Fleet surveillance
Morse Watchmans, the industry pioneer in key control and asset management systems, is highlighting the KeyWatcher® Touch at ISC East on November 20-21 at the Javits Centre in New York City. Located at booth 231, Morse Watchmans will feature hands-on demonstrations of the KeyWatcher Touch and other solutions, showcasing advanced capabilities for robust, scalable key control. Key management system KeyWatcher Touch features a modular, expandable design that allows corps to tailor the sy...
United European Car Carriers (UECC) has chosen Daphne Technology’s PureMetrics™ emissions monitoring system to enhance its environmental performance. This partnership reflects both UECC and Daphne’s commitment to sustainability within the maritime industry and aligns with their mutual focus on fugitive emissions and monitoring solutions. PureMetrics™ will deliver real-time emissions data, enabling UECC to exceed regulatory requirements and advance a greener supply chain....
Teledyne FLIR is all set to showcase its product portfolio at ADIPEC 2024, scheduled from 4th to 7th November in Abu Dhabi. Exhibiting at Stand 1005, Hall 1, Teledyne FLIR will showcase innovative sensing solutions such as SI-2 Series, including the new Si2x, PHH – T-series, Exx-series, and OGI cameras around SF6 detection. The ground-breaking product on display is the FLIR Si2x-Pro™ Hazardous Location Acoustic Imaging Camera for Gas Leak, Mechanical Fault, and Partial Discharg...
Canon Europe announces its recognition as an Industry pioneer in Quocirca’s prestigious 2024 Print Security Landscape report. This distinction highlights Canon’s commitment to providing globally consistent and innovative security solutions & services for secured print and document management that outpace competitors. The report specifically highlights Canon’s flagship print management platform, uniFLOW Online, as one of the key elements of its security offering,...
Durite, the UK's pioneering brand in vehicle safety, lighting, and auto electrical parts for commercial vehicles, is excited to announce that it will be showcasing its fully compliant Progressive Safe System (PSS) at the FORS Annual Conference 2024, taking place on October 15th at the International Convention Centre (ICC), Birmingham. This year’s FORS Conference, themed "Drive and Thrive: Your Roadmap to Success", will bring together over 500 transport and fleet management professionals t...
Morse Watchmans, the industry pioneer in key control and asset management systems, is showcasing its premier key control management solutions for casino applications at booth 1337 at G2E 2024 at The Venetian Expo Las Vegas through October 10. As the trusted choice for leading casinos worldwide, the Morse Watchmans KeyWatcher® Touch and its suite of solutions deliver secure, efficient, and regulation-compliant key management, providing a seamless experience tailored to the demands of gaming...
News
Global Security Exchange (GSX) 2024, the annual conference of ASIS International, the world’s largest association for security management professionals, closed on day two in Orlando, FL. Concluding the afternoon of Wednesday 25 September, the event features an extensive program with more than 200 education sessions, daily keynote speakers and general sessions, and a show floor with approximately 500 pioneering innovators from the security industry. Prevalence of AI Tuesday’s general session featured Rana el Kaliouby, an executive fellow at Harvard Business School, co-founder of Blue Tulip Ventures, and an investor in leading AI technology. El Kalibouy discussed the increasing prevalence of artificial intelligence in lives, the opportunities that it presents, and the potential risks. She also highlighted the real-world effects and economic impact of artificial intelligence. “AI has a massive impact, adding $2.6 million to the global economy,” said el Kalibouy. Physical security in K-12 settings Kaliouby emphasised the extent of holding strong ethics when implementing AI into workplace policies Moving forward, el Kaliouby emphasised the importance of maintaining strong ethics when implementing artificial intelligence into workplace policies. The ASIS Professional Standards Board hosted a press briefing Tuesday morning featuring a panel of experts who detailed the proposed ASIS School Security Standard. The standard is a comprehensive tool, including information on program management, risk management, behavioural threat assessment management, developing operational emergency plans as well as effective approaches to managing physical security in K-12 settings. Security risk management principles “Right now, if a school wants to improve its security, it's hard to know where to start,” said Jeff Slotnick, ASIS School Security Standard Technical Committee co-chair. “There's a lot of advice out there, but it's scattered and sometimes contradictory. It's like trying to build a house without a complete set of blueprints.” “Our aim in initiating this project was to create a solid framework based on enterprise security risk management principles that will assist all schools in developing an appropriate and risk-based security program that blends leadership, risk assessment policies, procedures and practices, physical security, behavioural threat assessment and management, and emergency response principles to provide tools for those schools that they can pick up and apply effectively in their own environment,” added Drew Neckar, ASIS School Security Standard Technical Committee co-chair. Current challenges ASIS continues to share updates on the standard, which is expected to be ended in the latter half of 2025 ASIS will continue to share updates on the standard, which is expected to be completed in the latter half of 2025. The Game Changer session titled “Do You Trust Me? How to Thrive in a Mistrustful Era,” delved into how global conflicts can increase not only external threats but can also create discord within workplaces. Donna Concannon, PCI, Dean of the California School of Forensic Studies at Alliant International University and Principal at CPW Consulting Group, Inc. and Specialised Training Services, Inc., discussed with attendees how mistrust can threaten security, what current challenges are and how technology amplifies them, and how to leverage human nature to combat future mistrust. Final day of GSX The final day of GSX, on Wednesday, 25 September, will feature Military and Law Enforcement Appreciation Day (MLEAD) honouring the individuals who make our communities and world a safer place. As a thank for their service, all law enforcement, military, and first responders receive a free one-day pass to GSX 2024. Highlights of upcoming sessions Additional highlights of upcoming sessions on Wednesday include: General Session: Commander Kirk Lippold, U.S. Navy (Ret.) Game Changer: When Chaos Reigns: The Critical Role of Security in Global Crises Building Resilient Teams for Military and Law Enforcement Personnel The Business Model of Terrorism Career Mapping: Plan Your Post-Military Journey Artificial Intelligence: Harnessing Security Data for Business Outcomes
Smiths Detection, a global pioneer in threat detection and security screening technologies, and a business of Smiths Group plc, announces the launch of the SDX 6040 Enhanced Image Quality (EIQ), a cutting-edge screening solution designed to meet the dynamic demands of modern security environments. SDX 6040 The SDX 6040 offers the best image quality on the market, ensuring unparalleled clarity when detecting threats. Unlike fixed screening equipment, the SDX 6040 is highly mobile, allowing it to be moved and powered up easily. It is an ideal solution for critical infrastructure, urban security and both public and private sector environments where high levels of safety and operational efficiency are paramount. Adaptable solution for security SDX 6040 is light with a narrow 80 cm footprint, allowing for rapid relocation to any site. The SDX 6040 is lightweight with a narrow 80 cm footprint, allowing for rapid relocation to any site. The touch screen provides an easier and faster way for users to interact with the system for greater accessibility. The SDX 6040 can also be used with other Smiths Detection and partner technologies, including people screening and the trace detection of narcotics or explosives, making it a comprehensive and adaptable solution for security needs. Enhanced detection with greater versatility The SDX 6040’s powerful 160kV generator delivers exceptional X-ray image quality, which enables operators to quickly and accurately identify potential threats, significantly reducing the risk of misinterpretation. The system’s smart image display, equipped with features like organic stripping and enhancement modes, provides superior discrimination between organic and inorganic materials—critical for the precise detection of explosives, drugs, and other contraband. Redesigned detection system An optimised background contrast function reduces eye strain, allowing operators to maintain high vigilance during prolonged use. The redesigned detection system ensures a totally comprehensive view of every item, eliminating any blind spots. Additionally, the solution is compatible with iCMORE, our AI technology, offering automated threat detection for a wide range of prohibited items. Ensuring public security in a world of risk SDX 6040 is a high-performance key for busy urban climates that are targets for security threats The SDX 6040 is a compact and high-performance solution for busy urban environments that are often targets for security threats such as power plants, transport networks, government and corporate buildings, visitor attractions, prisons, cruise ships, sports arenas/venues, and world heritage sites. This type of technology will be crucial in detecting and preventing threats such as terrorism, violent crime, and narcotics smuggling. Broader implications Dr. Philo Daniel, Global Aviation and Urban Security Director at Smiths Detection, said of the launch: “At Smiths Detection, our mission is to make the world a safer place." "We know that urban environments are increasingly tackling threats from groups and individuals. Ensuring their safety has broader implications for the public, national security, and economic stability." Unparalleled detection capabilities "The SDX 6040 has been designed to offer superior image interpretation in a compact solution, providing unparalleled detection capabilities while integrating into high-traffic areas." "This technology ensures rapid, accurate screening, empowering security personnel to respond to potential threats in order to enhance the protection of critical infrastructure and public spaces.”
