our annual survey underscore the urgent need for organisations, both public and private, to reassess their priorities, invest in better recovery strategies, and consider the benefits of cyber insurance in mitigating both financial and operational risks.” Methodology The research was conducted by Censuswide with 604 IT security Decision Makers across the UK and US between 30.03.2023 and 10.05.2024. Censuswide abides by and employs members of the Market Research Society which is based on the ESOMAR principles and are members of The British Polling Council.
Available with full support from the UK motion control specialists Mclennan, the STF series open loop micro-stepping drives from Applied Motion Products Inc. (AMP) are designed for optimal use in Industrial Ethernet-based automation systems that demand deterministic, real-time motion control. STF series The STF series is available in three power versions covering up to 3.0, 6.0, and 10.0 A/phase with a choice of interface options that include the EtherCAT, EtherNet/IP, and Modbus industry standards, as well as CANopen over EtherCAT (CoE) and AMP’s proprietary Serial Command Language (SCL) for network communication over Ethernet (UDP or TCP) and RS-485. The STF series offers a range of operation modes including program storage in non-volatile memory or directly streamed commands from a host controller. AMP’s Q programming The Q language provides a range of motion profiles, multi-tasking, math functions, conditional processing AMP’s Q programming, a simple text-based programming language, is complemented with the STF Configurator software which includes set-up and commissioning. The Q language provides a range of motion profiles, multi-tasking, math functions, conditional processing, data register manipulation, and more. Daisy-chain connections A complement of 8 digital inputs and 4 digital outputs provide local control of machine functions, and dual-port communications provide daisy-chain connections for multiple drives, HMIs, or other host-controlled connected devices. The panel-mount STF series includes short circuit, over & under voltage, and over temperature protection, and drives are DC powered (12...48 VDC for the 3 A and 6 A versions and 24…70 VDC for the 10 A drive). Well-proven drive architecture Like other micro-stepping drives from AMP, the STF series features a well-proven drive architecture with advanced current control, anti-resonance, and torque ripple smoothing for maximum performance and optimal power over a wide speed range. With their three power versions, the STF series is a perfect match for Mclennan’s range of MSM stepper motors. Cost-optimised range Together with STF drives, MSM series micro-stepping motors are aimed at the unique demands of OEM users This cost-optimised range is available in NEMA sizes 08 through 34 (1.8 degrees, two-phase, bipolar) with extended torque performance and smooth operation that perfectly suits dynamic motion positioning and speed control applications. Together with STF drives, MSM series micro-stepping motors are aimed at the unique demands of OEM users with stock availability for standard products and fast turnaround for application customisation. Open-loop control of step motors STF stepper drives provide open-loop control of step motors. Where position verification may be required in automation systems, Mclennan can offer alternative Industrial Ethernet-equipped drives from its panel-mounted ST series with encoder options for MSM stepper motors. For applications where full closed-loop control of a micro-stepping motor is demanded, AMP’s competitively priced stepSERVOtm products offer proven performance with increased torque, higher acceleration, and ultimately superior throughput over traditional stepper motor systems. Mclennan supplies and fully supports AMP’s comprehensive range of stepper- and servo-based motion control products.
AMG Systems of the United Kingdom and USA introduced the AMG265M industrially hardened, ultra-compact fibre optic Gigabit Ethernet media converter directly powered by available 85–264 VAC power. Models within the series feature either screw terminals or IEC connectors. Available as both non-PoE and PoE models with IEEE802.3at 30W or IEEE802.3bt 60/90W PoE available. Installation density challenges AMG265M PoE PSE models are fit for the latest power need PoE IP devices in difficult applications The AMG265M PoE PSE models are suitable for powering the latest high-power requirement PoE IP devices in difficult applications requiring equipment to be industrially hardened and immune from temperature, shock, and vibration. The ultra-compact AMG265M models are produced in a rugged, thermally efficient enclosure designed to be DIN-Rail, wall mounted, or with an industry-first magnetic mount option. The AMG265M ultra-compact size equates to a 74% reduction in volumetric size compared to other industrial DIN rail media converters, solving installation density challenges. AMG265M series miniature media converters The fully hardened line can operate outdoors in suitable IP-rated housing and extreme temperatures (−30 to +75°C). Integrating smart functionality provides the user with numerous field-selectable intelligent features such as link-fault pass-through, remote device reset, and extended distance mode for the copper cable. The AMG265M series miniature media converters are suited for connecting IP equipment to Ethernet networks that require optical fibre to achieve longer transmission distances. The AMG265M uses a dual-speed 100Mb/1Gb SFP port for connectivity, and AMG offers a wide range of SFPs for fibre, connector type, and distance. NEMA standards: TAA and NDAA compliant AMG265M Series converters are designed in the USA and UK and simulated in ISO9001-certified facility The AMG265M Series media converters are designed in the USA and UK and manufactured in an ISO9001-certified UK facility, are designed to NEMA standards and are fully TAA and NDAA compliant, and unlike similar products from other Asian countries, can be used in all US Government installations. Steve Clarke, AMG's Managing Director, said, “AMG is known for our innovative approach to product design. With space being at a premium in most installations, the AMG 265M is easily the smallest, most full-featured media converter available today.” “Our unparalleled manufacturing process allows AMG to offer a wide range of transmission products at very cost-effective levels while maintaining ISO9001 quality, the AMG 265M is another example,” Clarke concluded. Added layer of security Tom Exley, AMG Technical Director, adds: “The AMG265M continues our quality standard. Our engineering team looked at what was currently available, identified weaknesses, and engineered the AMG265M to overcome those weaknesses. Offering a media converter that requires no external power supply and can be easily connected to any available AC power supply is a simple solution for our customers and one less thing to potentially fail." "The AMG265M has no equal in terms of this unique ultra-compact size, industrially hardened, with full 90W PoE capability, made in an ISO9001-certified facility, and most importantly, available when you need them. We believe in the quality and stand behind them with lifetime support. This media converter solves the density challenge, allowing the user to utilise more devices in a smaller area. Plus having a product made in the UK gives your network an added layer of security.” AMG Lifetime Warranty AMG believes having products in stock, being fully supported by the AMG design team, and being covered by the AMG Lifetime Warranty gives AMG customers worldwide a measurable advantage in today’s competitive marketplace. AMG Systems offers an extensive line of fibre optic, copper, and wireless Ethernet, video, and data transmission equipment that is uniquely designed to meet the needs of the Security, Intelligent Transportation Systems, Utility, and Industrial markets.
Intellian Technologies Inc., a pioneering global provider of resilient multi-constellation satellite user terminals and communications solutions, has announced the opening of its new GMDSS Development Centre in Busan, South Korea. This centre is dedicated to advancing Global Maritime Distress and Safety System (GMDSS) solutions, including the development of GMDSS VHF and MF/HF radio systems and NAVTEX, with the first products expected to launch in 2025. GMDSS Safety Display Terminals Building on the development of the GMDSS Safety Display Terminals announced last year for Inmarsat and Iridium, Intellian’s expansion into GMDSS radio solutions demonstrates a significant commitment to enhancing maritime safety. The GMDSS, overseen by the United Nations' International Maritime Organisation (IMO) under the Safety Of Life At Sea (SOLAS) convention, is a critical regulatory framework designed to protect the 1.9 million seafarers worldwide. It mandates essential global maritime safety requirements, including radio and satellite communications, for vessels over 300 gross tons and passenger ships carrying more than twelve passengers on international voyages. Intellian’s expanding GMDSS portfolio The GMDSS Development Centre is strategically located in Busan, home to South Korea's busiest port The new GMDSS radios from Intellian will include Medium Frequency (MF) and High Frequency (HF), and Very High Frequency (VHF) systems, forming a comprehensive part of Intellian’s expanding GMDSS portfolio. A NAVTEX (navigational telex) solution is also being developed. This is an international automated system used on ships to distribute Maritime Safety Information (MSI) such as navigational warnings, weather forecasts, weather warnings, and search and rescue notices. The GMDSS Development Centre is strategically located in Busan, home to South Korea's busiest port and the sixth-busiest port globally. Positioned within the Southeastern Maritime Industrial Region, the centre benefits from a thriving maritime industry and access to highly-experienced marine electronics professionals. Development of GMDSS systems Eric Sung, CEO of Intellian Technologies Inc., commented: "The development of GMDSS systems represents an exciting new chapter for Intellian. By integrating GMDSS systems into our product portfolio, we are providing our partners and maritime customers with the ability to meet all their communication needs through Intellian." "The establishment of the GMDSS Development Centre in Busan, supported by R&D teams in HQ and the L-band Centre of Excellence in London, underscores our commitment to delivering high-quality GMDSS products that will set a new standard in maritime safety."
Secure Logiq is proud to mark the second anniversary of its regional headquarters in Business Bay, Dubai, on November 7, 2024. Impact in Dubai Since opening the office in 2022, Secure Logiq has made significant strides in the Middle East, forging impactful partnerships, winning industry awards, and supporting high-profile projects across the region. Driven by the immense potential and unique demands of the Middle Eastern market, Secure Logiq’s Dubai office has made its presence known over the past two years. Support and localised approach Where large-scale projects and extended video retention periods are the norms, the regional headquarters has enabled Secure Logiq to respond to the needs of the market with dedicated support and a localised approach, which has led to major milestones and high-impact collaborations: Intersec Saudi Arabia 2022 – Partnered with industry leaders Milestone and Seagate, strengthening the company’s presence in the Saudi market. Intersec Dubai 2023 – Powered the technology solutions on the Axis stand, showcasing advanced integrations with BriefCam, Vaxtor, and Quanika, among other technology partners. Award-winning sustainability efforts – Honoured with the Intersec Award for Security Sustainability Product/Service of the Year in 2023 for efforts to offset carbon emissions in the electronic security manufacturing sector Expansion of the regional network – Developed partnerships with distributors such as Agility Grid, Anixter, VNS, and 360 Security, creating a robust distribution network. Major project wins – Delivered solutions for prestigious clients such as Dubai Holdings, Dubai Dry Docks, and the Saudi Port Authority, alongside completing Secure Logiq’s first multi-million-dollar smart cities project in Iraq. Secure Logiq’s collaborative approach has also led to the formation of technology alliances with major players including Axis Communications, Milestone Systems, Lenel, Seagate, Bosch, and IntelexVision. Key additions The Dubai office has also welcomed key additions to the team since its opening, including experienced professionals like Uttunga Jayewardene, Shee Yusuf, and Elie Georges El Murr. Anand Subbiah, Regional Director at Secure Logiq comments, “This growing team has been instrumental in driving our expansion and enhancing customer support across the region.” Memorable moments In addition to its business milestones, Secure Logiq’s journey in the Middle East has included a few memorable (and quirky) moments, such as: Consuming 1,270 litres of bottled water in the Dubai office. Accumulating 432 tube journeys and 48 wet shaves along the way. And, of course, donning 8 different bow ties for various special occasions and events. Subbiah reflects on the two-year journey, “With our amazing team and strong partnerships, we feel ready to support the Middle East’s growing needs of video technology and we are excited to continue contributing to this region’s fascinating security landscape.”


