Internet of Things (IoT)
Axis Communications, a pioneer in network video, has announced the launch of a powerful bullet camera that delivers superior image quality and excellent forensic value. This all-in-one, outdoor-ready camera features a custom-made, tele lens ideal for long-distance surveillance to deliver extremely high pixel density even in low-light conditions. With many possible applications from smart cities and airport perimeters to stadiums and transport hubs, this powerful camera is ready out-of-the-box....
Sepura confirms that the Secretary of State in the Cabinet Office has revoked the Final Order imposed on Sepura pursuant to section 27 of the National Security and Investment Act 2021. The original order was made by the then Secretary of State for the former Department of Business, Energy and Industrial Strategy. On 27 June 2024, the Secretary of State in the Cabinet Office revoked the Final Order following Sepura’s return to UK ownership. This has the effect of removing all the requireme...
The Buncombe County Public Safety Communications Centre (BCPSC) became the 145th Emergency Communications Centre (ECC) in the United States and the 13th ECC in the state of North Carolina to implement the Automated Secure Alarm Protocol (ASAP). Launched in 2011 as a public-private partnership, TMA’s ASAP service is designed to increase the accuracy and efficiency of calls for service from alarm monitoring centres to Emergency Communication Centres (ECCs). Agre...
AI in video surveillance is transforming how businesses approach security. Bosch Building Technologies is investing in proactive and intelligent solutions for security and business optimisation supporting secure environments in and around buildings, perimeters, and traffic. The increasing importance of video data for security applications and beyond drives the trend of connecting cameras to the cloud. Cloud technology offers benefits such as scalability, cost-efficiency, and centralised managem...
The shift from standalone systems to fully integrated solutions is one of the biggest shifts the security industry has experienced in recent years. There is a higher demand for integrated solutions that go beyond just security at the device and software level, and manufacturers have been continuously developing improved application programming interfaces (APIs), and hybrid and cloud-connected solutions. Artificial intelligence (AI) Also, artificial intelligence (AI) plays an impor...
Elite Interactive Solutions, a remote video guarding pioneer using proprietary intelligence and integration to achieve proven crime prevention, announces its systems and services are deployed and maintained to the highest available level of cybersecurity protections and protocols. As major news stories continue to proliferate about hacks, breaches and vulnerabilities — including the high-profile cyberattacks this past week that crippled CDK Global, which provides management software for...
News
As innovations, whether digital or physical, revolutionise every area of daily life, the payment sector is no exception. In this exclusive survey, carried out between December 2023 and January 2024, users around the world were interviewed on how they pay and what their expectations are when it comes to payment methods. Users’ payment preferences User expectations centred around three priorities: design, convenience, sustainability Drawing from the feedback of more than three thousand respondents from 12 countries across six continents, three distinct consumer needs to stand out regarding users’ payment preferences: Design matters: with the increasing number of options, from metal to OLED cards among others, card design has become a key differentiator. Expectations and appetite for innovative card designs are ever-growing: 72% care about the design of their payment cards 83% are interested in having a metal card 84% are interested in having a numberless physical card as an added security feature Increased flexibility thanks to the combination of physical and digital cards made possible by mobile phones: 71% of respondents already utilise a digital payment card 68% of those without one express a desire to obtain a digital card in the next three years 86% value the option to activate their physical card by tapping it to their phone The shift towards more sustainability in payment: 69% of consumers would choose an eco-friendly card over a conventional one 71% of respondents are willing to participate in recycling programs for expired cards Advancements of the digital realm Understand usage to develop payment solutions that best meet consumers’ needs IST remains steadfast in its commitment to offer innovative services tailored to individual needs Attuned to the preferences of its consumers, IST remains steadfast in its commitment to offer innovative services tailored to individual needs, while embracing the rapid advancements of the digital realm. Through regular surveys, IST aims to gain an in-depth understanding of consumers’ payment preferences and habits, positioning itself as the payment market’s technological expert armed with unparalleled knowledge of consumer behaviour. IDEMIA Secure Transactions confirms its leadership by proactively addressing the three priorities identified in the survey with tailored solutions. Co-innovate new features and co-design "As a trendsetter, we strive to be at the forefront of the evolutions in our industry and this survey testifies this ambition. Consumers have high expectations for their payment solutions and the way they use and manage their payment means. It is IST’s role to meet and exceed them, by offering ever more innovative solutions," Julia Schoonenberg, Executive Vice President of Payment Services at IDEMIA Secure Transactions. FinTechs have disrupted