ISC East, with its premier sponsor the Security Industry Association (SIA), and in partnership with the ASIS NYC Chapter, announced 2024’s slate of speakers that will headline the Keynote Series at The Bridge, ISC East’s mainstage destination. ISC East Keynote Series Day 1 Keynote: Proactive Security Strategies at Navy Pier, Chicago: A Unified Approach to Emergency Preparedness and Response – Brian Murphy, chief operating officer at Navy Pier in Chicago, Illinois, will discuss how the Navy Pier has developed a comprehensive security strategy that emphasises proactive measures and unified emergency preparedness. This approach integrates advanced technologies, coordinated efforts among various public safety agencies, and continuous training to ensure a safe environment for all visitors. Day 2 Keynote, Presented by the SIA Women in Security Forum: Commissioner Jackie Bray. (Sponsored by Axis Communications) – Join them for an engaging keynote event presented by the SIA Women in Security Forum (WISF), a professional community committed to engaging all security professionals in promoting, recruiting, and cultivating the leadership of women for a stronger and more inclusive industry. Hear from Jackie Bray, the first female commissioner of the New York State Division of Homeland Security and Emergency Services. SIA Education@ISC programme ISC East will also place special emphasis on critical infrastructure protection and addressing the risks In addition to the Keynote Series, the event will offer its largest SIA Education@ISC programme yet with 70+ sessions and 150 speakers – all carefully curated by the newly formed SIA Education@ISC Advisory Board. This team of industry experts provides critical guidance on the newest trends and most relevant technologies in the world of security to best inform show programming. ISC East will also place special emphasis on critical infrastructure protection and addressing the risks and vulnerabilities associated with safeguarding the country’s essential service sectors. Up-to-date programming “ISC East takes stock of the current safety and security landscape to provide the most up-to-date programming for our attendees and exhibitors,” said Mary Beth Shaughnessy, ISC event vice president. “With the help of the SIA Education@ISC Advisory Board, we have prepared a dynamic lineup of industry thought pioneers for the Keynote Series and an engaging education schedule highlighting the most innovative topics and solutions in the field. With ISC East two months away, we are eager to present these offerings to our dedicated customers who return to our show year after year to continuously build on their security knowledge.” Technical training and case studies “At the SIA Education at ISC East conference, attendees can uncover a robust variety of compelling sessions on the most pressing issues in our industry across public safety, emergency preparedness and response, and homeland security,” said SIA CEO Don Erickson. “In addition to high-quality keynote presentations from Navy Pier’s Brian Murphy and Commissioner Jackie Bray, the 2024 programme boasts more offerings than ever before and a unique mix of interactive panel discussions, technical training, and case studies to help security professionals advance their careers, their businesses and the industry as a whole.” Featured SIA Education@ISC Sessions A Deep Dive Into OT Cybersecurity – Securing the World’s Critical Infrastructure Tuesday, Nov. 19, 11:00 – 11:45 am. | 1A24 Speakers: Christopher Walcutt, chief security officer, DirectDefense Adi Karisik, division vice president, global strategy and operations – cyber and intelligence, Jacobs Pierre M. Bourgeix, CEO and founder, of ESI Convergent Joey St. Jacques, CEO of Utility Intelligence International, Chair – SIA Utilities Advisory Board Cybersecurity in the future The focus will include dealing with AI, utilising AI to protect, and advanced uses for data from these critical systems This panel will cover a variety of topics surrounding cybersecurity in the future of protecting critical infrastructure. The focus will include dealing with AI, utilising AI to protect, advanced uses for data from these critical systems, and new and different approaches to solving old problems in the critical infrastructure cyber and physical security space. Panelists will include system designers, integrators, former utility employees, and consultants who actively design and operate defenses in this space. Lessons From the Frontlines: Cybersecurity Case Studies for the Physical Security World Wednesday, Nov. 20, 9:30 – 10:15 a.m. | 1A24 Speaker: William Knehr, senior manager of information security and data privacy, i-PRO Americas Tactics compromise physical security systems The lines between cybersecurity and physical security continue to blur. In this presentation, he will dive into real-world case studies that expose the tactics cybercriminals use to compromise physical security systems. Attendees will analyse how these attacks unfolded and explore the devastating consequences for facilities, operations, and even personnel safety. Security Risk and Return on Investment: Are You Looking at Just the Tip of the Iceberg? Wednesday, Nov. 20, 10:30 – 11:15 a.m. | 1A06 Speakers: Rachelle Loyear, vice president of integrated security solutions, Allied Universal James Marcella, director of industry relations, Axis Communications Security risk management The session will feature insights from an enterprise security risk consultant and expert This engaging panel discussion will delve into the complexities of security risk management and programme value assessment, emphasising the importance of looking beyond upfront costs to understand the full spectrum of potential risks and long-term expenses. The session will feature insights from an enterprise security risk consultant and expert and a security technology manufacturer, each providing unique perspectives on risk-led security design. Keeping the Skies of NYC Safe: Critical Infrastructure Sites Collaborate with NYPD Thursday, Nov. 21, 11:15 a.m. – 12:00 p.m. | 1A06 Speakers: Jackson Markey, director of U.S. commercial sales, Dedrone Lieutenant James Reilly, Counter Terrorism Division, New York City Police Department Scott Gross, facility security officer, Con Edison of New York Counter-drone security protocols New York City has strict drone permitting regulations – developed in response to a growing number of drone incidents in areas like Hudson Yards (not far from the Javits Center) and near Con Edison facilities. While the NYPD handles enforcement, private entities also recognise the risks of illegal drones. This session, featuring public and private representatives, will use NYC as a case study to show how different organisations collaborate to create effective counter-drone security protocols and aid in apprehensions.
Teledyne FLIR, part of Teledyne Technologies Incorporated, announced a limited-time promotion for SIRAS™, a professional drone that includes a quick-connect dual radiometric thermal and visible camera payload. First responders, including police, fire, and search and rescue agencies, can now purchase one unit per agency at a significantly marked-down price of $6,995, a discount of more than 28 percent, through the end of the 2024 calendar year. SIRAS drones SIRAS drones are engineered for data security, performance, and affordability, making them the ideal choice for public safety, firefighting, and search and rescue missions. At a significant discount, agencies can replace or add to their existing drone fleet an offering that is purpose-built for safety and security. “First responders are investing in SIRAS. In recognition of their mission and budget restraints, we want to support the community with this promotion that runs through National First Responders Day and beyond,” said Mike Walters, Vice President, Product Management, Teledyne FLIR. He adds, “Especially for those organisations seeking an alternative to drones originating from countries of concern. Teledyne FLIR is proud to offer those on the frontlines a drone that makes their missions swift, safe, and secure.” Vue® TV128 payload features The Vue® TV128 payload features a 16MP visible camera with 128x zoom to pinpoint details SIRAS is an IP-54-rated aircraft with a flight time of more than 30 minutes, radar-based front collision avoidance, and backpack portability. With no geo-fencing restrictions, first responder UAV pilots are in control to determine when and where to fly the SIRAS as the mission demands. The Vue® TV128 payload features a 16MP visible camera with 128x zoom to pinpoint details. The integrated 640x512 pixel radiometric Boson® provides best-in-class thermal imagery, 5x digital zoom, and temperature measurement of every pixel in the scene. Drone pilots Designed with cyber security in mind, SIRAS stores imagery and video directly onto an onboard SD card without cloud connectivity features. Additionally, drone pilots are not required to set up an online profile, simplifying operations and minimising the risk of unintended online data exposure. The aircraft is manufactured in Taiwan and the payload is manufactured at the Teledyne FLIR facility in Goleta, Calif., USA.
HMS Networks now announces the launch of the Anybus Defender Lineup, a suite of industrial network security appliances designed to safeguard critical infrastructures. As cyber threats increasingly target industrial environments, the Anybus Defender series provides a firewall to protect operational technology (OT) networks. New protection strategies Specifically designed for Industrial Control Systems, the primary use-cases are network segmentation in line with ISA/IEC 62443-3-3, Network Address Translation with traffic filtering and deep packet inspection (DPI) on industrial protocols to enable deep protection of industrial assets. The offering is ideal for machine builders who want to embed security in their offering, as well as asset owners in manufacturing and critical infrastructures to upgrade their existing networks with new protection strategies. Four distinct models The Anybus Defender Lineup features four distinct models to meet diverse security needs: Anybus Defender Compact 1004 – A space-efficient solution for smaller industrial environments, offering robust protection without compromising on protection use-cases. Anybus Defender 4002 – A versatile firewall designed for medium-sized networks, combining advanced security features with ease of deployment. Anybus Defender 6004 – Ideal for larger installations, this model delivers enhanced security capabilities and comprehensive network protection. Anybus Defender 6024 – The flagship model, engineered for the most demanding industrial applications, providing extensive security and network coverage. The Anybus Defenders are ideal for physical segmentation strategies and come with various port configurations from RJ-45 ethernet to SFP ports supporting copper or fibre connectivity. Anybus Defender 4002, 6004 and 6024 are available with tree different licences enabling various security use-cases. Key features of the Anybus Defender lineup Industrial-Grade Security: Built to withstand the harsh conditions of industrial environments, the Anybus Defender appliances offer reliable performance in challenging settings. Scalable Solutions: Whether for small, medium, or large-scale operations, the Anybus Defender series provides scalable security options tailored to the specific needs of each network. ICS-aware software: Built-in industrial asset detection and policy control capabilities for industrial protocols with auto rule creation, enabling the administrator to see what they are managing and taking granular control over the network traffic with ease. User-Friendly Interface: Simplified setup and management through an intuitive interface, enabling operators to monitor and control network security effortlessly. An optional central CyberSecurity Console software can be used to manage a fleet of Anybus Defenders in one simple web user interface. Industrial network security "We are excited to introduce the Anybus Defender Lineup, which represents a key element required for modern industrial network security," says Thomas Vasen, Business Development Manager of Network Security, adding "As industrial networks become increasingly interconnected, the need for robust security measures is paramount." He continues, "Driven by regulations such as NIS2 and standards such as 62443-3-3 customers are implementing physical segmentation to separate their machines and critical assets. The Anybus Defender series offers reliable, scalable, and user-friendly solutions to increase visibility, reduce the risks for and the impact of a breach." The Anybus Defender Lineup is now available for order through HMS Networks’ global network of partners and distributors.