Expert commentary
When a bomb detonated in the Port of Beirut, I had hundreds of employees under my care inside the blast zone. Within just two hours, I was able to determine who was impacted, understand their safety conditions, and share resources for on-the-ground support—all thanks to mobile technology. For Chief Security Officers, receiving calls like these launches a variety of protocols and necessary decision-making with the safety and security of people and assets as a top priority. And these calls are only becoming more common. Dependence on threat intelligence Mobile phones have dominated the post-COVID environment where people work from anywhere Threats ranging from natural disasters to geopolitical conflicts are becoming more frequent and complicate the responsibility organisations have in keeping their people safe. To meet these needs CSO’s are staying ahead of negative outcomes through creating a greater dependence on threat intelligence. In these times, effective, real-time risk management depends on hyper-local data from technology that is accessible, portable, and dynamic–such as cell phones. Mobile phones have revolutionised the way people live and work. They allow us all to walk around with a computer in our pocket, bringing the world to our fingertips and eliminating digital borders for over 90% of the world's population. Mobile phones have dominated the post-COVID environment where people work from anywhere and have geographically distributed teams but are also more vulnerable to threatening events. Mobile-friendly risk management platforms Mobile technology assigns workers with easy entry to data that can help keep them and their teams safe As we approach 2024, many organisations are adopting comprehensive risk management tools that empower personnel across the organisation with the intelligence and knowledge they need to stay safe wherever they are. Mobile-friendly risk management platforms, such as Crisis24 Horizon, provide always-on awareness, on-hand threat intelligence, and immediate communications and distress signalling through location monitoring. Users receive location risk assessments and push notifications directly to their devices about nearby issues and threats no matter if they are on or off the job. While only select risk managers have complete control of the platform and all sensitive employee data is protected through encryption, the app distributes critical intel to foster a culture of shared awareness and responsibility. Thus, mobile technology empowers employees with easy access to information that can help keep them and their teams safe. Creating a culture of mobile technology adoption In the last few years, the world has proven the importance of being well-informed of risks and mitigation plans to minimise harm. However, psychological barriers tend to trump physical barriers when it comes to accessing the vast array of tools our mobile devices offer. World has proven the matter of being well-informed of risks and relief plans to minimise harm Adopting this technology and establishing a culture that enforces risk management across an organisation is a daunting challenge that demands substantial commitment from leadership to be successful. Some companies have tackled this challenge by positioning security technology as part of the organisation’s employee benefits package, such as commuter benefits and health insurance, to encourage people to take advantage of these resources and learn how to use them. Cohesive risk management culture Technology is only as effective as the people whose actions it informs, which is why adoption and integration are so important. When a cohesive risk management culture meets a powerful technology platform, individuals are enabled to receive threat alerts and counter their impacts, letting others know when and how to take the necessary precautions to protect themselves and their team. For more information on mobile technology and other security trends, check out the Global Risk Forecast, an annual report by Crisis24 that provides a comprehensive analysis of key events around the world most likely to affect operations in the coming year.
Global transportation networks are becoming increasingly interconnected, with digital systems playing a crucial role in ensuring the smooth operation of ports and supply chains. However, this reliance on technology can also create vulnerabilities, as demonstrated by the recent ransomware attack on Nagoya Port. As Japan's busiest shipping hub, the port's operations were brought to a standstill for two days, highlighting the potential for significant disruption to national economies and supply chains. Transportation sector The attack began with the port's legacy computer system, which handles shipping containers, being knocked offline. This forced the port to halt the handling of shipping containers that arrived at the terminal, effectively disrupting the flow of goods. The incident was a stark reminder of the risks associated with the convergence of information technology (IT) and operational technology (OT) in ports and other critical infrastructures. This is not an isolated incident, but part of a broader trend of escalating cyber threats targeting critical infrastructure. The transportation sector must respond by bolstering its defences, enhancing its cyber resilience, and proactively countering these threats. The safety and efficiency of our transportation infrastructure, and by extension our global economy, depend on it. Rising threat to port security and supply chains XIoT, from sensors on shipping containers to automatic cranes, are vital to trendy port functions OT, once isolated from networked systems, is now increasingly interconnected. This integration has expanded the attack surface for threat actors. A single breach in a port's OT systems can cause significant disruption, halting the movement of containers and impacting the flow of goods. This is not a hypothetical scenario, but a reality that has been demonstrated in recent cyberattacks on major ports. Adding another layer of complexity is the extended Internet of Things (XIoT), an umbrella term for all cyber-physical systems. XIoT devices, from sensors on shipping containers to automated cranes, are now integral to modern port operations. These devices are delivering safer, more efficient automated vehicles, facilitating geo-fencing for improved logistics, and providing vehicle health data for predictive maintenance. XIoT ecosystem However, the XIoT ecosystem also presents new cybersecurity risks. Each connected device is a potential entry point for cybercriminals, and the interconnected nature of these devices means that an attack on one, which can move laterally and can have a ripple effect throughout the system. The threat landscape is evolving, with cybercriminals becoming more sophisticated and their attacks more damaging with a business continuity focus. The growing interconnectivity between OT and XIoT in port operations and supply chains is also presenting these threat actors with a greater attack surface. Many older OT systems were never designed to be connected in this way and are unlikely to be equipped to deal with modern cyber threats. Furthermore, the increasing digitisation of ports and supply chains has led to a surge in the volume of data being generated and processed. This data, if not properly secured, can be a goldmine for cybercriminals. The potential for data breaches adds another dimension to the cybersecurity challenges facing the transportation sector. Role of cyber resilience in protecting service availability Cyber resilience refers to organisation's ability to prepare for, respond to, and recover from threats As the threats to port security and supply chains become increasingly complex, the concept of cyber resilience takes on a new level of importance. Cyber resilience refers to an organisation's ability to prepare for, respond to, and recover from cyber threats. It goes beyond traditional cybersecurity measures, focusing not just on preventing attacks, but also on minimising the impact of attacks that do occur and ensuring a quick recovery. In the context of port operations and supply chains, cyber resilience is crucial. The interconnected nature of these systems means that a cyberattack can have far-reaching effects, disrupting operations not just at the targeted port, but also at other ports and throughout the supply chain. A resilient system is one that can withstand such an attack and quickly restore normal operations. Port operations and supply chains The growing reliance on OT and the XIoT in port operations and supply chains presents unique challenges for cyber resilience. OT systems control physical processes and are often critical to safety and service availability. A breach in an OT system can have immediate and potentially catastrophic physical consequences. Similarly, XIoT devices are often embedded in critical infrastructure and can be difficult to patch or update, making them vulnerable to attacks. Building cyber resilience in these systems requires a multi-faceted approach. It involves implementing robust security measures, such as strong access controls and network segmentation, to prevent attacks. It also involves continuous monitoring and detection to identify and respond to threats as they occur. But perhaps most importantly, it involves planning and preparation for the inevitable breaches that will occur, ensuring that when they do, the impact is minimised, and normal operations can be quickly restored. Building resilience across port security and supply chains In the face of cyber threats, the transport sector must adopt a complete method of cybersecurity In the face of escalating cyber threats, the transportation sector must adopt a comprehensive approach to cybersecurity. This involves not just implementing robust security measures, but also fostering a culture of cybersecurity awareness and compliance throughout the organisation. A key component of a comprehensive cybersecurity strategy is strong access controls. This involves ensuring that only authorised individuals have access to sensitive data and systems. It also involves implementing multi-factor authentication and regularly reviewing and updating access permissions. Strong access controls can prevent unauthorised access to systems and data, reducing the risk of both internal and external threats. Network segmentation Network segmentation is another crucial measure. By dividing a network into separate segments, organisations can limit the spread of a cyberattack within their network. This can prevent an attack on one part of the network from affecting the entire system. Network segmentation also makes it easier to monitor and control the flow of data within the network, further enhancing security. Regular vulnerability assessments and patch management are also essential. Vulnerability assessments involve identifying and evaluating potential security weaknesses in the system, while patch management involves regularly updating and patching software to fix these vulnerabilities. These measures can help organisations stay ahead of cybercriminals and reduce the risk of exploitation. EU’s NIS2 Directive EU’s NIS2 Directive came into effect, and member states have until October 2024 to put it into law The transportation sector must also be prepared for greater legislative responsibility in the near future. The EU’s NIS2 Directive recently came into effect, and member states have until October 2024 to put it into law. The Directive aims to increase the overall level of cyber preparedness by mandating capabilities such as Computer Security Incident Response Teams (CSIRTs). Transport is among the sectors labelled as essential by the bill, meaning it will face a high level of scrutiny. Getting to grips with the complexities of XIoT and OT integration will be essential for organisations to achieve compliance and avoid fines. Global transportation infrastructure Finally, organisations must prepare for the inevitable breaches that will occur. This involves developing an incident response plan that outlines the steps to be taken in the event of a breach. It also involves regularly testing and updating this plan to ensure its effectiveness. A well-prepared organisation can respond quickly and effectively to a breach, minimising its impact and ensuring a quick recovery. In conclusion, mastering transportation cybersecurity requires a comprehensive, proactive approach. It involves implementing robust technical measures, fostering a culture of cybersecurity awareness, and preparing for the inevitable breaches that will occur. By taking these steps, organisations can enhance their cyber resilience, protect their critical operations, and ensure the security of our global transportation infrastructure.
Open platform video technology software is more than just a product; it's a tool that helps customers achieve their desired business outcomes. Safety, round-the-clock security, and increased operational efficiencies are now the norm due to video technology. Responsible Technology Despite humanity’s impressive technological advances, we also recognise the immense responsibility that comes with technological innovation. It's not enough to focus solely on the positive impact video technology can make, we must also be vigilant in identifying and addressing any potential negative consequences it can have on society and its citizens. This is the role of Responsible Technology. Data privacy We want to use all the good things that technology innovation brings, whether it be video, AI, ML, facial recognition, etc. We want to use all the good things that technology innovation brings, whether it be video, Artificial Intelligence, machine learning, facial recognition, etc. to serve people in societies in a responsible way. That means making sure that we regulate technology in a way that respects human rights and data privacy. Addressing the challenges The challenge is, that rather often technology leaders and policymakers either have conflicting interests or collaborate too late. To be responsible, business leaders must support their societies and policymakers in making regulations in the interest of the common good. At Milestone Systems, we are actively looking at how we develop our software responsibly, how our partners responsibly sell our software, and very importantly, how our customers use our software with a responsible mindset. Ensuring good corporate governance As a long-time partner within the security industry, we’re celebrating our 25th Anniversary this year, we are supporting the regulation of video technology for the good of society. However, it of course needs to strike the fine line between the right legislation and not hindering innovation. UNGP The UNGP is the most authoritative and widely adopted set of principles for responsible business At Milestone Systems, we want to play an active role in this and that is why we have pledged our support to the UN's Guiding Principles on Business and Human Rights (UNGP). The UNGP is the most authoritative and widely adopted set of principles for responsible business. The principles call on governments and companies to identify, prevent, mitigate, and remedy actual and potential human rights abuses. Since its launch in 2011, the UNGPs have received wide support from states, civil society organisations, and the private sector, making them the key global foundation for business and human rights. Protect, respect, and remedy Through this commitment, we are taking steps to ensure good corporate governance and ethical standards in the development of our technology. We're generating mechanisms to prevent misuse and we are building educational practices internally. Based on the UNGP’s three pillars: protect, respect, and remedy, we are developing a set of Responsible Technology Principles and procedures for the development, selling, and use of our products. Need for video technology regulation In addition, we are currently evaluating all the various technology areas in which our video software can be used, such as with third-party integrations that utilise e.g., facial recognition. We are mapping out the advantages and disadvantages for societies. One key area of concern is how local authorities are mapping and storing data about us as individuals. This is the reason why we're inviting more legislation to regulate video technology rather than less. Engaging With policymakers We are meeting ministers and trade organisations as we believe this needs to be a joint effort where all parties are heard We are proactively reaching out to and connecting with policymakers and other relevant stakeholders to discuss our approach to and take on Responsible Technology and encouraging the political landscape to work with us around regulation and legislation. We are meeting ministers and trade organisations as we believe this needs to be a joint effort where all parties are heard and where we can openly weigh the advantages and the challenges of technology, whether it is video, facial recognition, machine learning, Artificial Intelligence, or other technologies. Striking a balance Implementing Responsible Technology is a journey, not a destination. To give it the focus needed, we have created a dedicated team to implement this initiative at Milestone Systems. At the same time, we are reaching out to the political landscape to discuss how we balance regulation without hindering innovation. Video technology used ethically We are a global company with worldwide operations, and we are having dialogues about how video technology is being used and how we can have meaningful talks about what regulation and legislation should look like. However, we don’t necessarily want to limit access to the technology itself. Facial recognition We encourage the policymakers to engage with us in the industry so that together we can strike the fine line Facial recognition is a great example of this. The EU is considering making live facial recognition illegal. That would be a huge inhibitor of proactive terrorism prevention. For example, if a well-known terrorist is walking down the street and is being mapped out against Interpol’s most wanted list, the authorities should be able to react. However, if a person walking down the street but is not mapped out or does not have any priors then the city should not be allowed to store the data of that individual’s whereabouts at that point in time. This potential legislation is concerning to me as a citizen of Europe. Instead, we encourage the policymakers to engage with us in the industry so that together we can strike the fine line for the better good of all of us. Maintaining high ethical standards We have a firm understanding and expectation that ethical standards are a huge driver in the security business. Citizens are not in favour of technology companies abusing data about them and monetising from things that they have not opted in to do. Soon, I think we will see many more companies and governments leaning toward suppliers that do have a responsible mindset and high ethical standards for partnerships. Ethical practices Our journey toward Responsible Technology is an ongoing process, and we must remain steadfast in our commitment to ethical practices and the protection of human rights. We recognise that the rapidly changing technological landscape continually presents new challenges and opportunities. For this reason, we continuously look into how we can improve, for example, our end user licence agreements to avoid potential human rights abuses. An industry responsibility Security companies must prioritise careful planning and preparation, including developing policies and procedures For Responsible Technology to truly become a reality, compliance with international human rights laws and data privacy regulations is critical. Security companies must prioritise careful planning and preparation, including developing policies and procedures that govern the ethical use of video surveillance systems. The secure and ethical community In today's technology environment where deep integrations, machine learning, and artificial intelligence are becoming the norm, Responsible Technology is more relevant than ever. The security industry has a unique opportunity to set an example for other sectors by promoting a secure and ethical development community that prioritises Responsible Technology, trustworthy data collection, and the protection of human rights. We must all rise to this challenge and embrace our role as ethical leaders for the greater good of both people and societies.