the cost ecosystem, making open multiple banking options for clients IST has continually innovated to offer a myriad of card design options. Over the past decade, banks and FinTechs have disrupted the payments ecosystem, making available multiple banking options for consumers. Simultaneously, as banks increasingly digitise their services, the physical card and its design become a crucial tool for all card issuers to maintain strong customer connections. From card materials such as metal to special inks, and innovative features such as illuminating cards, IST continues to co-innovate new features and co-design captivating artwork. Physical and digital payment solutions In the era, where instant gratification is the norm, the mobile phone plays a central role in daily lives. IST provides digital solutions to accompany banks and FinTechs in this essential transition. IST embraces the “best of both worlds” by offering both physical and digital payment solutions, with the highest level of security in terms of cryptography and tokenisation, for a comprehensive strategy that appeals to diverse audiences. With regards to sustainability, IST supports card issuers in their ecological transition, by entirely reimagining the traditional payment products and attached services. IST encourages the use of innovative and eco-friendly materials and services through its GREENPAY offer, such as recycled PVC or the recently announced regenerative solution for bank customers GREENPAY Wallet. IST demonstrates its commitment to continuously improving the sustainability of each part of the payment card value chain.
AMG Systems, the pioneer in highly robust connectivity and transmission solutions for IP Video, is seeing increasing demand for the skills of its growing Professional Services team which has been accumulating expertise in custom network design, configuration and deployment with a view to serving systems integrators – enabling them to deliver highly secure, scalable and available networks for more customers installing AMG Systems’ UK-manufactured industrial edge switches. As a Juniper Networks partner, AMG Systems can offer a complete network solution under one roof. AMG Professional Services is able to design, configure and test the entire network from edge devices (AMG’s specialty), right through to the core network powered by Juniper’s technology. This simplifies the process for clients and allows AMG to provide a more comprehensive, end-to-end professional service. AI-powered network solutions AMG Professional Services has been building up its team of experienced network engineers Toby Featherstone, Technical Services Manager, AMG Systems, explained: “By combining our expertise in edge network design for security systems with Juniper’s industry-pioneering secure and AI-powered network solutions we can deliver superior network designs for our clients.” AMG Professional Services has been building up its team of experienced network engineers alongside its market-pioneering networking products for several years now. This preparation means that the AMG Professional Services team is now ready to respond rapidly and effectively to whatever network design, configuration, hardening and deployment work that it is assigned. Network design services AMG Professional Services can also provide consultancy for the initial phases of a project when security threats are being determined and vulnerability assessments are being carried out. The team is structured to allow customers to use as much, or as little, help as they require. So, customers can elect to outsource design and network configuration projects end to end, or instead bring AMG’s expertise in for specific roles such as network hardening or testing prior to a new physical security system going live. The team is structured to allow customers to use as much, or as little, help as they require AMG Systems increasingly acts as a strategic partner for installers and systems integrators that need to optimise surveillance and other management and operational systems, using existing network infrastructure wherever possible. So, from day one, AMG Professional Services has the technical expertise and capacity to offer full network design services, pre-and post-sales support, full low- and high-level network design, as well as providing testing and training facilities. Configuration of network infrastructure Steve Clarke, Managing Director of AMG Systems, said: “With the advent of AI and increasingly sophisticated video analytics built into surveillance cameras, plus audio analytics in smart sensors and increasing complexity of networks, all challenged by the proliferation of bad actors attempting to disrupt critical services which depend increasingly on those networks, it became increasingly clear to us that focusing on robust design and hardened configuration of network infrastructure met a growing market need. So, it’s the right time to expand AMG Professional Services. Our skills are set to experience unprecedented demand.” Toby Featherstone of AMG Systems, added: “We can lead from the pre-sales stage to make sure networks are designed robustly, with redundancy – working all the way through to configuration and testing stages to ensure prompt reliable and scalable solutions are delivered on time and under budget." Zero networking skills Featherstone added: “If you go back just 15 years nearly all surveillance systems were analogue CCTV-based. Zero networking skills were needed in this market then." "However, today AMG Systems increasingly finds itself filling network skills gaps particularly in the UK and Ireland as customers increasingly want to take advantage of the latest intelligent devices which are highly dependent on well configured, highly secure, robust and available networks.”