Sustainability is a hot topic. Everyone knows about it. Governments have active Net Zero strategies and implementation plans, while organisations are establishing plans and activities to reduce their environmental impact. In many instances, it is evident that failing to act can also have an effect on a company’s reputation, culture, and brand perception. In most cases, businesses are not shy about promoting their achievements through different communication channels, understanding that being a pioneer of the Net Zero approach might offer a competitive advantage as well as ‘doing the right thing’. Government’s Net Zero Strategy As a result, some travel-heavy sectors are actively transitioning to electric fleets Even though the UK has been the first major economy to reduce its emissions by half, the Climate Change Committee highlights that the country is not on track to hit the 2030 target and urgent actions are required. According to the UK Government’s Net Zero Strategy, transport emissions are among the issues that must be tackled, and the delivery pathway of reducing them includes a widespread usage of zero-emission vehicles to decarbonise travel. As a result, some travel-heavy sectors are actively transitioning to electric fleets. Royal Mail, for example, has over 5,000 electric vehicles on the road, matched by Mitie with 66% of its fleet now switched to electric. However, this transformation presents considerable challenges for many other businesses. Applying sustainable practices to Security and FM travel Both Security and FM industries heavily revolve around travel, whether it is for patrolling or delivering services at customer premises. Managing security patrol fleets is particularly complex in terms of sustainability; in order to respond swiftly to alarm callouts, patrol vehicles must be equipped with heavy key lockers that hold a large number of keys. This also implies that vehicles must be reinforced to protect such valuable stock, making it exceptionally difficult to transition to lighter EV alternatives. FM service delivery may appear less polluting in this respect. However, travel and time are still required for key collection, especially when subcontractors are involved in the process. Excessive emissions may be passed on through the supply chain; in practical terms, the emissions are not actually reduced and the impact on the environment remains the same. Adopting low-carbon solutions Nearly a fifth of physical security experts worldwide may be concerned about initial cost The views on the topic seem to be quite polarised across the security industry. The “Sustainability and the Security Industry” survey by asmag.com-Hikvison reveals that 47% of respondents view green and low-carbon initiatives as very important while 30% believe they are fairly unimportant. According to the Statista report, nearly a fifth of physical security professionals worldwide may be concerned about the initial cost and return on investment when adopting low-carbon solutions. With such statistics, it is no surprise that carbon offsetting is becoming so popular as it does not require any operational change while ‘green claims’ can be made. This approach is questioned by both Greenpeace and the Institute of Applied Ecology, questioning the effectiveness of the method and calling it “lip service to action”. Net Zero targets Yet the tables appear to be turning in recent years, and a serious approach to sustainable actions is becoming a must. The end users are stepping up and becoming more demanding in terms of service provider sustainability. For example, Better Buildings Partnership (BBP), a collaboration of pioneering property owners focused on improving the sustainability of commercial buildings, has created guidance notes for property managers on embedding sustainability into security services procurement, focusing on both environmental and social issues. Therefore, it only makes sense that both security and FM firms take feasible actions towards ensuring a more sustainable business model in order to secure the contract at the tendering stage. While many corporate activities can contribute to carbon neutrality, one particular element associated with travel can have a positive impact on the journey to their Net Zero targets. Changes to the keyholding model, which is often overlooked as an insignificant element of the overall operational mix, can reduce travel by half and enable the implementation of an EV fleet. Tried and tested approach Demonstrating plans for reducing emissions would benefit them and create a chance for their suppliers The tried and tested approach: A case study of CO2 reduction through keyholding improvements in FM delivery. With the UK Government’s commitment to Net Zero, it was only logical for each department to set specific targets to ensure that this goal is met across all their services. When selecting an external company for FM service delivery, most of which required contractor after-hours access to public buildings, one Government department wanted to ensure that carbon emissions were taken into serious consideration when awarding the contract. They were aware that demonstrating strategies for reducing emissions would benefit them as well as create a chance for their suppliers to do the same. Keynetics key management solution As a solution, they opted to implement a new keyholding method by Keynetics, which allowed them to store keys at the point of entry in commercial-grade secure key safes at 280 locations. The Keynetics key management solution incorporates mobile access via an app and a platform for remote access management that also allows audits, which was a critical element for this tender. Gathering visit data and analysing metrics, such as visit duration, vehicle utilisation, and travel time between facilities and key storage areas, allowed this Government Department to quantify the improvements in service metrics and reductions in carbon emissions. The deployment of the Keynetics key management solution resulted in a 50% decrease in visit-related trips and a corresponding 50% reduction in carbon emissions, removing 784 tonnes of CO2 within the first year of the implementation. Further developments Demand for favor vehicles fell with staff adopting alternative modes of transportation Furthermore, the demand for service vehicles dropped with staff adopting alternative modes of transportation to required locations. Meanwhile, a globally recognised security company adopted Keynetics’ SentriGuard® solution at different customer sites to improve their response times. Not only did it provide improvements to their keyholding approach, but it also helped to achieve environmental benefits and reduce operational costs. In Germany, the Keynetics system is being used by a world-pioneering provider of integrated electronic security solutions to reduce the number of keyholding patrols by 40% over the next three years. The security factor: Conducting due diligence Despite all of the benefits, one of the major obstacles when discussing key storage at the point of entry is dispelling objections around the security of key safes. To address this understandable and genuine concern and demonstrate that Keynetics key safes exceed all industry requirements, the company has earned LPS 1175 C1 and C3 rating certificates from the Loss Prevention Certification Board (LPCB). The certification process includes audits of all product elements, from the initial design and manufacturing site inspections to rigorous attack tests conducted by BRE. This has led to the adoption of SentriGuard® across multiple sectors, including Retail, Banking, Vacant and Void Property Management and Commercial Real Estate, to name a few. Therefore, while selecting an access control system for a sustainability score, the procurement team must complete thorough product accreditation checks as well as examine the certifying body's reputation.
Expert commentary
Open platform video technology software is more than just a product; it's a tool that helps customers achieve their desired business outcomes. Safety, round-the-clock security, and increased operational efficiencies are now the norm due to video technology. Responsible Technology Despite humanity’s impressive technological advances, we also recognise the immense responsibility that comes with technological innovation. It's not enough to focus solely on the positive impact video technology can make, we must also be vigilant in identifying and addressing any potential negative consequences it can have on society and its citizens. This is the role of Responsible Technology. Data privacy We want to use all the good things that technology innovation brings, whether it be video, AI, ML, facial recognition, etc. We want to use all the good things that technology innovation brings, whether it be video, Artificial Intelligence, machine learning, facial recognition, etc. to serve people in societies in a responsible way. That means making sure that we regulate technology in a way that respects human rights and data privacy. Addressing the challenges The challenge is, that rather often technology leaders and policymakers either have conflicting interests or collaborate too late. To be responsible, business leaders must support their societies and policymakers in making regulations in the interest of the common good. At Milestone Systems, we are actively looking at how we develop our software responsibly, how our partners responsibly sell our software, and very importantly, how our customers use our software with a responsible mindset. Ensuring good corporate governance As a long-time partner within the security industry, we’re celebrating our 25th Anniversary this year, we are supporting the regulation of video technology for the good of society. However, it of course needs to strike the fine line between the right legislation and not hindering innovation. UNGP The UNGP is the most authoritative and widely adopted set of principles for responsible business At Milestone Systems, we want to play an active role in this and that is why we have pledged our support to the UN's Guiding Principles on Business and Human Rights (UNGP). The UNGP is the most authoritative and widely adopted set of principles for responsible business. The principles call on governments and companies to identify, prevent, mitigate, and remedy actual and potential human rights abuses. Since its launch in 2011, the UNGPs have received wide support from states, civil society organisations, and the private sector, making them the key global foundation for business and human rights. Protect, respect, and remedy Through this commitment, we are taking steps to ensure good corporate governance and ethical standards in the development of our technology. We're generating mechanisms to prevent misuse and we are building educational practices internally. Based on the UNGP’s three pillars: protect, respect, and remedy, we are developing a set of Responsible Technology Principles and procedures for the development, selling, and use of our products. Need for video technology regulation In addition, we are currently evaluating all the various technology areas in which our video software can be used, such as with third-party integrations that utilise e.g., facial recognition. We are mapping out the advantages and disadvantages for societies. One key area of concern is how local authorities are mapping and storing data about us as individuals. This is the reason why we're inviting more legislation to regulate video technology rather than less. Engaging With policymakers We are meeting ministers and trade organisations as we believe this needs to be a joint effort where all parties are heard We are proactively reaching out to and connecting with policymakers and other relevant stakeholders to discuss our approach to and take on Responsible Technology and encouraging the political landscape to work with us around regulation and legislation. We are meeting ministers and trade organisations as we believe this needs to be a joint effort where all parties are heard and where we can openly weigh the advantages and the challenges of technology, whether it is video, facial recognition, machine learning, Artificial Intelligence, or other technologies. Striking a balance Implementing Responsible Technology is a journey, not a destination. To give it the focus needed, we have created a dedicated team to implement this initiative at Milestone Systems. At the same time, we are reaching out to the political landscape to discuss how we balance regulation without hindering innovation. Video technology used ethically We are a global company with worldwide operations, and we are having dialogues about how video technology is being used and how we can have meaningful talks about what regulation and legislation should look like. However, we don’t necessarily want to limit access to the technology itself. Facial recognition We encourage the policymakers to engage with us in the industry so that together we can strike the fine line Facial recognition is a great example of this. The EU is considering making live facial recognition illegal. That would be a huge inhibitor of proactive terrorism prevention. For example, if a well-known terrorist is walking down the street and is being mapped out against Interpol’s most wanted list, the authorities should be able to react. However, if a person walking down the street but is not mapped out or does not have any priors then the city should not be allowed to store the data of that individual’s whereabouts at that point in time. This potential legislation is concerning to me as a citizen of Europe. Instead, we encourage the policymakers to engage with us in the industry so that together we can strike the fine line for the better good of all of us. Maintaining high ethical standards We have a firm understanding and expectation that ethical standards are a huge driver in the security business. Citizens are not in favour of technology companies abusing data about them and monetising from things that they have not opted in to do. Soon, I think we will see many more companies and governments leaning toward suppliers that do have a responsible mindset and high ethical standards for partnerships. Ethical practices Our journey toward Responsible Technology is an ongoing process, and we must remain steadfast in our commitment to ethical practices and the protection of human rights. We recognise that the rapidly changing technological landscape continually presents new challenges and opportunities. For this reason, we continuously look into how we can improve, for example, our end user licence agreements to avoid potential human rights abuses. An industry responsibility Security companies must prioritise careful planning and preparation, including developing policies and procedures For Responsible Technology to truly become a reality, compliance with international human rights laws and data privacy regulations is critical. Security companies must prioritise careful planning and preparation, including developing policies and procedures that govern the ethical use of video surveillance systems. The secure and ethical community In today's technology environment where deep integrations, machine learning, and artificial intelligence are becoming the norm, Responsible Technology is more relevant than ever. The security industry has a unique opportunity to set an example for other sectors by promoting a secure and ethical development community that prioritises Responsible Technology, trustworthy data collection, and the protection of human rights. We must all rise to this challenge and embrace our role as ethical leaders for the greater good of both people and societies.