Security beat
Fueled by mounting concerns about the cybersecurity vulnerability of U.S. ports, President Joe Biden has signed an Executive Order aimed at shoring up defences against cyberattacks. Cybersecurity initiative The cybersecurity initiative marks a significant shift in policy, empowering key agencies and outlining concrete actions to bolster defences. By empowering agencies, establishing clear standards, and fostering collaboration, the initiative aims to strengthen U.S. ports against the evolving threat of cyberattacks, safeguarding the nation's maritime economy and national security. Expanded authority for DHS The proactive approach aims to prevent incidents before they occur The Executive Order grants expanded authority to the Department of Homeland Security (DHS) and the Coast Guard to address maritime cyber threats. DHS gains the power to directly tackle these challenges, while the Coast Guard receives specific tools. The Coast Guard can compel vessels and waterfront facilities to address cyber vulnerabilities that endanger safety. The proactive approach aims to prevent incidents before they occur. Real-time information sharing Reporting any cyber threats or incidents targeting ports and harbors becomes mandatory. This real-time information sharing allows for swifter response and mitigation efforts. The Coast Guard also gains the authority to restrict the movement of vessels suspected of posing cyber threats. Inspections can be conducted on vessels and facilities deemed risky. Mandatory cybersecurity standards The standardisation aims to eliminate weak links in the chain and prevent attackers from exploiting Beyond these broad powers, the Executive Order establishes foundational elements for improved cybersecurity. Mandatory cybersecurity standards will be implemented for U.S. ports' networks and systems, ensuring a baseline level of protection across the board. This standardisation aims to eliminate weak links in the chain and prevent attackers from exploiting individual vulnerabilities. Importance of collaboration and transparency Furthermore, the initiative emphasises the importance of collaboration and information sharing. Mandatory reporting of cyber incidents fosters transparency and allows government agencies and private sector partners to work together in mitigating threats. Additionally, the Executive Order encourages increased information sharing among all stakeholders, facilitating a unified response to potential attacks. Maritime Security Directive The Executive Order encourages investment in research and development for innovative cybersecurity solutions To address specific concerns, the Coast Guard will issue a Maritime Security Directive targeting operators of Chinese-manufactured ship-to-shore cranes. This directive outlines risk management strategies to address identified vulnerabilities in these critical pieces of port infrastructure. The long-term success of this initiative hinges on effective implementation. The Executive Order encourages investment in research and development for innovative cybersecurity solutions, recognising the need for continuous improvement and adaptation to evolving threats. Recognising the urgency of cyber threats The initiative has been met with widespread support from port authorities, industry stakeholders, and cybersecurity experts who recognise the urgency of addressing cyber threats. However, some concerns exist regarding the potential burden of complying with new regulations for smaller port operators. Effective communication, resource allocation, and collaboration among all stakeholders will be crucial to ensure the successful implementation of this comprehensive plan. Enhancing cybersecurity The more impactful and noteworthy piece is the associated NPRM from the U.S. Coast Guard (USCG) “This Executive Order is a positive move that will give the U.S. Coast Guard (USCG) additional authority to enhance cybersecurity within the marine transportation system and respond to cyber incidents,” comments Josh Kolleda, practice director, transport at NCC Group, a cybersecurity consulting firm. The more impactful and noteworthy piece is the associated Notice of Proposed Rulemaking (NPRM) from the U.S. Coast Guard (USCG) on “Cybersecurity in the Marine Transportation System,” adds Kolleda. Portions of the notice of proposed rulemaking (NPRM) look similar to the Transportation Security Administration (TSA) Security Directive for the rail industry and the Emergency Amendment for the aviation industry. Coordinating with TSA on lessons learned The USCG should be coordinating with TSA on lessons learned and incorporating them into additional guidance to stakeholders and processes to review plans and overall compliance, says Kolleda. “At first glance, the NPRM provides a great roadmap to increase cybersecurity posture across the various stakeholders, but it underestimates the cost to private companies in meeting the requirements, particularly in areas such as penetration testing,” says Kolleda. Cyber espionage and threats The focus is on PRC because nearly 80% of cranes operated at U.S. ports are manufactured there “It is unclear if or how the federal government will provide support for compliance efforts. As this seems to be an unfunded mandate, many private companies will opt for the bare minimum in compliance.” “Cyber espionage and threats have been reported by the Director of National Intelligence from multiple nation-states including China, Russia, and Iran,” adds Paul Kingsbury, principal security consultant & North America Maritime Lead at NCC Group. The focus here is on the People’s Republic of China (PRC) because nearly 80% of cranes operated at U.S. ports are manufactured there, he says. Destructive malware “The state-sponsored cyber actors’ goal is to disrupt critical functions by deploying destructive malware resulting in disruption to the U.S. supply chain,” says Kingsbury. “These threat actors do not only originate in China or other nation-states but also include advanced persistent threats (APTs) operated by criminal syndicates seeking financial gain from such disruptions." "The threat actors don’t care where the crane was manufactured but rather seek targets with limited protections and defences. The minimum cyber security requirements outlined within the NPRM should be adopted by all crane operators and all cranes, regardless of where they are manufactured.” PRC-manufactured cranes Kingsbury adds, “The pioneering risk outlined in the briefing is that these cranes (PRC manufactured) are controlled, serviced, and programmed from remote locations in China." "While this is a valid concern and should be assessed, there are certainly instances where PRC-manufactured cranes do not have control systems manufactured in PRC. For example, there are situations in maritime transportation system facilities where older cranes have been retrofitted with control systems of European Union or Japanese origin.” Monitoring wireless threats “The Biden Administration’s recent Executive Order is a critical step forward in protecting U.S. ports from cyberattacks and securing America’s supply chains,” says Dr. Brett Walkenhorst, CTO at Bastille, a wireless threat intelligence technology company. “To ensure proper defence against malicious actors accessing port-side networks, attention must also be paid to common wireless vulnerabilities." "Attacks leveraging Wi-Fi, Bluetooth, and IoT protocols may be used to access authorised infrastructure including IT and OT systems. Monitoring such wireless threats is an important element in a comprehensive approach to upgrading the defences of our nation’s critical infrastructure.”
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Operational technology (OT) uses hardware and software to monitor and control physical processes, devices, and infrastructure. Historically, OT systems were not connected to the Internet and were therefore not vulnerable to cyber-threats. Internet of Things (IoT) However, today’s OT systems are increasingly part of a company’s networks as technologies converge and the Internet of Things (IoT) gains prominence. No longer can OT systems be counted on to be “air-gapped,” that is, not connected to other systems. When OT systems are vulnerable, companies face a “cyber-physical risk.” A bad actor could create a catastrophic risk in the physical security world by compromising OT systems. To understand more about OT and the related cybersecurity concerns, we spoke with Lisa Hammill, VP of Commercial Markets for Shift5, a company that applies cybersecurity best practices to OT systems and networks, thus dramatically reducing their cyber risk. Q: What is operational technology (OT)? How are the cybersecurity concerns for OT different than those for information technology (IT) systems? Hammill: Operational technology (OT) refers to the computer systems that underpin critical infrastructure, enabling it to run continuously and reliably. For example, planes and trains rely on OT to execute basic flying or driving commands. OT cybersecurity solutions for planes, trains, or weapon systems must be capable of the basics of IT cyber-hygiene Most OT is built on legacy technology manufactured before cybersecurity became a priority and relies on serial bus networks like MIL-STD 1553, CAN 2.0, or RS-232, instead of the standard TCP/IP communications protocols that IT security solutions can monitor and defend. Any effective OT cybersecurity solution for planes, trains, or weapon systems must be capable of the basics of IT cyber-hygiene, including ensuring signed software and firmware updates, full data capture, and continuous monitoring and detection aboard planes, trains, and weapon systems. This all makes cybersecurity for onboard OT difficult, but not impossible. Q: What is a “cyber-physical risk” and why is the term important? Hammill: Cyber-physical systems integrate digital components into physical objects and infrastructure; we focus on critical infrastructure like transportation as well as weapon systems. Cyber-physical risks manifest when actors intrude on these delicate processes to manipulate real-world outcomes, whether that’s grounding plane flights, or disabling train brakes. The risks of attacks facing OT within cyber-physical systems are highly consequential, can cause disruptions to civil society, economic disruption, and potential harm to citizens, as well as shift the balance of power in military conflict and geo-political matters. Q: Please describe the breadth of the risks when it comes to OT cybersecurity. Hammill: Cyber-physical attacks can jeopardise business and mission-critical operations, and risks are highly consequential when it comes to transportation systems, creating safety risks for operators and passengers, economic impact, and millions in downtime losses, remediation, and ransom payments. Transportation is a particularly vulnerable sector of critical infrastructure. An attacker could leverage a tested playbook to disrupt operations with minimal effort As we’ve seen from recent attacks demonstrating the attackers’ focus is trained on this space. The motivation of an attacker will vary, but for example, let’s say a bad actor wanted to target an aircraft to disrupt service and ground a flight. There have been examples of basic cyber-attacks targeting noncritical aircraft systems; however, many of these systems remain vulnerable. An attacker could leverage a tested playbook to disrupt operations with minimal effort. An attacker could target a system considered least critical to passenger safety systems categorised as a Design Assurance Level E (DAL E) like an in-flight entertainment system. This type of system has been hacked before and could be used as a vector for a ransomware attack. If an attacker takes control of video screens on seatbacks mid-flight, they would certainly damage passenger trust. They would also likely try to move up the design assurance level chain to gain further access. For example, when a plane pulls into a gate, communication between the aircraft and airline operations happens automatically. An attacker could exploit this connection to move from one system to another. If an attacker gets into those communications channels, they could alter data or hold it hostage, while the airline halted operations to resolve the issue. Q: What industries/markets are most vulnerable to OT cybersecurity threats and why? Hammill: Operational technology lacks the historical focus on cybersecurity that IT has, and basic best practices are nascent for OT industry-wide. Cyber-attacks targeting Colonial Pipeline and Florida's water systems (in 2021) have spurred those industries into action to prioritise cyber hygiene. The aviation and rail industries are watching and taking proactive steps to prevent such cyber-attacks. As weapons systems and vehicles on roads, rail lines, and in the air add on new technology, they are at risk of cyber-attacks Shift5 defends planes, trains, and weapon systems because these vehicles leverage a vast swath of distinct serial bus networks and protocols unseen in other critical infrastructure technologies. We have experts creating a tool that can monitor and detect traffic aboard these bespoke networks. And as weapons systems and vehicles on roads, rail lines, and in the air add on new technology, like autonomation, they are increasingly at risk of cyber-attacks. Q: What are the various sources of OT cybersecurity risks (e.g., other governments, individual hackers, criminal organisations, etc.)