Innodisk, a pioneering global AI solution provider, has officially inaugurated Phase II of its R&D and production centre in Yilan, Taiwan. In response to the massive market demand driven by the edge AI wave, Innodisk has transformed the manufacturing plant into the group's AI core base. With the increased production capacity, Innodisk is ready to collaborate with global clients to deploy edge AI solutions. At the same time, Innodisk is also inviting global tech talent to join its teams around the world. Innodisk's innovative development Gearing Up Production to Drive AI Business Growth The year 2024 marks a period of innovative energy for Innodisk, with the simultaneous launch of new products and technologies. The latest manufacturing plant will begin production on various edge AI products, focusing on three core technologies: "AI Acceleration,” “Vision-Driven,” and “Custom Integration.” For "AI Acceleration," Innodisk's subsidiary Aetina recently launched the NVIDIA MGX Server, the group's first edge AI server. Innodisk also introduced industrial-grade CXL 2.0 memory and E1.S/E3.S edge server SSDs for AI and high-speed edge computing. "Custom Integration" displays group's core spirit of small-volume, diverse, and highly customised keys "Vision-Driven" showcases Innodisk's innovative development in edge AI machine vision, including the pioneering MIPI over Type-C extension patent technology for embedded cameras. "Custom Integration" embodies the group's core spirit of small-volume, diverse, and highly customised solutions. With the accelerated development of global edge AI and the increased production capacity of the manufacturing plant, Innodisk expects to speed up the realisation of innovative technologies and enable the effective deployment of products and AI solutions in practical scenarios. Demonstrating edge AI solutions in practice Innodisk set an AOI AI secondary inspection key for smart manufacturing to enhance production While promoting smart transformation for clients, Innodisk is also implementing these practices by transforming its production centre into a model for smart manufacturing and management. Collaborating with Aetina, NVIDIA, and through the Metropolis for Factories framework, Innodisk developed an AOI AI secondary inspection solution for smart manufacturing to enhance production line efficiency. Additionally, Innodisk's subsidiary Millitronic, in collaboration with Schneider Electric and ASPEED Technology, developed a panoramic smart visualisation remote management solution for the plant's data centre. This solution transforms traditional on-site inspections into real-time remote management, displaying data and enabling remote monitoring. Furthermore, the iCAP Air solution, announced this year, will connect multiple sensors to measure temperature, CO2, and other air indicators, providing real-time alerts for abnormal values and facilitating prompt facility management. This comprehensive application will ensure employee health and product quality. Creating a base for training AI talent With the inauguration of the Phase II manufacturing plant, Innodisk is focusing on recruiting AI-related talent. The company, which has locations in the USA, Europe, Japan, China, and more, invites global tech professionals to join its team. This expansion supports Innodisk's goal of promoting innovation and advancing edge AI solutions worldwide.