Inadequate security measures on your essential infrastructure can have severe consequences. Consequences Consider the rail industry: If a vandal cuts the cables on a vital mechanism that controls train signals, train safety is jeopardised. To avoid train collisions or derailments and thus significant damage to property and potential loss of life, the operating company must shut down the service until the infrastructure is repaired and the network is up and running again. The disruption affects the rail ecosystem itself, but also the people using the trains, the transportation of cargo, and more. The financial cost of repairing the damage, restoring signal functionality, and compensating for delays can be substantial. For another example, consider electrical substations: A fire or targeted attack can damage the system and lead to devastating power outages. Traditional surveillance limitations Traditional video surveillance has its limits when it comes to protecting transformer stations Traditional video surveillance has its limits when it comes to protecting transformer stations. The facilities are often located in rural areas, where straying animals or flying leaves trigger false alarms. 3D Surveillance solutions overcome these challenges by volumetrically securing the area and immediately detecting intruders only raising the alarm in the event of a human intruder and even identifying drone attacks. Protecting critical infrastructure with 3D surveillance Critical infrastructure must be monitored. It remains at risk if operators do not have systems for monitoring entire areas rather than just the periphery if security personnel has limited information in case of an intrusion and if security response protocols are not automated. 3D Surveillance solutions 3D Surveillance is an important tool for protecting critical infrastructure and ensuring the safety of those who rely on it. Integrating LiDAR technology, 3D Surveillance solutions provide a comprehensive view of the area being monitored with real-time monitoring and response, protecting critical infrastructure from damage and providing a more comprehensive security system. Advanced analytics and artificial intelligence Security personnel can identify and verify threats more easily and track the movements of individuals or vehicles, as well as respond to incidents as they happen. 3D Surveillance systems can be equipped with advanced analytics and artificial intelligence (AI) capabilities to detect patterns and anomalies that may indicate a potential threat. This can help to prevent potential attacks or accidents before they occur, as well as enable more accurate responses to incidents. Talent challenge Turning to autonomy by implementing sensor- and software-based solutions requires fewer if any, in-person patrols 3D Surveillance can also help tackle the talent challenge in the industry: Recruiting security professionals involves extensive background checks, and jobs in the industry are notorious for their low salaries, which results in high staff turnover. Turning to autonomy by implementing sensor- and software-based solutions requires fewer if any, in-person patrols and ensure reliable infrastructure protection. Additional security measures In many countries, more stringent legislation now mandates the implementation of additional security measures to safeguard critical infrastructure, particularly at a country's points of entry, such as airports and harbours. Protecting the perimeter is no longer enough. For instance, airport management must ensure that critical areas, including the space around aircraft and near unauthorised access points, are secure. While multi-layered screening of individuals at the perimeter is a valuable security measure, it must be complemented by smooth and efficient surveillance of the entire area, which can only be achieved through advanced technology. Different adoption rates 3D Surveillance technology is only beginning to gain traction in most locations, and adoption rates differ significantly from one region to another. For instance, Scandinavia and Eastern Europe have embraced 3D Surveillance to a greater extent than Western Europe. Regions with lower adoption rates will likely catch up as they seek to reinforce the security of their critical infrastructure, especially given the conflict in Eastern Europe. Vandalism and damage protection 3D Surveillance enhances the security of critical infrastructure, reduces the risk of downtime and loss of revenue 3D Surveillance offers reliable protection against vandalism and damage - major concerns for companies that rely on critical infrastructure. LiDAR-based, software-enhanced 3D Surveillance solutions provide real-time insights and enable automatic processing of the information so that operators can autonomously and quickly detect and respond to potential threats. These solutions are scalable and customisable, allowing companies to adapt their security measures to their unique needs and changing environments. 3D Surveillance enhances the security of critical infrastructure, reduces the risk of downtime and loss of revenue, and ensures compliance with regulatory requirements. Asset management and maintenance planning Beyond its security benefits, 3D Surveillance can help with tasks such as asset management and maintenance planning. It can help identify potential problems or maintenance needs before they become more serious issues by providing a real-time view of the monitored infrastructure. This can help to reduce downtime and keep critical infrastructure running smoothly. Real-time management The same technology can also perform volume monitoring tasks and thus facilitate the management of valuable resources such as bulk material, grain, wood chips, or chemicals. By scanning the stock 24/7 and automatically calculating stock volume updating records in real-time, this technology supports lean production systems and automated processing.
The security industry is going increasingly digital these days, with more small- and medium-sized businesses joining their global brethren by moving their data to the cloud, leveraging the benefits of artificial intelligence, and embracing more open solutions. Innovation is expected to continue at a rapid pace, thanks in part to the residual effects of the pandemic which has driven changes that might have otherwise taken five years or a decade or more to get into customers’ hands on a global scale. Let’s take a look at the trends that will dominate ISC West 2023. Improved analytics Analytics is about expedience, and in the surveillance world, it makes it possible to identify and search for the “who did it?” clip you need. For analytics, along with the cloud, it comes back to the core themes of being able to do more with technology Analytics also provides more actionable intelligence than a simple surveillance camera may provide, from identifying high-traffic areas during select times of the day and alerting staff to pay greater attention to these areas, to business intelligence that can enable a company to staff a store with more employees. For analytics, along with the cloud, it comes back to the core themes of being able to do more with technology and relying less on humans. Leveraging the cloud The cloud story is very related: it provides the ability to perform video-related tasks from anywhere on any device. In addition, the cloud makes it easier to share videos with other stakeholders and collaborate on investigations. By storing video on the cloud, end users reduce their total cost of ownership because they no longer have to invest in onsite storage solutions, while gaining greater storage capabilities and thereby future-proofing their solutions. Deployment patterns Because the cloud requires a less total cost of ownership and can be intuitive, it is driving interest in solutions Another interesting trend that we’ll be hearing more about this year is the overall deployment patterns of video surveillance systems. This is part of the cloud trend, but the broader trend is the amount of effort it takes to deploy, monitor and maintain the video surveillance system. Because the cloud requires less total cost of ownership and cloud access can be intuitive, it is driving interest for solutions that can be hosted in the cloud. Interoperability vs. proprietary Related to the debate of open vs. closed solutions is how much the surveillance market prefers a turnkey solution compared to a more custom best-of-breed and tailored solution. Smaller and mid-market companies will be more interested in the turnkey solutions provided by a single vendor, while enterprise-level companies traditionally gravitate toward investing in customised solutions that are more likely to address their unique security challenges. One other related trend to keep an eye on is the role of the integrator as part of the rise of cloud and Video Surveillance as a Service (VSaaS) offerings.