? Which are the most urgent and/or pervasive? Hammill: Because of their ability to cause deeply consequential impacts on the business, economy, and human safety, OT cybersecurity risks must be considered scrupulously. Attackers targeting OT could have a range of motivations, from financial gain or market advantage through the theft of intellectual property, to insider threats and geopolitical advantage in a contested environment. It’s no secret that most malicious adversaries choose the path of least resistance when developing their attack strategy. When OT is aboard planes, trains, and tanks, we’re only in the early innings of creating obstacles for those actors to overcome. One threat we’re watching closely is the evolution of ransomware targeting OT. Digital extortion could cause operational disruption and impact consumer trust. Q: What is the Shift5 approach to cybersecurity? Hammill: Shift5 extends 40 years of expertise in adversarial tactics, techniques, and procedures from IT endpoint security into the OT world. For the first time in history, operators can apply cybersecurity best practices to OT systems and networks, dramatically reducing their cyber risk. Shift5 allows rail, aerospace, and defense to generate data-informed insights and make accurate decisions Shift5 brings complete observability and threat detection to OT systems as cyber-physical attacks become an increasingly attractive strategy for digital attackers. By providing visibility into the data that powers their most expensive, longest-lived, and most consequential fleet assets, Shift5 allows rail, aerospace, and defense companies to generate data-informed insights and make timely, accurate decisions once considered impossible. Q: Has OT cybersecurity trailed IT cybersecurity in terms of awareness? If so, why is it true, and how can organisations become more aware (and more prepared) of OT cybersecurity risks? Hammill: OT cybersecurity is nascent compared to IT security, but the industry is catching up. While most organisations understand the importance of visibility and observability in IT systems to enable their defense, very few have this same level of oversight for their most expensive, consequential, and longest-lived OT-powered assets. Simple best practices geared towards defending OT can make an adversary’s job more difficult. Start with taking inventory of all OT assets, then move to gain situational awareness so you can develop your baseline for “normal” operations (and can identify any abnormal events), and finally take steps to shore up gaps in cybersecurity. Q: Tell me more about Shift5. Hammill: Shift5 was founded by Josh Lospinoso and Michael Weigand, two of 40 people hand-selected to stand up to U.S. Cyber Command, the nation’s most elite unit of cyber-defenders. There, Mike and Josh became familiar with challenges in defending weapons systems, and the idea for Shift5 was born. Shift5 provides OT cybersecurity and operational intelligence for fleet operators and military platforms Military weapon systems are built on the same OT infrastructure found within planes and trains, and today Shift5 provides OT cybersecurity and operational intelligence for fleet operators and military platforms. Our customers include the DoD, US Army, Air Force, and Navy, and several of the largest U.S. passenger rail and household-name aviation companies. Many of these industries are beginning to seek out partnerships with Shift5; for example, AEI HorizonX, the venture capital investment platform formed between AE Industrial and The Boeing Company, today works with Shift5. Q: What is the biggest misconception when it comes to OT cybersecurity? Hammill: A common misconception is that OT aboard planes, trains, or weapon systems isn’t at risk. Many security experts have implemented air gapping as a cybersecurity strategy to keep cybersecurity threats away from sensitive systems. However, due to the convergence of IT and OT, there are more inroads to OT than ever, and air gapping isn’t as effective. Transportation assets like planes and trains are flying and rolling data centers that produce valuable and useful data, and they need to be protected just as we protect client data or IP. It’s a hard problem to solve, but the stakes are high and attackers are increasingly aiming their attention at this surface area. Modern cybersecurity principles must be extended to the onboard OT networks of aerospace, rail, and defense Amid the war in Ukraine, we saw attackers target the Belarusian Rail System to thwart Russian adversaries, and Russia digitally attacked Viasat to disable this critical piece of infrastructure ahead of a kinetic strike. Digital attacks facing aerospace, rail, and defense targets are on the rise, and modern cybersecurity principles must be extended to their onboard OT networks. Q: How can organisations start to address these challenges? Hammill: Cybersecurity done well is a lot of preventative work, and when we hear no news, that’s often good news. The U.S. government has increased the levels of dialogue around cybersecurity risks facing US critical infrastructure operators and has led by example in sharing information to help critical infrastructure organisations bolster their defenses. I recommend that transportation organisations engage proactively with local FBI field offices or CISA Regional Offices to establish relationships in advance of any cyber-incidents and visit the websites of CISA and the FBI where they will find technical information and other useful resources. They should also take advantage of other resources like TSA, AAR, ICA, and relevant ISACs that have working groups focused on these challenges. I encourage every transportation operator to understand the risks for these large transportation assets through vulnerability assessments, pen testing, and exercises just as they do with their IT environments.
Case studies
The project, a collaborative effort between two Australian government entities—Zoos Victoria and Parks Victoria, aimed to monitor seals on protected haul-out structures in the middle of Port Phillip Bay. Zoos Victoria, a world-pioneering zoo-based conservation organisation, is dedicated to fighting wildlife extinction. With four zoos—Healesville Sanctuary, Kyabram Fauna Park, Melbourne Zoo, and Werribee Open Range Zoo—Zoos Victoria provides unique and immersive experiences that attract visitors from around the world. Their zoos inspire animal lovers of all ages, strengthening the connection between people and wildlife to protect the future of animals and their homes. Use of surveillance technology Australian government initiative the innovative use of surveillance technology in wildlife conservation Parks Victoria, on the other hand, is the state government authority responsible for managing parks, reserves, and other protected areas in Victoria. Their collaboration on this project underscored their shared commitment to wildlife conservation and environmental stewardship. This Australian government initiative highlighted the innovative use of surveillance technology in wildlife conservation and demonstrated the potential for VIVOTEK cameras to be utilised in various industries beyond security. Why choose VIVOTEK VIVOTEK was chosen for its high-quality reputation, powerful products, and great quality. The company offers Speed Dome cameras connected to AI servers for advanced features and applications. The partnership with Zoos Victoria, a highly reputable organisation with government endorsement, further solidified VIVOTEK's position as a pioneering security brand committed to sustainability. VIVOTEK's impressive Zoom and IR range ensures clear and detailed images even in challenging environments. The cameras also deliver impressive image quality, providing sharp and crisp footage for enhanced surveillance. Additionally, VIVOTEK's cameras are housed in weather-proof IP66-rated, vandal-proof IK10, and NEMA 4X-rated housing, ensuring durability and reliability in various weather conditions. Furthermore, VIVOTEK's commitment to quality is highlighted by its global five-year warranty, providing customers with peace of mind and demonstrating the brand's dedication to customer satisfaction. Challenge The remote location necessitated a standalone system powered by solar energy, with 4G LTE The project faced numerous challenges due to its unique location and the requirements of the security system. The cameras were not installed within the confines of the zoo but rather on haul-out structures in the middle of Port Phillip Bay, where the Marine Response Unit operates to rescue distressed seals from the wild. The remote location necessitated a standalone system powered by solar energy, with 4G LTE connectivity and a large lithium power pack to ensure continuous operation. Additionally, the cameras needed to withstand the harsh marine environment, ensuring they were capable of operating in extreme conditions. They also needed to provide high-resolution, real-time video feeds over long distances to the shore, where the Marine Response Unit operates. Reliable security system The PTZ camera had to be of high enough resolution and zoom to detect entanglements like fishing line and rope, as well as any injuries sustained by the seals. This required a robust and reliable security system that could endure the challenging conditions of the marine environment while delivering clear and detailed footage for effective monitoring and response. The system also had to be remotely controlled and managed, adding to the complexity of the installation and maintenance. These challenges required innovative solutions to ensure the success of the wildlife monitoring and preservation project. Solutions VIVOTEK provided a wide solution in this project, integrating advanced Speed Dome cameras VIVOTEK provided a comprehensive solution in this project, integrating advanced Speed Dome cameras with AI-powered systems to enhance wildlife conservation. The solution involved the installation of Speed Dome cameras, the SD9384-EHL professional IR speed dome camera (PTZ), on the haul-out structures. Connected to a proprietary server-based AI system, these cameras were trained to detect entanglements, wounds, and monitor seal health, providing real-time vision to the Marine Response Unit for prompt medical callouts. By providing real-time vision to the Marine Response Unit, the system facilitated prompt medical callouts, enhancing wildlife conservation efforts. VIVOTEK's commitment With its versatile features, including 5MP resolution, 200M IR illuminators, and 30x optical zoom, the SD9384-EHL camera exemplifies VIVOTEK's dedication to providing cutting-edge solutions for various industries. Moreover, the camera's robust design, protected by IP66, IK10, and NEMA 4X certifications, ensures reliable operation in extreme weather conditions, further emphasising VIVOTEK's commitment to quality and durability. The utilisation of Speed Dome cameras connected to AI servers allowed for advanced monitoring capabilities, surpassing traditional surveillance norms. This breakthrough in security technology showcased VIVOTEK's commitment to innovation and sustainability. This project demonstrated how security technology can be applied differentially, focusing not just on security but also on animal protection and conservation, highlighting VIVOTEK's cameras as versatile tools applicable in various industries, including medical, wildlife preservation, and scientific research. Feedback VIVOTEK's dedication to leveraging cutting-edge technology for the advance of wildlife conservation VIVOTEK's collaboration with Zoos Victoria and Parks Victoria for the seal monitoring project exemplifies its commitment to innovation and ESG principles, highlighting its ability to collaborate with government agencies and prestigious organisations for meaningful projects that contribute to wildlife preservation. The success of this project serves as a testament to VIVOTEK's position as a pioneering provider of advanced security solutions with a focus on making a positive impact on the environment. The project showcased VIVOTEK's innovative AI technology, which played a crucial role in monitoring seal health and detecting potential threats, underscoring VIVOTEK's dedication to leveraging cutting-edge technology for the betterment of wildlife conservation. Advanced security solutions As a result, it received positive feedback for its contribution to wildlife preservation and conservation efforts, with the system's efficiency in monitoring seal health and detecting distress signals being praised by the Marine Response Unit and other stakeholders. Overall, this project underscores VIVOTEK’s role as a pioneering provider of advanced security solutions, committed to making a positive environmental impact through meaningful government collaborations.
Hotel managers require security, flexibility, durability and aesthetics in an access management system that can cover guest rooms and shared spaces, on one hand, and private staff areas on the other. With multiple buildings, a private beach and sports areas, the new TH Resorts Capo Rizzuto on Calabria’s Ionian coast receives high daily traffic from guests and staff, who must have access at different times according to their specific needs. On taking over resort, TH management quickly identified the need for a new locking system that would allow each staff member to access different, specific areas of the facility. In specifying a new master key system, they had two more important criteria. Firstly, the solution should be mechanical rather than digital, to preserve existing hotel aesthetics. Secondly, they required a hierarchical system, where different staff members could have levels of access authority based on their roles. A CYS10 system makes fine-grained customisation possible Security of the comfy nickel-silver key is protected against unauthorised copying by two patents Working closely with the expert specification team at ASSA ABLOY Italia, managers at TH Capo Rizzuto chose a CYS10 master key locking system with Euro profile double cylinders for common area access points and staff-only zones. For guest room doors they selected CYS10 thumbturn cylinders, which lock securely for privacy and quickly unlock from the inside. The CYS10 platform consists of 6-pin sawn key cylinders; it is tested and certified according to EN 1303:2015 and SKG security standards. Security of the comfortable nickel-silver key is protected against unauthorised copying by two separate patents. Their robust design makes them ideally suited to challenging environments such as a busy hotel. Effective master key system design With 63 available key profiles, CYS10 cylinders enable the creation of a complex master key setup with several levels and sub-levels – perfect for access customisation. Effective master key system design reduces the number of keys they need to cut, track or replace. It saves hotel managers time and money. “It is a truly flexible solution and allows us to limit the quantity of keys assigned as much as possible,” says Carmelo Sava, Head of Maintenance at TH Resorts. Effective master key system design reduces the number of keys they need to cut, track or replace Five distinct master key systems – numbering more than 500 CYS10 cylinders in total – were implemented at TH Capo Rizzuto, one for each of the resort’s individual facilities. Each cylinder has its own paired key and, for each building, a master key opens all cylinders. The entire property is controlled by a single grand master key entrusted to management. Future-proof setup at Capo Rizzuto “The ASSA ABLOY master key system allows us to manage the access of all our staff without any security problems,” adds Carmelo Sava. To ensure future-proof setup at Capo Rizzuto, their key systems can adapt or expand at any time: The CYS10 device range includes single, double, thumbturn, screw-in and rim cylinders for interior and exterior doors, switch cylinders for control panels, plus cam locks for letterboxes or furniture. The CYS10 padlock secures gates, lockers, and more.