NSI-approved companies had an impressive presence amongst the finalists and winners at this year’s British Security Awards which took place on 3rd July at the Royal Lancaster Hotel in London. The prestigious annual ceremony, organised by the British Security Industry Association (BSIA), celebrates the achievements, acts of bravery and innovations by BSIA members and prospective members in the security systems and guarding services sectors. Highest standards of excellence As a long-term supporter of apprenticeships in the security and fire sectors, NSI was delighted to sponsor the Apprentice of the Year Award for the sixth consecutive year. This year’s winner, Terry McJimpsey of Securigroup, was recognised for his outstanding commitment to learning, professional development, and customer service excellence from his initial steps as an apprentice to his current role as Operations Centre Supervisor. NSI was delighted to sponsor the Apprentice of the Year Award for the sixth consecutive year NSI warmly congratulates all the winners and finalists from this year’s British Security Awards, whose achievements exemplify the highest standards of excellence in the private security sector. With 19 NSI-approved companies shortlisted as finalists and a remarkable 80 nominations among them, they are thrilled to celebrate the success of the following NSI-approved companies and representatives who emerged as winners in the following 13 categories: Best Team: Westgrove Group - Templars Square Shopping Centre Outstanding Act: Martyn Ward - Bidvest Noonan Security Manager of the Year: Tom Meredith–Mitie Gaby Hutchinson Award (Best Newcomer): Caitlyn Turner – Lodge Service Apprentice of the Year: Terry McJimpsey – Securigroup People Property Places - Professionally Protected Recognition Award: Enadeghe Nosakhare – STM Group Mental Wellbeing Initiative: Westgrove Group – Mind over Mountains EDI Champion: G4S – The Million, Securing a Socially Responsible Future SME of the Year: Fenix Monitoring Business of the Year: Mitie Installer of the Year: Securigroup – WH Malcolm Installation Environmental Project of the Year: Securigroup – Securigroup Forest Contribution to Industry: Shaun Kennedy – Securitas UK Additionally, congratulations to Ken Meanwell, Staff Officer NPCC Security Systems Group who received the Chairman’s Award, and to James Goodram of the Post Office, who was honoured with the Industry Bravery Award to a standing ovation. Level of commitment and professionalism Richard Fogelman, NSI Chief Executive, commented: “The British Security Awards are a highlight of the industry calendar and this year’s event was no exception. My congratulations go to all of this year’s winners and finalists, including the NSI-approved companies among them." "For those honoured in front of their peers and industry colleagues, who understand the level of commitment and professionalism required to provide service excellence 365 days a year, it is incredibly rewarding. We wish them continued success in their future endeavours.”
Delvitech, a pioneer in 3D automated optical inspection for assembled printed circuit boards leveraging artificial intelligence, has joined forces with Eurotech, a global innovator in ultra-high-performance Edge AI Computers, to revolutionise quality control technology. Delvitech's patented integrated optical inspection technology, designed to collect comprehensive data to drive neural networks in optical inspection, gains crucial support from Eurotech's hardware. This collaboration boosts the efficiency of assembling printed circuit boards, greatly increasing assembly machine uptime and significantly reducing waste and rework. Integrated 3D solution Delvitech's technology tops formal mathematical norms by analysing a variety of components Employing the patented optical head, Delvitech captures detailed images that are processed through its software, adept at detecting assembly and welding errors in the electronics manufacturing process. Eurotech's hardware complements this system by offering the speed and computational accuracy necessary to handle the massive influx of data required for the algorithms to produce desired outcomes. This integrated 3D solution is highly competitive and flexible, allowing customisation to meet specific customer needs. As board electronics become increasingly complex, Delvitech's technology surpasses traditional mathematical models by analysing a variety of components, such as metal parts, transparent glues, and silicone elements. Optical inspection systems Moreover, this collaboration enables Delvitech and Eurotech to offer a solution that not only identifies errors but also drives AI models to detect deviations and trends, proactively preventing future errors and enhancing process quality. Delvitech and Eurotech to offer a key that not only identifies errors but also drives AI models "In an environment where quality control demands are continuously growing, it is crucial to develop optical inspection systems with optimal performance and partner with providers of state-of-the-art solutions. Eurotech offers highly reliable solutions, extensively tested to meet our high-performance requirements," said Roberto Gatti, CEO of Delvitech. Emphasis on cybersecurity and sustainability Paul Chawla, CEO of Eurotech, added, "Our collaboration with Delvitech showcases the power of our Edge AI solutions. We empower our partners to deliver efficient, cost-effective, and scalable solutions where accuracy and speed are critical." Currently focusing on optical control of boards and soon semiconductors, the partnership aspires to expand into other sectors, including medical and food, with a strong emphasis on cybersecurity and sustainability. As Delvitech and Eurotech continue to innovate, they bring unique strengths to the table. Delvitech commits to 'less errors, less waste, less CO2, more future,' while Eurotech focuses on 'more security, more resilience, more efficiency,' ensuring effective asset management and rapid scalability. These commitments reflect common shared goals of exceeding market and customer expectations now and in the future.