Security beat
Security professionals are recognising the intelligence value of leveraging publicly and commercially available information. This information can now be accessed more effectively from typically hard-to-reach regions. Also, the technological capabilities have matured in our age of artificial intelligence, machine learning, and data science. Intelligence has historically been based on classified data. However, today’s unclassified data, including open-source intelligence (OSINT), is increasingly being used to provide context and queuing for other types of intelligence. Advanced identity intelligence Babel Street is a technology company providing advanced identity intelligence and risk operations using an AI-enabled data-to-knowledge platform to unlock insights from a flood of data. The company provides advanced data analytics and intelligence for the world’s most trusted government and commercial organisations. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally The sheer volume of data is growing exponentially. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally. Not only are we seeing exponential growth in the volume of data, but there is also disparity in the veracity and the variety of data. This is being compounded by the ‘app economy’ in which data is created in a new format for every app added around the globe. Human language technology “The problem is that the data ‘junk’ and the ‘crown jewels’ are in the same bucket, and government and commercial entities need better and faster ways to extract intelligence from these torrents of data,” says Farid Moussa, VP, Strategy & Public Sector, Babel Street. Prior to joining Babel Street, Farid retired from the National Security Agency (NSA). He has guided video, image, speech, and text analytics (VISTA) and developed an appreciation for human language technology. An elusive source of data is the Dark Web, where every user, by design, is attempting to obfuscate their identity, and bad actors are hiding much better. “This presents a cat and mouse game – the cat must be smarter than the mouse, but the mouse is continually getting smarter,” says Moussa. Intelligence tools for data analysis SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence There are several intelligence tools for analysing data. One of them is signals intelligence (SIGINT), which refers to electronic transmissions collected by ships, planes, ground sites, or satellites. Another is human intelligence (HUMINT), which is collected in a human-to-human fashion. Open-source intelligence (OSINT) is obtained by searching on topics or entities of interest that are publicly available on the Internet at large. Today, these various categories are often done in ‘silos of excellence.’ However, the best practice is using all forms together in a holistic fashion. SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence, while OSINT, which is growing in importance, is most cost-effective. All are vital forms of intelligence; OSINT is complementary and crucial to holistic intelligence practices. Holistic intelligence practices When it comes to physical security of people and places, OSINT has become a critical source of actionable information. Security directors leverage Publicly Available Information (PAI) to safeguard against threats to individuals, property, travel routes, and event sites. By monitoring PAI, security teams can detect and respond to potential dangers, including during and after events where thorough preparation is vital. Online information can contain warning signs of impending threats. It informs security professionals in uncovering digital traces, confirming intentions, and addressing risks across language barriers, ensuring proactive risk management for the protection of people and property. Role of Natural Language Processing (NLP) The Internet and social media were mostly English language by default, but that has changed exponentially Natural Language Processing (NLP) is a crucial capability that has evolved to recognise the richness and variety of words and names in multiple languages and scripts, and their use across cultures. Using machine learning and linguistics algorithms, the technology simultaneously considers numerous types of name variations. At one time, the Internet and social media were mostly English language by default, but that has changed exponentially. Babel Street’s world-class entity matching technology measures over 100 features to calculate the similarity of entities across multiple languages. Despite advances in data management and the cloud, there are still multiple challenges and complexities with integration of these data elements. Challenges include spelling variances/phonetics, language translation issues, criminal evasion, human error upon input, typos, etc. Accessing data from a scattered landscape While there have been advancements in cloud technologies, agencies utilising open-source data are typically working within a highly scattered data landscape and must use a wide array of tools to get at the relevant pieces. This fragmentation makes it difficult to run analytics and apply AI and machine learning at scale in order to derive actionable insights. Unstructured and relationship data are visualised through advanced link analysis As with many disciplines, artificial intelligence (AI) is changing the game when it comes to intelligence. NLP and AI algorithms are employed to enhance datasets for greater quality, usability, and completeness. Unstructured and relationship data are visualised through advanced link analysis, geographic heat maps, influential entity carousels, topic clouds, and patterns by time and day. Geographic heat maps The advanced algorithms accurately score and prioritise critical entities within the relationship network while providing the citations from which an AI/ML-based decision was made. “With the democratisation of AI, the world is becoming flat,” says Moussa. “Just like the most prosperous countries, even the poorest countries have the most advanced capabilities to do damage. Third-world economies often present a scenario where the financial gain of nefarious schemes and low-to-no regulation combine to incentivise bad actors.” The Challenges of Name Matching Identity has been an ongoing challenge for intelligence analysis due to the vast complexity of linguistics, spelling and cultural variances, human error, as well as human evasion. Technology and data science approaches are maturing, however machine translation can still struggle with meaning. The best-of-breed natural language processing capabilities run against the data while it still is in its native language. This minimises the occurrence of analytic errors caused by inaccurate machine translations. This minimises the occurrence of analytic errors caused by inaccurate machine translations It’s tempting to think that name matching is like doing a keyword search. The complexity of language makes it more challenging. New names are constantly created, with multiple spellings and no set of rules to encompass how names are formed. They are variable across languages, scripts, cultures, and ethnicities. Culturally specific nicknames and aliases add to the complexity. Replacing human involvement The investigation of the Boston Marathon Bombing in 2013 spotlighted an example of the significance of intelligence analysis. Even though the FBI had issued a detain alert for Tamerlan Tsarnaev back in 2011, Tsarnaev managed to travel to Russia in January 2012; and in July 2012, he returned to Boston. He was not detained on either occasion because there were too many names on the lists, and Tsarnaev’s last name had been spelled differently from the way it was on travel documents, thus enabling him to get through security. With the Internet, social media, and the dark web, there’s been an exponential increase in public communications in various languages, adding significantly to the amount of analysis required to keep societies safe. Name matching, using AI, analyses multiple contextual data points across languages to arrive at matches. Name matching, using AI, analyzes multiple contextual data points across languages to arrive at matches A common misconception is that this technology will replace human intelligence. “It’s more accurate to recognise its role as a force-multiplier, allowing humans to focus on the on the harder problems and/or vetting the results of AI,” says Moussa. “The technology can efficiently analyse massive volumes of data and distill it into actionable information in a timely manner. It augments human capabilities, enabling analysis at speed and scale beyond human capacity, without replacing human involvement.” Commercial Technology to the rescue “When it comes to threat and identity intelligence, we face a risk-confidence gap, underscored by the challenge of integrating traditional tactics with the modern digital landscape,” adds Moussa. “We cannot ‘hire’ our way out of this problem. Instead, it is imperative that we adopt technology to scale our efforts and free humans to solve the harder problems that machines cannot solve yet.” The public sector loves to build things, but there are time-to-value and return-on-investment considerations to the ‘build or buy’ decision. When commercial technology can be leveraged by government, it frees resources up to work on problems that the commercial world hasn’t yet figured out, says Moussa. “The public and private sectors need to come together – one team, one nation, working together with mutual trust and collaboration,” he says.
Operational technology (OT) uses hardware and software to monitor and control physical processes, devices, and infrastructure. Historically, OT systems were not connected to the Internet and were therefore not vulnerable to cyber-threats. Internet of Things (IoT) However, today’s OT systems are increasingly part of a company’s networks as technologies converge and the Internet of Things (IoT) gains prominence. No longer can OT systems be counted on to be “air-gapped,” that is, not connected to other systems. When OT systems are vulnerable, companies face a “cyber-physical risk.” A bad actor could create a catastrophic risk in the physical security world by compromising OT systems. To understand more about OT and the related cybersecurity concerns, we spoke with Lisa Hammill, VP of Commercial Markets for Shift5, a company that applies cybersecurity best practices to OT systems and networks, thus dramatically reducing their cyber risk. Q: What is operational technology (OT)? How are the cybersecurity concerns for OT different than those for information technology (IT) systems? Hammill: Operational technology (OT) refers to the computer systems that underpin critical infrastructure, enabling it to run continuously and reliably. For example, planes and trains rely on OT to execute basic flying or driving commands. OT cybersecurity solutions for planes, trains, or weapon systems must be capable of the basics of IT cyber-hygiene Most OT is built on legacy technology manufactured before cybersecurity became a priority and relies on serial bus networks like MIL-STD 1553, CAN 2.0, or RS-232, instead of the standard TCP/IP communications protocols that IT security solutions can monitor and defend. Any effective OT cybersecurity solution for planes, trains, or weapon systems must be capable of the basics of IT cyber-hygiene, including ensuring signed software and firmware updates, full data capture, and continuous monitoring and detection aboard planes, trains, and weapon systems. This all makes cybersecurity for onboard OT difficult, but not impossible. Q: What is a “cyber-physical risk” and why is the term important? Hammill: Cyber-physical systems integrate digital components into physical objects and infrastructure; we focus on critical infrastructure like transportation as well as weapon systems. Cyber-physical risks manifest when actors intrude on these delicate processes to manipulate real-world outcomes, whether that’s grounding plane flights, or disabling train brakes. The risks of attacks facing OT within cyber-physical systems are highly consequential, can cause disruptions to civil society, economic disruption, and potential harm to citizens, as well as shift the balance of power in military conflict and geo-political matters. Q: Please describe the breadth of the risks when it comes to OT cybersecurity. Hammill: Cyber-physical attacks can jeopardise business and mission-critical operations, and risks are highly consequential when it comes to transportation systems, creating safety risks for operators and passengers, economic impact, and millions in downtime losses, remediation, and ransom payments. Transportation is a particularly vulnerable sector of critical infrastructure. An attacker could leverage a tested playbook to disrupt operations with minimal effort As we’ve seen from recent attacks demonstrating the attackers’ focus is trained on this space. The motivation of an attacker will vary, but for example, let’s say a bad actor wanted to target an aircraft to disrupt service and ground a flight. There have been examples of basic cyber-attacks targeting noncritical aircraft systems; however, many of these systems remain vulnerable. An attacker could leverage a tested playbook to disrupt operations with minimal effort. An attacker could target a system considered least critical to passenger safety systems categorised as a Design Assurance Level E (DAL E) like an in-flight entertainment system. This type of system has been hacked before and could be used as a vector for a ransomware attack. If an attacker takes control of video screens on seatbacks mid-flight, they would certainly damage passenger trust. They would also likely try to move up the design assurance level chain to gain further access. For example, when a plane pulls into a gate, communication between the aircraft and airline operations happens automatically. An attacker could exploit this connection to move from one system to another. If an attacker gets into those communications channels, they could alter data or hold it hostage, while the airline halted operations to resolve the issue. Q: What industries/markets are most vulnerable to OT cybersecurity threats and why? Hammill: Operational technology lacks the historical focus on cybersecurity that IT has, and basic best practices are nascent for OT industry-wide. Cyber-attacks targeting Colonial Pipeline and Florida's water systems (in 2021) have spurred those industries into action to prioritise cyber hygiene. The aviation and rail industries are watching and taking proactive steps to prevent such cyber-attacks. As weapons systems and vehicles on roads, rail lines, and in the air add on new technology, they are at risk of cyber-attacks Shift5 defends planes, trains, and weapon systems because these vehicles leverage a vast swath of distinct serial bus networks and protocols unseen in other critical infrastructure technologies. We have experts creating a tool that can monitor and detect traffic aboard these bespoke networks. And as weapons systems and vehicles on roads, rail lines, and in the air add on new technology, like autonomation, they are increasingly at risk of cyber-attacks. Q: What are the various sources of OT cybersecurity risks (e.g., other governments, individual hackers, criminal organisations, etc.)