Up-to-date and accurate maps of the waterways are a prerequisite for safe and efficient shipping in Germany. Authorities such as the Federal Maritime and Hydrographic Agency, but also private harbour operators, are obliged to provide these in an up-to-date form at all times. The main reason for this is to avoid accidents caused by an incorrect or outdated card. This includes the classification of federal waterways, their kilometres, existing locks, lifting and barrages, other surrounding waters, places and borders. Currently, mapping is carried out by conventional ships with trained personnel, which is time-consuming and expensive. This can result in long intervals between measurements at a particular location. 3D map of the surroundings Bank areas and surface forms are monitored by an optical plan with two integrated cameras (Semi-)automated monitoring of waterways by autonomous platforms with obstacle avoidance and traffic detection could optimise this process and provide maps in less time. To this end, the Fraunhofer Institute of Optronics, System Technologies and Image Exploitation IOSB has developed an autonomous surface vehicle capable of autonomously surveying bodies of water as part of a three-year in-house research project. For this purpose, the river bed is recorded using sonar. Furthermore, the bank areas and surface structures are monitored by an optical system with two integrated industrial cameras from IDS Imaging Development Systems GmbH. The information obtained in this way is then merged and transferred to a 3D map of the surroundings. Application The precise surveying of water bodies is a demanding task. TAPS, the Fraunhofer IOSB's semi-automatic direction-finding system for rivers and lakes is able to perform this task both under and above water. The vehicle, which measures approximately 2 x 1.5 x 1 metres, travels along the relevant waterway and automatically avoids obstacles, whether stationary or moving. At a speed of two knots - which corresponds to around 3.7 kilometres per hour - such a mission can last up to 20 hours. For visual mapping of the shore areas, TAPS has two cameras attached to a mast, each pointing to starboard or port and whose fields of view do not overlap. Due to their high resolution, they allow a visual inspection of relevant infrastructure, such as quay walls, as well as 3D modelling of the shore area based on the recorded image data. Orientation of the TAPS platform GNSS and IMU data serve as the basis for picking the position and exposure of the TAPS platform "We use an automated system for intelligent image capture. As soon as one or both cameras are focussed on a predefined area of interest, image recording is started. The vehicle's own movement is also used to store only image data that is recorded from different angles and therefore offers added value in terms of content," explains Boitumelo Ruf, expert in photogrammetry in the Autonomous Robot Systems research group at Fraunhofer IOSB. GNSS (Global Navigation Satellite Systems, such as GPS) and IMU (Inertial Measurement Unit for position determination) data serve as the basis for determining the position and orientation of the TAPS platform. "When the images are captured, they are enriched with the current GNSS position data. The latter are required later for the assignment of precise coordinates," Ruf continues. COLMAP photogrammetric toolbox After data acquisition, the recorded images are transmitted together with the GNSS data to a ground control station, where a photogrammetric reconstruction is carried out. Boitumelo Ruf describes the procedure in more detail: "Among other things, we use the COLMAP photogrammetric toolbox. It uses outstanding image features to first compare the input images, calculate their relative positions and create a true-to-life 3D model of the environment." "We then use the tool to match the images pixel by pixel, i.e. we search for corresponding pixels and merge them exactly. The result is a dense 3D point cloud that is georeferenced using the GNSS positions, i.e. provided with the corresponding current coordinates." The 3D model can then be used for other tasks, such as visual inspections or bank monitoring. Robust industrial cameras defy wind and weather On the camera side, the Fraunhofer Institute relies on two uEye FA industrial cameras from IDS. The robust and resilient models with PoE are ideal for demanding environments. Camera housings, lens tubes and the screwable connectors meet the requirements of IP code IP65/67 and are thus optimally protected against dirt, dust and splash water. The robust and resilient models with PoE are ideal for demanding environments The model used has the large-format 1.1" CMOS sensor IMX304 from Sony and delivers very clear, noise-free images with a resolution of 4096 x 3000 pixels. Thanks to its remarkable dynamic range and very high sensitivity, the global shutter sensor of the second pixel generation of the Pregius series is particularly suitable for metrology applications, among others. It was precisely these characteristics that were decisive for the Fraunhofer IOSB's choice of camera. In addition to robustness and weather protection, important requirements for the cameras included a compact form factor and high image resolution to enable detailed visual inspections. The sensor should also offer a high dynamic range in order to capture images with a high level of detail in both sunny and shady areas. Integration via the standard GigE Vision interface enables the development and use of one driver for several systems with different cameras. Outlook The shortage of skilled labour is also a major issue in the surveying of waterways. Automated mapping of the waterways could not only reduce costs but also the time and, above all, the labour required. The aim of the TAPS project was to develop a prototype for this task and to demonstrate its potential in relevant scenarios. As a research organisation, Fraunhofer typically develops technologies up to a level at which the functionality and suitability of the system have been proven. The next step is now cooperation with industrial partners. Dr. Janko Petereit, head of the Autonomous Robot Systems research group at Fraunhofer IOSB, explains: "We are actively looking for partners to take this final step towards commercialisation together. In view of the positive results of our initial tests and the increasing demand for accurate, up-to-date waterway maps, we expect strong demand for our technology in the coming years. The knowledge gained can be used in a variety of ways. Autonomous watercraft can be used to transport people and goods by sea or inland waterways. The excavation of waterways and the autonomous surveying of fairways are also conceivable. “ The project demonstrates the high potential of the interaction between robot systems and digital image processing. The cards could be reshuffled in the future, particularly with regard to visual environment detection and scene interpretation.
Windsor Port Authority, one of just 17 national ports created by the 1999 Canada Marine Act, has enhanced waterway safety and security across its jurisdiction on the U.S.-Canada border with state-of-the-art cameras from Axis Communications. These cameras, combined with radar solutions from Accipiter Radar Technologies Inc., provide the port with the visibility needed to prevent collisions, better detect illegal activity, and save lives along the river. Windsor Port Located on the Detroit River, the Windsor Port serves as the passageway between Lake Huron and Lake Erie, navigating between 6,000 and 9,000 cargo vessels annually. In addition to commercial ships, over 10,000 small fishing boats and other recreational watercraft make their way through the port each year. Better visibility Windsor Port Authority realised that it needed better visibility into happenings along the river With so many vessels passing through, Windsor Port Authority realised that it needed better visibility into happenings along the river to be able to keep the waterway running safely and smoothly. “Axis’ cameras, along with Accipiter’s radar technology, have been vital to keeping the port safe for all who pass through it,” said Peter Berry, Harbour Master and Vice President of Operations for Windsor Port Authority. Real-time incident detection “Without detailed knowledge of the traffic in these waters, the risk of severe accidents increases significantly, so having the ability to both detect and visually confirm incidents in real-time is invaluable." "We’ve already been able to do some amazing things with the enhanced surveillance solution, like quickly rescuing drowning victims and helping to catch human smugglers, and we’re eager to see what the future holds as a result of this upgrade.” An effective, remote observation By integrating Axis’ bispectral cameras into Accipiter's platform, the port has a 360-degree surveillance system While radar coverage from Accipiter has monitored river activity for years, offering wide-area, real-time detection, and tracking to identify commercial vessels, small craft such as jet skiers, and even debris in the water, it lacked the visual detail needed to provide effective, remote observation. By integrating Axis’ bispectral cameras into Accipiter's platform, the port has a 360-degree surveillance system with both thermal detection and visual verification. System benefits With this enhanced system, the port can: Broadcast real-time warnings about obstructions in the channel: In one instance, the U.S. Coast Guard notified the port that they’d spotted a boat stopped in the middle of the river. The vessel had caught fire, dropped anchor, and was dead in the water. The thermal camera and radar technology allowed for continuous monitoring of the fire onboard the ship, helping them to determine that it was contained to the engine room while enabling the port to send out a navigational warning to other vessels on the river. While the darkness of the hour prevented them from seeing anything from shore, the technology also provided thermal visuals to monitor activity on the bridge and deck. Everyone was safely evacuated. Safely navigate craft through high-risk construction projects: During the construction of a new bridge, the port was concerned about potential disruptions to river traffic, but Axis cameras and integrated radars allowed them to effectively manage vessels passing underneath the site. Deliver precise coordinates for faster rescue operations: When the port got a call from the U.S. Coast Guard that they had spotted a person treading water by the Ambassador Bridge, they were able to quickly identify the location of the person using a combination of radar and camera technology and execute a life-saving rescue. Help to identify criminal activity: While using the camera-radar technology to view objects crossing from Canada to the U.S., the port identified suspicious activity from a boat that regularly sailed from Windsor to Detroit. The port turned the data and video over to the Canadian and U.S. authorities to investigate, which ultimately led to the arrest of two individuals running a human smuggling operation. Marine domain awareness “At Axis, we take pride in working with organisations like Windsor Port Authority to contribute to improved marine domain awareness and heightened safety along the border,” said Anthony Incorvati, Transportation Segment Development Manager for the Americas at Axis. “Combining advanced camera and radar technology ensures comprehensive visibility in maritime environments, providing essential detection and visual verification to resolve incidents quickly and effectively. Not only that, but powerful business intelligence capabilities contribute to improved operations across the organisation.”