Valsoft Corporation Inc., a Canadian company specialising in the acquisition and development of vertical market software businesses, is pleased to announce the acquisition of Asher Group, a pioneering provider of scalable communications for emergency management agencies and cutting-edge human resources solutions. Founded in 1995, Asher focuses on the intersection of communication and computing technology, most notably with the development of Hyper-Reach. The Hyper-Reach platform enables hundreds of public safety and emergency management agencies to easily communicate with the public and others across multiple diverse communications platforms at an enormous scale. Areas of security and new capabilities Asher provides mass news to private firms as well as telephone-based access to systems In addition to Hyper-Reach, Asher provides mass notification to private enterprises as well as telephone-based access to pioneering edge human resource systems, including UKG Pro and UKG Ready. “We are thrilled to join the Valsoft family of software companies,” said Sam Asher, President and Founder of Asher Group. “Their deep expertise in developing and operating cloud-based software companies will help us strengthen our offerings to customers, especially in the areas of security and new capabilities that go beyond traditional emergency alert services.” Acquisition of Asher Group “Asher Group's exceptional track record of industry-pioneering solutions and customer service aligns perfectly with Valsoft's mission to invest in and grow companies with strong potential,” explains Kent Howard, Operating Partner at Valsoft Corporation. “We are committed to supporting Asher Group in its next phase of growth, ensuring that their tradition of excellence continues to flourish under our stewardship.” The acquisition of Asher Group marks Valsoft Corporation’s strategic entry into the Mass Notification Software space. Tequity Advisors, a brokerage firm with a deep understanding of the SaaS market, played a pivotal role in the swift closure of the deal for Asher Group. Working with Valsoft’s operating division, Aspire Software, Asher Group will now have the opportunity to further strengthen its presence in the market while ideally placed to roll out significant product and service improvements.
Expert commentary
For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdles. A majority of public-school districts today are faced with outdated infrastructure and security controls, requiring necessary upgrades. By addressing these concerns head on, schools will ensure a safer environment for both students and staff, mitigating risks posed by unforeseen physical and digital threats. Common K12 security pain points There’s no one-size-fits-all solution in school district security. School districts may have big plans to implement upgraded security systems but to set out on the right foot, pioneers must have a clear vision of their long-term strategy. When embarking on their security journey, education pioneers often wonder where to start and what exact steps are they need to be taking to identify and address weaknesses. Local K12 and government pioneers are promoting and mandating security assessments to uncover safety gaps on campuses and mitigate these risks with advanced technology solutions. Not only do assessments provide detailed, customisable roadmaps for district pioneers, but they also recommend technologies and funding opportunities to help close threat gaps. K12 school districts are mainly vulnerable to cyber-attacks due to the sensitive nature of student records In today’s climate, schools face a growing number of physical and digital security threats. From a cybersecurity standpoint, K12 school districts are particularly vulnerable to cyber-attacks due to the sensitive nature of student records. However, only one-third of these districts have adequate staffing to address threats effectively. In addition, according to a recent survey from Johnson Controls and Forrester Consulting, security decision-makers are having trouble receiving actionable insights. Nearly two-thirds of respondents said that they struggle to receive information from all necessary systems regarding their security threats. To gain more clarity into what school districts need in terms of security tools and threat mitigation, implementing system-wide monitoring and optimisation can be invaluable. This approach enhances equipment and operational efficiency, while providing necessary resources and expertise for critical patch updates across all systems, strengthening their overall security posture. Achieving a well-rounded security program In the past few years, AI technology has emerged as a trending solution and is generating considerable attention. While the allure of implementing cutting-edge technologies is undeniable, it’s important to recognise that a robust security program hinges on solid access control. Access control technology provides administrators with the means to oversee and regulate entry into facilities, serving as the foundation for basic physical security. The technology helps administrators and staff control access to multiple areas from web-enabled devices, even during lockdowns which is crucial in emergency situations. School district pioneers should utilise available digital risk assessment tools to uncover threat areas Once basic security controls are in place, school districts must address their next set of security pain points and identify which solutions meet their specific needs. This involves identifying and prioritising the highest need and most cost-effective investments that will have the greatest impact on enhancing security measures. To accurately determine which security solutions are needed for a specific environment, school district pioneers should utilise available digital risk assessment tools to uncover threat areas and determine levels of priority. By focusing on these priority areas, districts can allocate their resources and efforts where they are needed most, ensuring maximum effectiveness in mitigating risks and vulnerabilities. Securing