? Which are the most urgent and/or pervasive? Hammill: Because of their ability to cause deeply consequential impacts on the business, economy, and human safety, OT cybersecurity risks must be considered scrupulously. Attackers targeting OT could have a range of motivations, from financial gain or market advantage through the theft of intellectual property, to insider threats and geopolitical advantage in a contested environment. It’s no secret that most malicious adversaries choose the path of least resistance when developing their attack strategy. When OT is aboard planes, trains, and tanks, we’re only in the early innings of creating obstacles for those actors to overcome. One threat we’re watching closely is the evolution of ransomware targeting OT. Digital extortion could cause operational disruption and impact consumer trust. Q: What is the Shift5 approach to cybersecurity? Hammill: Shift5 extends 40 years of expertise in adversarial tactics, techniques, and procedures from IT endpoint security into the OT world. For the first time in history, operators can apply cybersecurity best practices to OT systems and networks, dramatically reducing their cyber risk. Shift5 allows rail, aerospace, and defense to generate data-informed insights and make accurate decisions Shift5 brings complete observability and threat detection to OT systems as cyber-physical attacks become an increasingly attractive strategy for digital attackers. By providing visibility into the data that powers their most expensive, longest-lived, and most consequential fleet assets, Shift5 allows rail, aerospace, and defense companies to generate data-informed insights and make timely, accurate decisions once considered impossible. Q: Has OT cybersecurity trailed IT cybersecurity in terms of awareness? If so, why is it true, and how can organisations become more aware (and more prepared) of OT cybersecurity risks? Hammill: OT cybersecurity is nascent compared to IT security, but the industry is catching up. While most organisations understand the importance of visibility and observability in IT systems to enable their defense, very few have this same level of oversight for their most expensive, consequential, and longest-lived OT-powered assets. Simple best practices geared towards defending OT can make an adversary’s job more difficult. Start with taking inventory of all OT assets, then move to gain situational awareness so you can develop your baseline for “normal” operations (and can identify any abnormal events), and finally take steps to shore up gaps in cybersecurity. Q: Tell me more about Shift5. Hammill: Shift5 was founded by Josh Lospinoso and Michael Weigand, two of 40 people hand-selected to stand up to U.S. Cyber Command, the nation’s most elite unit of cyber-defenders. There, Mike and Josh became familiar with challenges in defending weapons systems, and the idea for Shift5 was born. Shift5 provides OT cybersecurity and operational intelligence for fleet operators and military platforms Military weapon systems are built on the same OT infrastructure found within planes and trains, and today Shift5 provides OT cybersecurity and operational intelligence for fleet operators and military platforms. Our customers include the DoD, US Army, Air Force, and Navy, and several of the largest U.S. passenger rail and household-name aviation companies. Many of these industries are beginning to seek out partnerships with Shift5; for example, AEI HorizonX, the venture capital investment platform formed between AE Industrial and The Boeing Company, today works with Shift5. Q: What is the biggest misconception when it comes to OT cybersecurity? Hammill: A common misconception is that OT aboard planes, trains, or weapon systems isn’t at risk. Many security experts have implemented air gapping as a cybersecurity strategy to keep cybersecurity threats away from sensitive systems. However, due to the convergence of IT and OT, there are more inroads to OT than ever, and air gapping isn’t as effective. Transportation assets like planes and trains are flying and rolling data centers that produce valuable and useful data, and they need to be protected just as we protect client data or IP. It’s a hard problem to solve, but the stakes are high and attackers are increasingly aiming their attention at this surface area. Modern cybersecurity principles must be extended to the onboard OT networks of aerospace, rail, and defense Amid the war in Ukraine, we saw attackers target the Belarusian Rail System to thwart Russian adversaries, and Russia digitally attacked Viasat to disable this critical piece of infrastructure ahead of a kinetic strike. Digital attacks facing aerospace, rail, and defense targets are on the rise, and modern cybersecurity principles must be extended to their onboard OT networks. Q: How can organisations start to address these challenges? Hammill: Cybersecurity done well is a lot of preventative work, and when we hear no news, that’s often good news. The U.S. government has increased the levels of dialogue around cybersecurity risks facing US critical infrastructure operators and has led by example in sharing information to help critical infrastructure organisations bolster their defenses. I recommend that transportation organisations engage proactively with local FBI field offices or CISA Regional Offices to establish relationships in advance of any cyber-incidents and visit the websites of CISA and the FBI where they will find technical information and other useful resources. They should also take advantage of other resources like TSA, AAR, ICA, and relevant ISACs that have working groups focused on these challenges. I encourage every transportation operator to understand the risks for these large transportation assets through vulnerability assessments, pen testing, and exercises just as they do with their IT environments.
Foot traffic remained at respectable levels during Day Two of IFSEC International 2016 at ExCeL London. Attendees are bombarded with sensory overload as manufacturers look for new ways to stand out from the crowd. The result sometimes seems more like a lot of noise. Everyone is looking for ways to stand out from the noise of competing product features and claims at the show. One exhibitor, Tyco Security Products, is taking a different approach at this year's show, abandoning traditional emphasis on individual products and opting instead to focus on customer solutions targeted to end users. Tyco Security Products’ end-user targeted solutions Peter Ainsworth, Tyco Security Products' Director of Marketing for Europe, Middle East and Africa (EMEA), says everything at the Tyco stand -- from the layout to collateral material -- is built around the need to answer "so-what" questions from customers. "They want to know how we can save them money and make their lives better," says Ainsworth. A single brochure provides the "ultimate takeaway" for Tyco's visitors at this year's show; the "augmented reality" brochure has images that can be scanned with a smartphone to provide additional information, data sheets, etc. Tyco Security Products is also giving away a "magic cube" that can be configured as a cube showing Tyco's product lines, and then reconfigured into a multi-sided "star" shape that depicts various vertical market applications. There are "trigger points" on the cube that can be scanned using a smartphone app to provide additional information for potential customers, including videos. The design of both the brochure and the cube emphasise the message that Tyco Security Products understands customers' businesses. "This is where we see our product fitting within your establishment," says Ainsworth. "We take them through the journey at our stand." The brochure depicts the same journey and "helps the end customer understand what we can do for them," he adds. "It's not about intrusion, access or video, but about the total solution." "At a trade show like IFSEC, we are one of hundreds of stands," says Ainsworth. "We want something that people will remember us for. It's different and innovative, and reflects who we are as an organisation." TDSi Gardis access control "At a trade show like IFSEC, weare one of hundreds of stands.We want something that peoplewill remember us for. It's differentand innovative. It's not aboutintrusion, access or video, butabout the total solution" In addition to getting customers' attention, some manufacturers have other agendas. Gathering feedback for product development is another way exhibitors can get the most out of IFSEC. For example, TDSi is previewing its new Gardis access control platform at IFSEC, including all-new, intuitive software that is easier to navigate, and a new hardware controller, both conformant to ONVIF Profiles A and C. Two years in development, the system will be easier to integrate with third party systems, using a REST-based application programming protocol (API). The new TDSi products are six months or so away from launch, and TDSi is using the IFSEC show to get feedback about changes customers might like to see as the software is fine-tuned; then it will undergo extensive field trials in the next several months. Getting feedback from potential customers is an invaluable tool for TDSi's development engineers, and IFSEC is an ideal venue to provide the feedback. "We can do an awful lot in three days that would take us weeks driving around in a car or flying around," says John Davies, TDSi's Managing Director. "It's a cost-effective way to achieve the same thing. Also, every year at the show we dig up a couple of projects that pay for the stand. This year we met with a customer that has 900 sites. We're in the early stages of talking with them about the new platform." IFSEC 2016 provides a first look at the new TDSi technology, which Davies says the company will introduce to the U.S. market by 2017, likely as a hardware component of an OEM partner's access control system. The open, ONVIF-conformant strategy makes it possible. TDSi has not been active in the U.S. market for 10 years or more; developing the open-architecture product is a favourable alternative to entering the large market with an older, "me too" product, says Davies. HID Global Seos and Mobile Access solution Also at the show, HID Global introduced new high-definition direct-to-card printers, and showed its HID Mobile Access solution, powered by Seos. The company also emphasised integration of its Seos mobile credentialing system with time and attendance, fleet management and hand-held devices. There is a related managed services offering. A lot of buzz has surrounded Seos since it came on the market in September 2014, and currently there are several hundred mobile access systems installed worldwide, including hundreds of thousands of mobile identities in use in Western Europe and the United States. There have been several notable installations in the United States, especially among colleges and universities. HID Global is currently in the process of building out a "global wallet" in cooperation with chip manufacturer NXP, which is preloading its computer chips with Seos, usable for many applications beyond physical access control. At IFSEC, HID Global announced it has been selected by Vodafone Italy to modernise the company's physical access control system by providing a group of employees a mobile access solution across multiple sites and applications at the Vodafone Village in Milan.