Based in Northern California, LYNX Logistics is a third-party logistics (3PL) company specialising in high-value assets. The company partners with the Transported Asset Protection Association (TAPA), aligning with TAPA’s global coalition of manufacturers, shippers, and carriers to protect every corner of their 96,000-square-foot mixed-use facilities, which encompass 8,500 rack and bulk pallet locations. Strategically headquartered near the Port of Oakland and Silicon Valley, it plans to expand to major cities across the United States in the coming year. Adopter of new technology Francisco recognised the value that an integrated physical security system President & Founder Francisco Garcia started the company with a 15-year background in product design and mechanical engineering. An early adopter of new technology, Francisco recognised the value that an integrated physical security system could bring to the organisation, improving efficiency while going above and beyond in protecting cargo. "Once clients see our facilities, they are assured. We don't cut corners on cargo security.” The challenge Safety and security are critical for LYNX, which differentiates itself in the market with the real-time visibility it provides clients over their cargo. To meet industry requirements, the company must also provide accurate compliance documentation and assurance of timely deliveries. To maintain client satisfaction, the team proactively works to prevent and mitigate the risk of errors, defects, damages, and delays. “At one point, I considered implementing container recognition software that could read container IDs. Today, AI-powered search solves this problem.” Team proactively works to prevent and mitigate the risk of errors, defects, damages. Why Verkada? Verkada cameras, intercom, and air quality sensors are integrated behind the Command platform Verkada cameras, intercom, air quality sensors, alarms, and access control security solutions are seamlessly integrated behind the centralised Command platform, giving teams an all-in-one view of security operations – including cargo and containers. "The container ID numbers are the heartbeat of logistics. Everything moves in them, and there's often a need to review camera footage to pinpoint exactly when a container arrived and left the facility.” AI-powered search AI-powered search empowers LYNX to search for people and vehicles using freeform text within the Command platform. By typing in unique container IDs and vehicle information, teams can swiftly find and track a container's precise location and status. This reduces the risk of potential holding charges and administrative tasks, enabling the team to submit real-time data on the spot. “Using AI-powered search, we can quickly locate each container by its unique ID and know exactly where cargo is in the facility, as well as which employee unloaded each container, at which dock door, and for how long." AI-powered search empowers LYNX to search for people and vehicles. Efficient tracking and dispatch Instead of manually sifting through hours of footage, the dispatch team can retrieve the footage they need by typing in container IDs and vehicle descriptions. In the Command search bar, they can enter terms like "(container ID) red truck between April 15th and May 1st” and specify a camera or location to narrow the search even more. "Tracking down a container in our yard now takes a fraction of the time. Instead of scrolling through hours of footage, we can easily find the exact footage we need in seconds. We can filter results via the entrance camera and see when certain crates arrived based on their container ID.” Dispatch team can retrieve the footage they need by typing in container IDs. Real-time cargo monitoring Francisco can remotely check the camera feed from the Command web browser or mobile app Every corner of the facilities is closely monitored by hybrid cloud cameras that oversee cargo from its arrival to its final storage location. Through a web link, vendors can see the whereabouts of cargo as it’s unloaded, transported, and warehoused within facilities. At any point in time, Francisco can remotely check the camera feed from the Command web browser or mobile app. He has set up motion alerts for unusual after-hours activity, to which he can take action and even automate responses with professional monitoring. "We're proud to offer live monitoring to our customers, who can see as their cargo is unloaded and stored securely.” Proactive safety and risk mitigation AI-powered search helps verify that safety standards, protocols, and policies are maintained. By detecting and addressing issues quickly, the team swiftly takes action to prevent accidents and equipment damage, proactively upholding a safer work environment. “We can check for employees wearing safety vests while working, or certain forklifts only being used inside and not outside.” AI-powered search helps verify safety standards, protocols, and policies. Automating visitor management with driver check-in portal By U.S. Customs and TAPA certification standards, every driver must sign in upon entering the premises. Instead of relying on a pen-and-paper logbook, Francisco has turned Verkada Guest into a driver check-in portal. This digital record helps maintain compliance by facilitating the driver check-in process. “Now, drivers can check in through the Guest iPad, take a photo, and upload their licence. This process helps us comply with customs in a streamlined way.” Francisco has turned Verkada Guest into a driver check-in portal. Streamlined audits to support certifications Meticulous tracking helps maintain compliance with the FDA, US Customs and ISO certification Checks and check-ins extend to cargo as well. With AI-powered search, the team can search for specific items, such as medical device crates, to ensure items are properly labelled and container IDs are verified as they arrive and leave. This meticulous tracking helps maintain compliance with the FDA, US Customs and ISO certification standards. "We're dually ISO-certified, TAPA-certified, and U.S. Customs-certified. All organisations were thoroughly impressed with our video security. When we present this package to high-level customers, they're mind-blown.” Medical device and environmental monitoring A core value at LYNX is providing their clientele with customised solutions that exceed expectations. Air quality sensors help show that ISO certification standards are met for their medical device clients. LYNX goes above and beyond – tracking temperature, humidity, and carbon dioxide levels to maintain optimal conditions. "The integrity of the sensors is important to us. What a lot of people do is put a sensor in the coolest spot in the facility, then manipulate the data to show consistent results," Francisco explains. "But we track everything honestly and transparently. We show our vendors the functionality behind Verkada’s sensor technology: temperature, humidity, CO2, indoor air quality, and beyond.” A core value at LYNX is providing their clientele with customised solutions. Intrusion detection, response, and alerts Verkada’s professional monitoring service includes intrusion response from trained agents LYNX recently transitioned its legacy alarm system to Verkada to bring all physical security management under one umbrella. "It just makes sense logistically to have our team manage everything through one interface.” Wired alarm sensors protect facilities at every access point, with the ability to alert staff of incidents like Door Held/Forced Open (DHO/DFO) and tailgating. Beyond real-time intrusion detection, Verkada’s professional monitoring service includes intrusion response from trained agents who can take action immediately to potential threats. Visibility and control over doors LYNX has over 20 access-controlled doors, a requirement for certain certifications. By efficiently controlling access points and implementing real-time compliance checks, LYNX provides a protected environment for high-value cargo. "We can track every single door, along with every person who accesses or tries to access them.” LYNX provides a protected environment for high-value cargo. Gated entry with intercom Upon arrival, visitors of all types buzz into the building using the Verkada Intercom Upon arrival, visitors of all types buzz into the building using Verkada Intercom. Dedicated LYNX staff members can verify the visitor’s identity, answer the call, choose to grant them entry, and even unlock doors remotely with integrated access control. Entrance security is further enhanced with context cameras and real-time alerts for people or vehicles of interest. "It's not just about letting people in; it's about ensuring that everyone who enters our facility is verified and authorised. This technology offers peace of mind to both our team and our clients." Multi-layered perimeter security Beyond the buildings, parking lots and perimeters are protected with Licence Plate Recognition (LPR) technology, cameras, and alarms. The main entrance is followed by two buffer zones, each with its own gate, and includes Licence Plate Recognition (LPR) cameras that track vehicles entering the premises. "We have a main entrance and multiple gates – all controlled through Verkada. The cameras are strategically placed, so we could even deploy tailgate detection if needed.” Parking lots and perimeters are protected with LPR technology. Quality and client assurance Francisco shows them their guest log and footage of everywhere they have been in the facility Auditors sign in via Verkada Guest before walking through the facility. At the end of their visit, Francisco shows them their guest log and footage of everywhere they have been in the facility. Once clients see the facilities firsthand, their decision becomes clear. "I truly believe that all we have to do is get people in here. The facility does the rest.” AI-powered search capabilities further distinguish LYNX in the logistics industry, offering exceptional protection for high-value cargo. "Our AI-powered capabilities set us apart in the market. This technological edge is why clients trust us with high-value items like medical devices." Looking ahead Francisco’s passion for new technology brings innovation to the forefront, setting the company apart in the competitive logistics industry. He has even built a special mount, which can peer into containers and trailers while suspended from the loading dock. "We believe in investing in cutting-edge technology to provide the highest level of service and quality for our customers. I love to hear, ‘Nobody else is doing this.’ It means our clients are doing their homework and we're doing something right.” Francisco’s passion for new technology brings innovation to the forefront. Their proactive security measures have built trust with customers and struck a chord with prospects. So much so that expansion plans are underway to open new facilities in major cities across the United States. “We can continue to bring our security to the next level, from AI-powered search to future feature releases. We’re excited to try it all.”
Frontline Communications, a division of Pierce Manufacturing, Inc., an Oshkosh Corporation business, announced the delivery of a C-40X-2 mobile command vehicle to the Loudoun County Sheriff’s Office in Virginia. The vehicle was featured at the National Sheriffs’ Association (NSA) Conference in Oklahoma, showcasing its state-of-the-art options and upgrades, making it an essential asset for the Sheriff's Office. New mobile command vehicle Sold through Frontline Communications dealer Atlantic Emergency Solutions, the new mobile command vehicle is built on a Peterbilt 548 chassis and measures 38’ 8” in length and 12’ 6” in height. It includes two slide-outs and a 20kW generator, providing ample power for its extensive features. The vehicle is equipped with two entrances, a spacious rear interview room/workstation area, and a forward conference room with seating for eight, ensuring a versatile and functional environment for various operations. Step Up Strategy Major Craig Schleiden of the Loudon County Sheriff’s Office stated, “This vehicle represents a significant advancement in our ‘Step Up Strategy’ to enhance safety, service, technology, efficiency, and professionalism." "The integration of this mobile command unit to our Frontline Communications/Pierce fleet will enable us to better serve our community and improve our collaborative efforts with federal, state, and local law enforcement agencies.” Key features of the new mobile command vehicle Side and rear entrances. 360-degree backup camera system. Four 15k BTU rooftop air conditioners. 100A shore power upgrade. 20’ electric awning. Will-Burt 42’ mast with matching shroud. Exterior monitor compartment with 43" anti-glare monitor. The vehicle's technology includes: Axis perimeter camera system with 16-channel recorder. AvL 1.2m Ku-band VSAT and Winegard Trav'ler DirecTV. Wireless PA system and Firecom radio intercom system. Extron 16x16 video switcher with Frontline Communications touchpad controller. Eight 24" monitors, four 22" monitors, and one 65" Ultra HD monitor. Dual thermal/HD Color Pan Tilt Zoom mast camera. Two PCs, eight docking stations, and a printer. Trendnet 52-port network switch and 5G network with Cradlepoint cellular router. Innovative features “This project highlights our commitment to providing law enforcement with one of the most advanced mobile command units available,” said Steve Williamson, vice president of sales with Frontline Communications. “Having the vehicle in our booth at the NSA Conference allowed us to directly engage with a broad span of representatives from many organisations and discuss its innovative features. We’re proud to support the Loudoun County Sheriff’s Office as they enhance their capabilities to ensure the safety and well-being of their community.”
The project, a collaborative effort between two Australian government entities—Zoos Victoria and Parks Victoria, aimed to monitor seals on protected haul-out structures in the middle of Port Phillip Bay. Zoos Victoria, a world-pioneering zoo-based conservation organisation, is dedicated to fighting wildlife extinction. With four zoos—Healesville Sanctuary, Kyabram Fauna Park, Melbourne Zoo, and Werribee Open Range Zoo—Zoos Victoria provides unique and immersive experiences that attract visitors from around the world. Their zoos inspire animal lovers of all ages, strengthening the connection between people and wildlife to protect the future of animals and their homes. Use of surveillance technology Australian government initiative the innovative use of surveillance technology in wildlife conservation Parks Victoria, on the other hand, is the state government authority responsible for managing parks, reserves, and other protected areas in Victoria. Their collaboration on this project underscored their shared commitment to wildlife conservation and environmental stewardship. This Australian government initiative highlighted the innovative use of surveillance technology in wildlife conservation and demonstrated the potential for VIVOTEK cameras to be utilised in various industries beyond security. Why choose VIVOTEK VIVOTEK was chosen for its high-quality reputation, powerful products, and great quality. The company offers Speed Dome cameras connected to AI servers for advanced features and applications. The partnership with Zoos Victoria, a highly reputable organisation with government endorsement, further solidified VIVOTEK's position as a pioneering security brand committed to sustainability. VIVOTEK's impressive Zoom and IR range ensures clear and detailed images even in challenging environments. The cameras also deliver impressive image quality, providing sharp and crisp footage for enhanced surveillance. Additionally, VIVOTEK's cameras are housed in weather-proof IP66-rated, vandal-proof IK10, and NEMA 4X-rated housing, ensuring durability and reliability in various weather conditions. Furthermore, VIVOTEK's commitment to quality is highlighted by its global five-year warranty, providing customers with peace of mind and demonstrating the brand's dedication to customer satisfaction. Challenge The remote location necessitated a standalone system powered by solar energy, with 4G LTE The project faced numerous challenges due to its unique location and the requirements of the security system. The cameras were not installed within the confines of the zoo but rather on haul-out structures in the middle of Port Phillip Bay, where the Marine Response Unit operates to rescue distressed seals from the wild. The remote location necessitated a standalone system powered by solar energy, with 4G LTE connectivity and a large lithium power pack to ensure continuous operation. Additionally, the cameras needed to withstand the harsh marine environment, ensuring they were capable of operating in extreme conditions. They also needed to provide high-resolution, real-time video feeds over long distances to the shore, where the Marine Response Unit operates. Reliable security system The PTZ camera had to be of high enough resolution and zoom to detect entanglements like fishing line and rope, as well as any injuries sustained by the seals. This required a robust and reliable security system that could endure the challenging conditions of the marine environment while delivering clear and detailed footage for effective monitoring and response. The system also had to be remotely controlled and managed, adding to the complexity of the installation and maintenance. These challenges required innovative solutions to ensure the success of the wildlife monitoring and preservation project. Solutions VIVOTEK provided a wide solution in this project, integrating advanced Speed Dome cameras VIVOTEK provided a comprehensive solution in this project, integrating advanced Speed Dome cameras with AI-powered systems to enhance wildlife conservation. The solution involved the installation of Speed Dome cameras, the SD9384-EHL professional IR speed dome camera (PTZ), on the haul-out structures. Connected to a proprietary server-based AI system, these cameras were trained to detect entanglements, wounds, and monitor seal health, providing real-time vision to the Marine Response Unit for prompt medical callouts. By providing real-time vision to the Marine Response Unit, the system facilitated prompt medical callouts, enhancing wildlife conservation efforts. VIVOTEK's commitment With its versatile features, including 5MP resolution, 200M IR illuminators, and 30x optical zoom, the SD9384-EHL camera exemplifies VIVOTEK's dedication to providing cutting-edge solutions for various industries. Moreover, the camera's robust design, protected by IP66, IK10, and NEMA 4X certifications, ensures reliable operation in extreme weather conditions, further emphasising VIVOTEK's commitment to quality and durability. The utilisation of Speed Dome cameras connected to AI servers allowed for advanced monitoring capabilities, surpassing traditional surveillance norms. This breakthrough in security technology showcased VIVOTEK's commitment to innovation and sustainability. This project demonstrated how security technology can be applied differentially, focusing not just on security but also on animal protection and conservation, highlighting VIVOTEK's cameras as versatile tools applicable in various industries, including medical, wildlife preservation, and scientific research. Feedback VIVOTEK's dedication to leveraging cutting-edge technology for the advance of wildlife conservation VIVOTEK's collaboration with Zoos Victoria and Parks Victoria for the seal monitoring project exemplifies its commitment to innovation and ESG principles, highlighting its ability to collaborate with government agencies and prestigious organisations for meaningful projects that contribute to wildlife preservation. The success of this project serves as a testament to VIVOTEK's position as a pioneering provider of advanced security solutions with a focus on making a positive impact on the environment. The project showcased VIVOTEK's innovative AI technology, which played a crucial role in monitoring seal health and detecting potential threats, underscoring VIVOTEK's dedication to leveraging cutting-edge technology for the betterment of wildlife conservation. Advanced security solutions As a result, it received positive feedback for its contribution to wildlife preservation and conservation efforts, with the system's efficiency in monitoring seal health and detecting distress signals being praised by the Marine Response Unit and other stakeholders. Overall, this project underscores VIVOTEK’s role as a pioneering provider of advanced security solutions, committed to making a positive environmental impact through meaningful government collaborations.