funding before approaching deadlines A major challenge for school districts surrounding campus security is identifying and securing the necessary funding to implement solutions aligned with their goals. Leveraging available funding sources is critical, especially considering certain programs are approaching their deadline, like the Elementary and Secondary School Emergency Relief (ESSER) fund. Announced during the pandemic, ESSER is a funding program that has allocated nearly $190 billion in aid to U.S. public school districts to fund projects benefitting the well-being of occupants. Notable ESSER funding deadlines to keep in mind as the clock winds down include September 30, 2024 Notable ESSER funding deadlines to keep in mind as the clock winds down include September 30, 2024, when schools must attribute all of their funds to assigned contracts. Following this date, pioneers will need to complete all ESSER spending by January 2025 unless approved for an extension into March 2025. As ESSER wanes, school districts are acutely aware of the fiscal cliff in budgets through 2025. However, many states are ramping up grant funding to close the deficit gap. Administrators should become familiar with these grant opportunities at a local and state level. Get started on security plans The time for school district pioneers to act is now. While the safety and well-being of students and staff are always top priorities, it’s crucial to acknowledge that a lack of insight into necessary security upgrades and available funding options will leave districts behind the curve. Seizing the final months of ESSER funding presents an ideal window to address security pain points and build a safer future for K12 facilities. Looking beyond ESSER, pioneers must proactively seek out and leverage other funding avenues to help ensure the continuity of their security efforts and maintain a proactive stance in safeguarding healthy and safe educational environments.
When a bomb detonated in the Port of Beirut, I had hundreds of employees under my care inside the blast zone. Within just two hours, I was able to determine who was impacted, understand their safety conditions, and share resources for on-the-ground support—all thanks to mobile technology. For Chief Security Officers, receiving calls like these launches a variety of protocols and necessary decision-making with the safety and security of people and assets as a top priority. And these calls are only becoming more common. Dependence on threat intelligence Mobile phones have dominated the post-COVID environment where people work from anywhere Threats ranging from natural disasters to geopolitical conflicts are becoming more frequent and complicate the responsibility organisations have in keeping their people safe. To meet these needs CSO’s are staying ahead of negative outcomes through creating a greater dependence on threat intelligence. In these times, effective, real-time risk management depends on hyper-local data from technology that is accessible, portable, and dynamic–such as cell phones. Mobile phones have revolutionised the way people live and work. They allow us all to walk around with a computer in our pocket, bringing the world to our fingertips and eliminating digital borders for over 90% of the world's population. Mobile phones have dominated the post-COVID environment where people work from anywhere and have geographically distributed teams but are also more vulnerable to threatening events. Mobile-friendly risk management platforms Mobile technology assigns workers with easy entry to data that can help keep them and their teams safe As we approach 2024, many organisations are adopting comprehensive risk management tools that empower personnel across the organisation with the intelligence and knowledge they need to stay safe wherever they are. Mobile-friendly risk management platforms, such as Crisis24 Horizon, provide always-on awareness, on-hand threat intelligence, and immediate communications and distress signalling through location monitoring. Users receive location risk assessments and push notifications directly to their devices about nearby issues and threats no matter if they are on or off the job. While only select risk managers have complete control of the platform and all sensitive employee data is protected through encryption, the app distributes critical intel to foster a culture of shared awareness and responsibility. Thus, mobile technology empowers employees with easy access to information that can help keep them and their teams safe. Creating a culture of mobile technology adoption In the last few years, the world has proven the importance of being well-informed of risks and mitigation plans to minimise harm. However, psychological barriers tend to trump physical barriers when it comes to accessing the vast array of tools our mobile devices offer. World has proven the matter of being well-informed of risks and relief plans to minimise harm Adopting this technology and establishing a culture that enforces risk management across an organisation is a daunting challenge that demands substantial commitment from leadership to be successful. Some companies have tackled this challenge by positioning security technology as part of the organisation’s employee benefits package, such as commuter benefits and health insurance, to encourage people to take advantage of these resources and learn how to use them. Cohesive risk management culture Technology is only as effective as the people whose actions it informs, which is why adoption and integration are so important. When a cohesive risk management culture meets a powerful technology platform, individuals are enabled to receive threat alerts and counter their impacts, letting others know when and how to take the necessary precautions to protect themselves and their team. For more information on mobile technology and other security trends, check out the Global Risk Forecast, an annual report by Crisis24 that provides a comprehensive analysis of key events around the world most likely to affect operations in the coming year.