Case studies
Frontline Communications, a division of Pierce Manufacturing, Inc., an Oshkosh Corporation business, announced the delivery of a C-40X-2 mobile command vehicle to the Loudoun County Sheriff’s Office in Virginia. The vehicle was featured at the National Sheriffs’ Association (NSA) Conference in Oklahoma, showcasing its state-of-the-art options and upgrades, making it an essential asset for the Sheriff's Office. New mobile command vehicle Sold through Frontline Communications dealer Atlantic Emergency Solutions, the new mobile command vehicle is built on a Peterbilt 548 chassis and measures 38’ 8” in length and 12’ 6” in height. It includes two slide-outs and a 20kW generator, providing ample power for its extensive features. The vehicle is equipped with two entrances, a spacious rear interview room/workstation area, and a forward conference room with seating for eight, ensuring a versatile and functional environment for various operations. Step Up Strategy Major Craig Schleiden of the Loudon County Sheriff’s Office stated, “This vehicle represents a significant advancement in our ‘Step Up Strategy’ to enhance safety, service, technology, efficiency, and professionalism." "The integration of this mobile command unit to our Frontline Communications/Pierce fleet will enable us to better serve our community and improve our collaborative efforts with federal, state, and local law enforcement agencies.” Key features of the new mobile command vehicle Side and rear entrances. 360-degree backup camera system. Four 15k BTU rooftop air conditioners. 100A shore power upgrade. 20’ electric awning. Will-Burt 42’ mast with matching shroud. Exterior monitor compartment with 43" anti-glare monitor. The vehicle's technology includes: Axis perimeter camera system with 16-channel recorder. AvL 1.2m Ku-band VSAT and Winegard Trav'ler DirecTV. Wireless PA system and Firecom radio intercom system. Extron 16x16 video switcher with Frontline Communications touchpad controller. Eight 24" monitors, four 22" monitors, and one 65" Ultra HD monitor. Dual thermal/HD Color Pan Tilt Zoom mast camera. Two PCs, eight docking stations, and a printer. Trendnet 52-port network switch and 5G network with Cradlepoint cellular router. Innovative features “This project highlights our commitment to providing law enforcement with one of the most advanced mobile command units available,” said Steve Williamson, vice president of sales with Frontline Communications. “Having the vehicle in our booth at the NSA Conference allowed us to directly engage with a broad span of representatives from many organisations and discuss its innovative features. We’re proud to support the Loudoun County Sheriff’s Office as they enhance their capabilities to ensure the safety and well-being of their community.”
Motorola Solutions announced that Lancashire Police will deploy the M500 in-car video solution across its entire fleet of vehicles. The new video solution observes the vehicle’s environment from multiple viewpoints to provide officers with real-time awareness of their surroundings, whilst capturing video evidence that can provide accurate incident documentation to aid investigations. Motorola Solutions M500 "Police officers face unpredictable challenges and fast-moving events every day,” said Chris Hardy, chief superintendent for Lancashire Police. “The ability to respond quickly is paramount. The Motorola Solutions M500 can live-stream video back to the control room, enabling our team to build a clear picture of unfolding events by giving us eyes on the scene. It is a highly configurable, easy-to-use system that can automate processes such as triggering video recording when the blue lights are activated, helping officers to focus on the job at hand.” Technological and organisational capabilities Lancashire Police has made some recent investments in new technological and organisational capabilities Lancashire Police has made a number of recent investments in new technological and organisational capabilities. Since its establishment in June 2023, Lancashire Police’s Roads Crime Team and Roads Policing Unit, with support from wider police departments in the county, has been integral to efforts to locate and recover vehicles and assist with road traffic collisions. The deployment of the M500 in-car video solution will provide front-line officers with an additional tool to help fulfil its priority of making the roads safer for the community. Motorola Solutions VideoManager The M500’s interface is designed to be intuitive for officers to operate in demanding situations. Video captured is automatically uploaded to the Motorola Solutions VideoManager for secure, auditable storage that is intelligently organised. Recorded footage is tracked and audited to protect the chain of custody so that the police, public and judicial systems can be confident in the integrity of video evidence. VideoManager’s consolidated incident overview also helps to ensure that incident information, including footage recorded by the M500, as well as Lancashire Police’s body cameras, can be easily viewed from one location. Video security solutions “Video security solutions are a vital tool for police officers as they work to help keep their communities safe,” said Fergus Mayne, U.K. and Ireland country manager, Motorola Solutions. “As part of the Motorola Solutions safety and security ecosystem, the M500 connects with Lancashire Police’s existing mission-critical technologies, providing productivity and agility to the forces operational response to help protect people, property and places." Motorola Solutions’ Pronto application Motorola Solutions has been trusted by Lancashire Police throughout its digital transformation, supporting the force’s evidence capture, data storage and workflow efficiency. The M500 will complement the force’s existing technology infrastructure which includes Motorola Solutions’ Pronto Digital Policing application, TETRA radios and VB400 body cameras.
Up-to-date and accurate maps of the waterways are a prerequisite for safe and efficient shipping in Germany. Authorities such as the Federal Maritime and Hydrographic Agency, but also private harbour operators, are obliged to provide these in an up-to-date form at all times. The main reason for this is to avoid accidents caused by an incorrect or outdated card. This includes the classification of federal waterways, their kilometres, existing locks, lifting and barrages, other surrounding waters, places and borders. Currently, mapping is carried out by conventional ships with trained personnel, which is time-consuming and expensive. This can result in long intervals between measurements at a particular location. 3D map of the surroundings Bank areas and surface forms are monitored by an optical plan with two integrated cameras (Semi-)automated monitoring of waterways by autonomous platforms with obstacle avoidance and traffic detection could optimise this process and provide maps in less time. To this end, the Fraunhofer Institute of Optronics, System Technologies and Image Exploitation IOSB has developed an autonomous surface vehicle capable of autonomously surveying bodies of water as part of a three-year in-house research project. For this purpose, the river bed is recorded using sonar. Furthermore, the bank areas and surface structures are monitored by an optical system with two integrated industrial cameras from IDS Imaging Development Systems GmbH. The information obtained in this way is then merged and transferred to a 3D map of the surroundings. Application The precise surveying of water bodies is a demanding task. TAPS, the Fraunhofer IOSB's semi-automatic direction-finding system for rivers and lakes is able to perform this task both under and above water. The vehicle, which measures approximately 2 x 1.5 x 1 metres, travels along the relevant waterway and automatically avoids obstacles, whether stationary or moving. At a speed of two knots - which corresponds to around 3.7 kilometres per hour - such a mission can last up to 20 hours. For visual mapping of the shore areas, TAPS has two cameras attached to a mast, each pointing to starboard or port and whose fields of view do not overlap. Due to their high resolution, they allow a visual inspection of relevant infrastructure, such as quay walls, as well as 3D modelling of the shore area based on the recorded image data. Orientation of the TAPS platform GNSS and IMU data serve as the basis for picking the position and exposure of the TAPS platform "We use an automated system for intelligent image capture. As soon as one or both cameras are focussed on a predefined area of interest, image recording is started. The vehicle's own movement is also used to store only image data that is recorded from different angles and therefore offers added value in terms of content," explains Boitumelo Ruf, expert in photogrammetry in the Autonomous Robot Systems research group at Fraunhofer IOSB. GNSS (Global Navigation Satellite Systems, such as GPS) and IMU (Inertial Measurement Unit for position determination) data serve as the basis for determining the position and orientation of the TAPS platform. "When the images are captured, they are enriched with the current GNSS position data. The latter are required later for the assignment of precise coordinates," Ruf continues. COLMAP photogrammetric toolbox After data acquisition, the recorded images are transmitted together with the GNSS data to a ground control station, where a photogrammetric reconstruction is carried out. Boitumelo Ruf describes the procedure in more detail: "Among other things, we use the COLMAP photogrammetric toolbox. It uses outstanding image features to first compare the input images, calculate their relative positions and create a true-to-life 3D model of the environment." "We then use the tool to match the images pixel by pixel, i.e. we search for corresponding pixels and merge them exactly. The result is a dense 3D point cloud that is georeferenced using the GNSS positions, i.e. provided with the corresponding current coordinates." The 3D model can then be used for other tasks, such as visual inspections or bank monitoring. Robust industrial cameras defy wind and weather On the camera side, the Fraunhofer Institute relies on two uEye FA industrial cameras from IDS. The robust and resilient models with PoE are ideal for demanding environments. Camera housings, lens tubes and the screwable connectors meet the requirements of IP code IP65/67 and are thus optimally protected against dirt, dust and splash water. The robust and resilient models with PoE are ideal for demanding environments The model used has the large-format 1.1" CMOS sensor IMX304 from Sony and delivers very clear, noise-free images with a resolution of 4096 x 3000 pixels. Thanks to its remarkable dynamic range and very high sensitivity, the global shutter sensor of the second pixel generation of the Pregius series is particularly suitable for metrology applications, among others. It was precisely these characteristics that were decisive for the Fraunhofer IOSB's choice of camera. In addition to robustness and weather protection, important requirements for the cameras included a compact form factor and high image resolution to enable detailed visual inspections. The sensor should also offer a high dynamic range in order to capture images with a high level of detail in both sunny and shady areas. Integration via the standard GigE Vision interface enables the development and use of one driver for several systems with different cameras. Outlook The shortage of skilled labour is also a major issue in the surveying of waterways. Automated mapping of the waterways could not only reduce costs but also the time and, above all, the labour required. The aim of the TAPS project was to develop a prototype for this task and to demonstrate its potential in relevant scenarios. As a research organisation, Fraunhofer typically develops technologies up to a level at which the functionality and suitability of the system have been proven. The next step is now cooperation with industrial partners. Dr. Janko Petereit, head of the Autonomous Robot Systems research group at Fraunhofer IOSB, explains: "We are actively looking for partners to take this final step towards commercialisation together. In view of the positive results of our initial tests and the increasing demand for accurate, up-to-date waterway maps, we expect strong demand for our technology in the coming years. The knowledge gained can be used in a variety of ways. Autonomous watercraft can be used to transport people and goods by sea or inland waterways. The excavation of waterways and the autonomous surveying of fairways are also conceivable. “ The project demonstrates the high potential of the interaction between robot systems and digital image processing. The cards could be reshuffled in the future, particularly with regard to visual environment detection and scene interpretation.