Hotel managers require security, flexibility, durability and aesthetics in an access management system that can cover guest rooms and shared spaces, on one hand, and private staff areas on the other. With multiple buildings, a private beach and sports areas, the new TH Resorts Capo Rizzuto on Calabria’s Ionian coast receives high daily traffic from guests and staff, who must have access at different times according to their specific needs. On taking over resort, TH management quickly identified the need for a new locking system that would allow each staff member to access different, specific areas of the facility. In specifying a new master key system, they had two more important criteria. Firstly, the solution should be mechanical rather than digital, to preserve existing hotel aesthetics. Secondly, they required a hierarchical system, where different staff members could have levels of access authority based on their roles. A CYS10 system makes fine-grained customisation possible Security of the comfy nickel-silver key is protected against unauthorised copying by two patents Working closely with the expert specification team at ASSA ABLOY Italia, managers at TH Capo Rizzuto chose a CYS10 master key locking system with Euro profile double cylinders for common area access points and staff-only zones. For guest room doors they selected CYS10 thumbturn cylinders, which lock securely for privacy and quickly unlock from the inside. The CYS10 platform consists of 6-pin sawn key cylinders; it is tested and certified according to EN 1303:2015 and SKG security standards. Security of the comfortable nickel-silver key is protected against unauthorised copying by two separate patents. Their robust design makes them ideally suited to challenging environments such as a busy hotel. Effective master key system design With 63 available key profiles, CYS10 cylinders enable the creation of a complex master key setup with several levels and sub-levels – perfect for access customisation. Effective master key system design reduces the number of keys they need to cut, track or replace. It saves hotel managers time and money. “It is a truly flexible solution and allows us to limit the quantity of keys assigned as much as possible,” says Carmelo Sava, Head of Maintenance at TH Resorts. Effective master key system design reduces the number of keys they need to cut, track or replace Five distinct master key systems – numbering more than 500 CYS10 cylinders in total – were implemented at TH Capo Rizzuto, one for each of the resort’s individual facilities. Each cylinder has its own paired key and, for each building, a master key opens all cylinders. The entire property is controlled by a single grand master key entrusted to management. Future-proof setup at Capo Rizzuto “The ASSA ABLOY master key system allows us to manage the access of all our staff without any security problems,” adds Carmelo Sava. To ensure future-proof setup at Capo Rizzuto, their key systems can adapt or expand at any time: The CYS10 device range includes single, double, thumbturn, screw-in and rim cylinders for interior and exterior doors, switch cylinders for control panels, plus cam locks for letterboxes or furniture. The CYS10 padlock secures gates, lockers, and more.
Up-to-date and accurate maps of the waterways are a prerequisite for safe and efficient shipping in Germany. Authorities such as the Federal Maritime and Hydrographic Agency, but also private harbour operators, are obliged to provide these in an up-to-date form at all times. The main reason for this is to avoid accidents caused by an incorrect or outdated card. This includes the classification of federal waterways, their kilometres, existing locks, lifting and barrages, other surrounding waters, places and borders. Currently, mapping is carried out by conventional ships with trained personnel, which is time-consuming and expensive. This can result in long intervals between measurements at a particular location. 3D map of the surroundings Bank areas and surface forms are monitored by an optical plan with two integrated cameras (Semi-)automated monitoring of waterways by autonomous platforms with obstacle avoidance and traffic detection could optimise this process and provide maps in less time. To this end, the Fraunhofer Institute of Optronics, System Technologies and Image Exploitation IOSB has developed an autonomous surface vehicle capable of autonomously surveying bodies of water as part of a three-year in-house research project. For this purpose, the river bed is recorded using sonar. Furthermore, the bank areas and surface structures are monitored by an optical system with two integrated industrial cameras from IDS Imaging Development Systems GmbH. The information obtained in this way is then merged and transferred to a 3D map of the surroundings. Application The precise surveying of water bodies is a demanding task. TAPS, the Fraunhofer IOSB's semi-automatic direction-finding system for rivers and lakes is able to perform this task both under and above water. The vehicle, which measures approximately 2 x 1.5 x 1 metres, travels along the relevant waterway and automatically avoids obstacles, whether stationary or moving. At a speed of two knots - which corresponds to around 3.7 kilometres per hour - such a mission can last up to 20 hours. For visual mapping of the shore areas, TAPS has two cameras attached to a mast, each pointing to starboard or port and whose fields of view do not overlap. Due to their high resolution, they allow a visual inspection of relevant infrastructure, such as quay walls, as well as 3D modelling of the shore area based on the recorded image data. Orientation of the TAPS platform GNSS and IMU data serve as the basis for picking the position and exposure of the TAPS platform "We use an automated system for intelligent image capture. As soon as one or both cameras are focussed on a predefined area of interest, image recording is started. The vehicle's own movement is also used to store only image data that is recorded from different angles and therefore offers added value in terms of content," explains Boitumelo Ruf, expert in photogrammetry in the Autonomous Robot Systems research group at Fraunhofer IOSB. GNSS (Global Navigation Satellite Systems, such as GPS) and IMU (Inertial Measurement Unit for position determination) data serve as the basis for determining the position and orientation of the TAPS platform. "When the images are captured, they are enriched with the current GNSS position data. The latter are required later for the assignment of precise coordinates," Ruf continues. COLMAP photogrammetric toolbox After data acquisition, the recorded images are transmitted together with the GNSS data to a ground control station, where a photogrammetric reconstruction is carried out. Boitumelo Ruf describes the procedure in more detail: "Among other things, we use the COLMAP photogrammetric toolbox. It uses outstanding image features to first compare the input images, calculate their relative positions and create a true-to-life 3D model of the environment." "We then use the tool to match the images pixel by pixel, i.e. we search for corresponding pixels and merge them exactly. The result is a dense 3D point cloud that is georeferenced using the GNSS positions, i.e. provided with the corresponding current coordinates." The 3D model can then be used for other tasks, such as visual inspections or bank monitoring. Robust industrial cameras defy wind and weather On the camera side, the Fraunhofer Institute relies on two uEye FA industrial cameras from IDS. The robust and resilient models with PoE are ideal for demanding environments. Camera housings, lens tubes and the screwable connectors meet the requirements of IP code IP65/67 and are thus optimally protected against dirt, dust and splash water. The robust and resilient models with PoE are ideal for demanding environments The model used has the large-format 1.1" CMOS sensor IMX304 from Sony and delivers very clear, noise-free images with a resolution of 4096 x 3000 pixels. Thanks to its remarkable dynamic range and very high sensitivity, the global shutter sensor of the second pixel generation of the Pregius series is particularly suitable for metrology applications, among others. It was precisely these characteristics that were decisive for the Fraunhofer IOSB's choice of camera. In addition to robustness and weather protection, important requirements for the cameras included a compact form factor and high image resolution to enable detailed visual inspections. The sensor should also offer a high dynamic range in order to capture images with a high level of detail in both sunny and shady areas. Integration via the standard GigE Vision interface enables the development and use of one driver for several systems with different cameras. Outlook The shortage of skilled labour is also a major issue in the surveying of waterways. Automated mapping of the waterways could not only reduce costs but also the time and, above all, the labour required. The aim of the TAPS project was to develop a prototype for this task and to demonstrate its potential in relevant scenarios. As a research organisation, Fraunhofer typically develops technologies up to a level at which the functionality and suitability of the system have been proven. The next step is now cooperation with industrial partners. Dr. Janko Petereit, head of the Autonomous Robot Systems research group at Fraunhofer IOSB, explains: "We are actively looking for partners to take this final step towards commercialisation together. In view of the positive results of our initial tests and the increasing demand for accurate, up-to-date waterway maps, we expect strong demand for our technology in the coming years. The knowledge gained can be used in a variety of ways. Autonomous watercraft can be used to transport people and goods by sea or inland waterways. The excavation of waterways and the autonomous surveying of fairways are also conceivable. “ The project demonstrates the high potential of the interaction between robot systems and digital image processing. The cards could be reshuffled in the future, particularly with regard to visual environment detection and scene interpretation.
Windsor Port Authority, one of just 17 national ports created by the 1999 Canada Marine Act, has enhanced waterway safety and security across its jurisdiction on the U.S.-Canada border with state-of-the-art cameras from Axis Communications. These cameras, combined with radar solutions from Accipiter Radar Technologies Inc., provide the port with the visibility needed to prevent collisions, better detect illegal activity, and save lives along the river. Windsor Port Located on the Detroit River, the Windsor Port serves as the passageway between Lake Huron and Lake Erie, navigating between 6,000 and 9,000 cargo vessels annually. In addition to commercial ships, over 10,000 small fishing boats and other recreational watercraft make their way through the port each year. Better visibility Windsor Port Authority realised that it needed better visibility into happenings along the river With so many vessels passing through, Windsor Port Authority realised that it needed better visibility into happenings along the river to be able to keep the waterway running safely and smoothly. “Axis’ cameras, along with Accipiter’s radar technology, have been vital to keeping the port safe for all who pass through it,” said Peter Berry, Harbour Master and Vice President of Operations for Windsor Port Authority. Real-time incident detection “Without detailed knowledge of the traffic in these waters, the risk of severe accidents increases significantly, so having the ability to both detect and visually confirm incidents in real-time is invaluable." "We’ve already been able to do some amazing things with the enhanced surveillance solution, like quickly rescuing drowning victims and helping to catch human smugglers, and we’re eager to see what the future holds as a result of this upgrade.” An effective, remote observation By integrating Axis’ bispectral cameras into Accipiter's platform, the port has a 360-degree surveillance system While radar coverage from Accipiter has monitored river activity for years, offering wide-area, real-time detection, and tracking to identify commercial vessels, small craft such as jet skiers, and even debris in the water, it lacked the visual detail needed to provide effective, remote observation. By integrating Axis’ bispectral cameras into Accipiter's platform, the port has a 360-degree surveillance system with both thermal detection and visual verification. System benefits With this enhanced system, the port can: Broadcast real-time warnings about obstructions in the channel: In one instance, the U.S. Coast Guard notified the port that they’d spotted a boat stopped in the middle of the river. The vessel had caught fire, dropped anchor, and was dead in the water. The thermal camera and radar technology allowed for continuous monitoring of the fire onboard the ship, helping them to determine that it was contained to the engine room while enabling the port to send out a navigational warning to other vessels on the river. While the darkness of the hour prevented them from seeing anything from shore, the technology also provided thermal visuals to monitor activity on the bridge and deck. Everyone was safely evacuated. Safely navigate craft through high-risk construction projects: During the construction of a new bridge, the port was concerned about potential disruptions to river traffic, but Axis cameras and integrated radars allowed them to effectively manage vessels passing underneath the site. Deliver precise coordinates for faster rescue operations: When the port got a call from the U.S. Coast Guard that they had spotted a person treading water by the Ambassador Bridge, they were able to quickly identify the location of the person using a combination of radar and camera technology and execute a life-saving rescue. Help to identify criminal activity: While using the camera-radar technology to view objects crossing from Canada to the U.S., the port identified suspicious activity from a boat that regularly sailed from Windsor to Detroit. The port turned the data and video over to the Canadian and U.S. authorities to investigate, which ultimately led to the arrest of two individuals running a human smuggling operation. Marine domain awareness “At Axis, we take pride in working with organisations like Windsor Port Authority to contribute to improved marine domain awareness and heightened safety along the border,” said Anthony Incorvati, Transportation Segment Development Manager for the Americas at Axis. “Combining advanced camera and radar technology ensures comprehensive visibility in maritime environments, providing essential detection and visual verification to resolve incidents quickly and effectively. Not only that, but powerful business intelligence capabilities contribute to improved operations across the organisation.”
Based in Northern California, LYNX Logistics is a third-party logistics (3PL) company specialising in high-value assets. The company partners with the Transported Asset Protection Association (TAPA), aligning with TAPA’s global coalition of manufacturers, shippers, and carriers to protect every corner of their 96,000-square-foot mixed-use facilities, which encompass 8,500 rack and bulk pallet locations. Strategically headquartered near the Port of Oakland and Silicon Valley, it plans to expand to major cities across the United States in the coming year. Adopter of new technology Francisco recognised the value that an integrated physical security system President & Founder Francisco Garcia started the company with a 15-year background in product design and mechanical engineering. An early adopter of new technology, Francisco recognised the value that an integrated physical security system could bring to the organisation, improving efficiency while going above and beyond in protecting cargo. "Once clients see our facilities, they are assured. We don't cut corners on cargo security.” The challenge Safety and security are critical for LYNX, which differentiates itself in the market with the real-time visibility it provides clients over their cargo. To meet industry requirements, the company must also provide accurate compliance documentation and assurance of timely deliveries. To maintain client satisfaction, the team proactively works to prevent and mitigate the risk of errors, defects, damages, and delays. “At one point, I considered implementing container recognition software that could read container IDs. Today, AI-powered search solves this problem.” Team proactively works to prevent and mitigate the risk of errors, defects, damages. Why Verkada? Verkada cameras, intercom, and air quality sensors are integrated behind the Command platform Verkada cameras, intercom, air quality sensors, alarms, and access control security solutions are seamlessly integrated behind the centralised Command platform, giving teams an all-in-one view of security operations – including cargo and containers. "The container ID numbers are the heartbeat of logistics. Everything moves in them, and there's often a need to review camera footage to pinpoint exactly when a container arrived and left the facility.” AI-powered search AI-powered search empowers LYNX to search for people and vehicles using freeform text within the Command platform. By typing in unique container IDs and vehicle information, teams can swiftly find and track a container's precise location and status. This reduces the risk of potential holding charges and administrative tasks, enabling the team to submit real-time data on the spot. “Using AI-powered search, we can quickly locate each container by its unique ID and know exactly where cargo is in the facility, as well as which employee unloaded each container, at which dock door, and for how long." AI-powered search empowers LYNX to search for people and vehicles. Efficient tracking and dispatch Instead of manually sifting through hours of footage, the dispatch team can retrieve the footage they need by typing in container IDs and vehicle descriptions. In the Command search bar, they can enter terms like "(container ID) red truck between April 15th and May 1st” and specify a camera or location to narrow the search even more. "Tracking down a container in our yard now takes a fraction of the time. Instead of scrolling through hours of footage, we can easily find the exact footage we need in seconds. We can filter results via the entrance camera and see when certain crates arrived based on their container ID.” Dispatch team can retrieve the footage they need by typing in container IDs. Real-time cargo monitoring Francisco can remotely check the camera feed from the Command web browser or mobile app Every corner of the facilities is closely monitored by hybrid cloud cameras that oversee cargo from its arrival to its final storage location. Through a web link, vendors can see the whereabouts of cargo as it’s unloaded, transported, and warehoused within facilities. At any point in time, Francisco can remotely check the camera feed from the Command web browser or mobile app. He has set up motion alerts for unusual after-hours activity, to which he can take action and even automate responses with professional monitoring. "We're proud to offer live monitoring to our customers, who can see as their cargo is unloaded and stored securely.” Proactive safety and risk mitigation AI-powered search helps verify that safety standards, protocols, and policies are maintained. By detecting and addressing issues quickly, the team swiftly takes action to prevent accidents and equipment damage, proactively upholding a safer work environment. “We can check for employees wearing safety vests while working, or certain forklifts only being used inside and not outside.” AI-powered search helps verify safety standards, protocols, and policies. Automating visitor management with driver check-in portal By U.S. Customs and TAPA certification standards, every driver must sign in upon entering the premises. Instead of relying on a pen-and-paper logbook, Francisco has turned Verkada Guest into a driver check-in portal. This digital record helps maintain compliance by facilitating the driver check-in process. “Now, drivers can check in through the Guest iPad, take a photo, and upload their licence. This process helps us comply with customs in a streamlined way.” Francisco has turned Verkada Guest into a driver check-in portal. Streamlined audits to support certifications Meticulous tracking helps maintain compliance with the FDA, US Customs and ISO certification Checks and check-ins extend to cargo as well. With AI-powered search, the team can search for specific items, such as medical device crates, to ensure items are properly labelled and container IDs are verified as they arrive and leave. This meticulous tracking helps maintain compliance with the FDA, US Customs and ISO certification standards. "We're dually ISO-certified, TAPA-certified, and U.S. Customs-certified. All organisations were thoroughly impressed with our video security. When we present this package to high-level customers, they're mind-blown.” Medical device and environmental monitoring A core value at LYNX is providing their clientele with customised solutions that exceed expectations. Air quality sensors help show that ISO certification standards are met for their medical device clients. LYNX goes above and beyond – tracking temperature, humidity, and carbon dioxide levels to maintain optimal conditions. "The integrity of the sensors is important to us. What a lot of people do is put a sensor in the coolest spot in the facility, then manipulate the data to show consistent results," Francisco explains. "But we track everything honestly and transparently. We show our vendors the functionality behind Verkada’s sensor technology: temperature, humidity, CO2, indoor air quality, and beyond.” A core value at LYNX is providing their clientele with customised solutions. Intrusion detection, response, and alerts Verkada’s professional monitoring service includes intrusion response from trained agents LYNX recently transitioned its legacy alarm system to Verkada to bring all physical security management under one umbrella. "It just makes sense logistically to have our team manage everything through one interface.” Wired alarm sensors protect facilities at every access point, with the ability to alert staff of incidents like Door Held/Forced Open (DHO/DFO) and tailgating. Beyond real-time intrusion detection, Verkada’s professional monitoring service includes intrusion response from trained agents who can take action immediately to potential threats. Visibility and control over doors LYNX has over 20 access-controlled doors, a requirement for certain certifications. By efficiently controlling access points and implementing real-time compliance checks, LYNX provides a protected environment for high-value cargo. "We can track every single door, along with every person who accesses or tries to access them.” LYNX provides a protected environment for high-value cargo. Gated entry with intercom Upon arrival, visitors of all types buzz into the building using the Verkada Intercom Upon arrival, visitors of all types buzz into the building using Verkada Intercom. Dedicated LYNX staff members can verify the visitor’s identity, answer the call, choose to grant them entry, and even unlock doors remotely with integrated access control. Entrance security is further enhanced with context cameras and real-time alerts for people or vehicles of interest. "It's not just about letting people in; it's about ensuring that everyone who enters our facility is verified and authorised. This technology offers peace of mind to both our team and our clients." Multi-layered perimeter security Beyond the buildings, parking lots and perimeters are protected with Licence Plate Recognition (LPR) technology, cameras, and alarms. The main entrance is followed by two buffer zones, each with its own gate, and includes Licence Plate Recognition (LPR) cameras that track vehicles entering the premises. "We have a main entrance and multiple gates – all controlled through Verkada. The cameras are strategically placed, so we could even deploy tailgate detection if needed.” Parking lots and perimeters are protected with LPR technology. Quality and client assurance Francisco shows them their guest log and footage of everywhere they have been in the facility Auditors sign in via Verkada Guest before walking through the facility. At the end of their visit, Francisco shows them their guest log and footage of everywhere they have been in the facility. Once clients see the facilities firsthand, their decision becomes clear. "I truly believe that all we have to do is get people in here. The facility does the rest.” AI-powered search capabilities further distinguish LYNX in the logistics industry, offering exceptional protection for high-value cargo. "Our AI-powered capabilities set us apart in the market. This technological edge is why clients trust us with high-value items like medical devices." Looking ahead Francisco’s passion for new technology brings innovation to the forefront, setting the company apart in the competitive logistics industry. He has even built a special mount, which can peer into containers and trailers while suspended from the loading dock. "We believe in investing in cutting-edge technology to provide the highest level of service and quality for our customers. I love to hear, ‘Nobody else is doing this.’ It means our clients are doing their homework and we're doing something right.” Francisco’s passion for new technology brings innovation to the forefront. Their proactive security measures have built trust with customers and struck a chord with prospects. So much so that expansion plans are underway to open new facilities in major cities across the United States. “We can continue to bring our security to the next level, from AI-powered search to future feature releases. We’re excited to try it all.”
Frontline Communications, a division of Pierce Manufacturing, Inc., an Oshkosh Corporation business, announced the delivery of a C-40X-2 mobile command vehicle to the Loudoun County Sheriff’s Office in Virginia. The vehicle was featured at the National Sheriffs’ Association (NSA) Conference in Oklahoma, showcasing its state-of-the-art options and upgrades, making it an essential asset for the Sheriff's Office. New mobile command vehicle Sold through Frontline Communications dealer Atlantic Emergency Solutions, the new mobile command vehicle is built on a Peterbilt 548 chassis and measures 38’ 8” in length and 12’ 6” in height. It includes two slide-outs and a 20kW generator, providing ample power for its extensive features. The vehicle is equipped with two entrances, a spacious rear interview room/workstation area, and a forward conference room with seating for eight, ensuring a versatile and functional environment for various operations. Step Up Strategy Major Craig Schleiden of the Loudon County Sheriff’s Office stated, “This vehicle represents a significant advancement in our ‘Step Up Strategy’ to enhance safety, service, technology, efficiency, and professionalism." "The integration of this mobile command unit to our Frontline Communications/Pierce fleet will enable us to better serve our community and improve our collaborative efforts with federal, state, and local law enforcement agencies.” Key features of the new mobile command vehicle Side and rear entrances. 360-degree backup camera system. Four 15k BTU rooftop air conditioners. 100A shore power upgrade. 20’ electric awning. Will-Burt 42’ mast with matching shroud. Exterior monitor compartment with 43" anti-glare monitor. The vehicle's technology includes: Axis perimeter camera system with 16-channel recorder. AvL 1.2m Ku-band VSAT and Winegard Trav'ler DirecTV. Wireless PA system and Firecom radio intercom system. Extron 16x16 video switcher with Frontline Communications touchpad controller. Eight 24" monitors, four 22" monitors, and one 65" Ultra HD monitor. Dual thermal/HD Color Pan Tilt Zoom mast camera. Two PCs, eight docking stations, and a printer. Trendnet 52-port network switch and 5G network with Cradlepoint cellular router. Innovative features “This project highlights our commitment to providing law enforcement with one of the most advanced mobile command units available,” said Steve Williamson, vice president of sales with Frontline Communications. “Having the vehicle in our booth at the NSA Conference allowed us to directly engage with a broad span of representatives from many organisations and discuss its innovative features. We’re proud to support the Loudoun County Sheriff’s Office as they enhance their capabilities to ensure the safety and well-being of their community.”


Round table discussion
Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open ports on the network expose an IP video system to the internet. This makes it a potential target for malicious cyberattacks. In the physical security industry, the elimination of port forwarding is seen as a basic and manageable precaution to shore up cybersecurity. We asked this week's Expert Panel Roundtable: What are the risks of port forwarding, and how can manufacturers and/or integrators mitigate those risks?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Products


Coastal surveillance: Manufacturers & Suppliers

7 proven solutions for law enforcement key control and asset management
Download
2025 Trends in video surveillance
Download
Maximising security and performance
Download
Guide for HAAS: New choice of SMB security system
Download
The truth behind 9 mobile access myths
Download