Revader Security was selected by safety & security specialists North to provide over 75 re-deployable CCTV cameras to the London Borough of Hammersmith and Fulham as part of their contract to upgrade the council’s public space CCTV network. Revader’s re-deployable CCTV cameras are all-in-one professional surveillance solutions that combine an HD camera, recording, onboard storage and wireless transmission in a single compact unit. Fleet of re-deployable cameras They can operate from a wide range of power sources, including mains, battery and solar The cameras can be installed in virtually any location and can be easily moved to target crime hotspots and other areas of interest, enabling police and local authorities to deter offenders, respond to developing incidents and secure prosecutions. They can operate from a wide range of power sources, including mains, battery and solar. The fleet of re-deployable cameras is used by the council’s CCTV operators to tackle street crime, anti-social behaviour and fly-tipping, protect property, prevent trespass, improve public safety and monitor traffic flow. Delivered over a three-year period, this purchase was part of the London Borough of Hammersmith and Fulham’s £5.4 million investment into its CCTV network. The borough has a surveillance network of over 1,900 cameras in total, representing the highest-density network of CCTV cameras in the UK. Longstanding partnership with North Stuart Caldecourt, Managing Director at Revader Security, said: “We are delighted that the investment being made by Hammersmith & Fulham Council into its surveillance network is delivering results, with more police arrests enabled by high-quality CCTV footage and more prosecutions supported by video evidence. We are proud to continue our longstanding partnership with North to deliver cutting-edge solutions that make our communities safer and more secure.” Revader Security continues to work alongside the partners to support Hammersmith & Fulham Council and a wide range of other local authorities, police forces and industrial users across the UK.
HID, the worldwide pioneer in trusted identity solutions, announces that Royal Jersey Laundry has introduced a new tracking feature of HID’s linen management platform at each of its 5-star hotel customer sites to guarantee that drivers drop off and collect precise linen stock and that costly errors are avoided. Linen tracking This new feature replaces a paper-based system used by drivers for the management of cages filled with clean/soiled linen delivered/collected at customer sites. It provides detailed end-to-end tracking of linen cages across multiple customer locations throughout the whole cycle of washing, packing, delivery, and collection, a complex process given that 550,000 pieces are laundered each week for numerous clients. Royal Jersey Laundry Royal Jersey Laundry works with most five-star hotels in London including The Dorchester, The Carlton Tower Jumerah Founded in 1915, Royal Jersey Laundry is one of the few cleaners servicing the luxury hotel sector. Based in a 25,000 square-foot purpose-built facility in Dagenham, rebuilt in 2021 for £15 million after a fire, it works with most five-star hotels in London including The Dorchester, The Carlton Tower Jumerah, The Peninsula London, and The Ritz. Need for constant communication Supporting the five-star segment is demanding given the constant communication required between the hotel and laundry, exacting standards, and the quantity and range of items to be laundered. This includes duvets, sheets, towels, and bath robes along with smaller items such as foot mats, drink coasters, shaving towels, and dry cleaning for guests themselves. Royal Jersey Laundry operates 24/7, employs 150 staff members, and washes 40 tons of linen per day. Maintaining laundering schedule Five-star hotels prefer to use linen they own with five sets kept of everything, allowing them to maintain a schedule In contrast with budget and mid-level hotels, five-star hotels prefer to use linen they own with five sets kept of everything, allowing them to maintain a rigorous laundering schedule and ensure guests always receive fresh, cleaned linens. “An average 300-bed hotel will have around 30,000 items of linen which will cost around £250,000,” says James Lincoln, Royal Jersey Laundry’s managing director. “The volume of linen is so high and it’s always moving such that accurate inventory control was a major challenge verging on the impossible.” HID cloud-based RFID linen management system Before the HID cloud-based RFID linen management system, everything was done manually. Laundry staff would check items off ironing/folding machines, a wholly error-prone process, and log the quantities on pieces of paper. The operational overhead for the laundry was exacerbated as the various linen items from the different hotels had to be kept separate, too. “Linen is everywhere: on beds, in cupboards, in transit, and at the laundry, yet no one had full insight into stock levels and, when things went missing which often happened, typically we’d get blamed,” says Lincoln. Real-time linen inventory management LinTRAK tags are sewn into linen items by laundry staff or linen manufacturers during the production process To address these problems, Royal Jersey Laundry installed a real-time linen inventory management system from HID combining LinTRAK® RFID tags, a full set of RFID equipment including table-top and conveyor-belt scanners, one RFID portal and one cabin scanning unit, and cloud-based Acuity software. The discrete LinTRAK tags are sewn into linen items by laundry staff or linen manufacturers during the production process. Some hotels also use LinTRAK tags to manage staff uniforms and restaurant linens such as napkins and tablecloths. HID LinTRAK textile tags Around 40% of Royal Jersey Laundry hotel customers have transitioned to the HID linen management solution and connect via Acuity’s web portal. Once cleaned, the linen is packed into cages, and scanned in seconds through HID’s RFID cabin station. Items are automatically counted, with delivery notes generated including billing information. HID’s Acuity software integrates with the laundry’s Sage accounting software to generate invoices. Benefits of textile tags The implementation of HID LinTRAK textile tags, RFID stations, and the Acuity software platform has radically changed how Royal Jersey Laundry operates, delivering a range of benefits: Fast Return on Investment: Since the installation of the HID equipment in 2019, the system has already paid for itself given the efficiency and productivity gains. Better use of people resources: Laundry and housekeeping staff no longer waste time on dull and resource-intensive activities like manually counting linen. They have been redeployed to more productive work, generating 10-20% savings in labor costs. Better visibility of stock levels: As hotels know exactly the location and quantity of linen, they are better able to cater to peak demand, reducing linen expenditures by up to 30%. Improved responsiveness and customer satisfaction: Access to in-depth data generated by the Acuity platform means the laundry can quickly answer customer queries. “We give hotels complete transparency about where their linen is in the cleaning and delivery cycle. There are just no grey areas anymore,” says Lincoln. Increased security of expensive linen assets: While theft of linen at five-star hotels is rare, it does happen. RFID tagging enables better monitoring of expensive bedding and towel investments. Enhanced reliability and productivity: Operations are more efficient as RFID-enabled items can never be lost or misplaced. Furthermore, digital scanning results in faster processing of items. “We’re effectively two businesses: the laundry itself and a logistics operation. We run a mixed fleet of lorries and electric vans which nip in and out of London three times a day picking up and delivering garments for hotel customers using us for guest work,” adds Lincoln.
Morse Watchmans, the industry pioneer in key control and asset management systems, reports a rising number of international cities and municipalities installing the company’s flagship key control system, KeyWatcher® Touch, to secure the buildings, equipment, and vehicles utilised by various municipal departments. “From public works to waste departments, courthouses, and beyond, the adoption of our KeyWatcher Touch solution continues to resonate positively across so many diverse cities,” said Tim Purpura, VP of Global Sales and Marketing, Morse Watchmans. “We take pride in knowing that our systems are being used to facilitate secure and efficient operations for some of the public’s most critical services.” New KeyWatcher Touch system By implementing effective municipal key control measures, cities can mitigate the risks associated with unauthorised key access while maintaining the operational integrity of public works. Cities and metropolises can set a foundation of trust and confidence within their societies This proactive approach not only safeguards against potential security breaches but also fosters accountability and responsible use of resources among city employees. In this way, cities and municipalities can establish a foundation of trust and confidence within their communities. In one instance, the Walworth County Public Works Department in Wisconsin implemented a new KeyWatcher Touch system after the original key box system failed to adequately support the county’s hundreds of keys for government buildings and county fleet vehicles. KeyWatcher Touch solution After seeing the success of the KeyWatcher Touch solution at the Department of Public Works, other departments within Walworth County have also begun installing their own KeyWatcher Systems. “These boxes are starting to catch on, and departments are really thinking about how they will use them for vehicles and building keys,” said John Miller, Senior Project Manager, Walworth County Public Works. The operational efficiencies of the KeyWatcher Touch solution are also appreciated Across the globe, the operational efficiencies of the KeyWatcher Touch solution are also appreciated. Blacktown City, a suburban community located approximately 22 miles west of Sydney, Australia, implemented a KeyWatcher Touch system at their Main Works Depot to help maintain usage accountability and eliminate the problem of missing or overdue vehicles, machinery, and building keys. KeyWatcher Touch automated control “We manage keys for at least 500 vehicles and machines here at the Depot and each of them has at least two to three sets of keys,” said Joe Haddad, Facility Manager, Blacktown City Main Works Depot. “Without the KeyWatcher Touch automated control and tracking, the job of accurately keeping track of these many keys would be almost impossible.”
Round table discussion
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
The transportation industry is unique because it plays a role in both the minutiae of everyday life and the overall economy's well-being. Providing uninterrupted and efficient transportation services depends heavily on the safety and security of transportation entities. Due to the vast amount of people frequenting transit stations and the importance of the items on ships and ferries, the transportation sector faces multiple challenges that evolve as the industry advances. We asked this week’s Expert Panel Roundtable: What are the security challenges of the transportation industry?
Products
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download