These days, business is more collaborative, adaptable and connected than ever before. In addition to offering new identities and access privileges, new applications and data also increase the attack surface available to cyber criminals, hacktivists, state actors and disgruntled insiders. These new identities need to be handled carefully. CISOs must develop an identity management strategy that is consistent across on-premises, hybrid and cloud systems. Good security is built on solid identity governance and administration (IGA) principles. From ransomware to supply chain intrusions, high-profile cybersecurity events frequently take advantage of weak identity and access management procedures. The Identity Defined Security Alliance found that 84% of organisations experienced an identity-related breach during its one-year study period. Robust IGA system Consequently, organisations need to find best-of-breed solutions for each section of the fabric Some of the most well-known cyber-attacks have not been made possible by a nation-state exploiting a remote zero-day vulnerability; rather, they have been made possible by something as basic as a hacked orphaned account. This resulted in lateral movement from an insecure platform to a high-value system, illegitimate privilege escalation or unsanctioned access to a computer system. To safeguard against such attacks, organisations must be aware of who has access to their systems and apps, and guarantee that access is revoked when it is no longer required. Here, a robust IGA system is helpful. It is not the whole picture, though; IGA is part of a larger identity fabric. A report by KuppingerCole noted that “Identity Fabrics are not necessarily based on a technology, tool or cloud service, but a paradigm for architecting IAM within enterprises.” The report pointed out that the paradigm is created using several tools and services. That’s because, contrary to marketing claims, no one vendor has a platform that provides all the needed elements. Consequently, organisations need to find best-of-breed solutions for each section of the fabric. Threats to the new corporate landscape Due to their exclusion from the corporate firewall and the security culture that comes with working on-site, remote employees and third parties are desirable targets for hackers. The transition to online office suites is another vulnerability that hackers are taking advantage of–for instance, through bogus authentication login dialogues. Additionally, hackers are using technologies like machine learning and artificial intelligence to circumvent current security tactics. A cyberattack powered by AI will imitate human behaviour and develop over time. Even publicly available information might be used by this "weaponised AI" to learn how to get past a target’s defences. CISO and the business users Attackers will finally find an entryway, but firms can protect the new perimeter–their identities It's no longer possible to secure the traditional perimeter. Attackers will eventually find an entryway, but businesses can protect the new perimeter–their identities. To defeat these threats, organisations must look again at identity and access management tools and how they are weighed against the impact on the organisation. Should you mandate multi-factor authentication (MFA) more often and earlier? Should only company-owned devices have access to networks, or should access be restricted to specific business hours or regions? Should access to sensitive information and critical systems be given just temporarily or should it be offered on a task-by-task basis? Both the CISO and the business users they assist should be asking these questions. Staying ahead of threats with identity Access control limits decrease dangers but can come with a cost. If you give your users too much access, your organisation becomes susceptible; if you give them too little, productivity suffers. But there are ways to strike a balance with security, compliance and productivity. More CISOs are turning to Zero Trust–which is based on the principle of maintaining strict access controls and not trusting anyone by default–to protect their systems from new attack types. However, Zero Trust is reliant upon having a thorough and baked-in strategy that underpins it. Other actions that companies can take include implementing automation for identity management, such as automating workflows for approval. This would significantly lessen the administrative burden and friction that security solutions like multifactor authentication (MFA) or time-restricted access to critical systems have on business users. This might include restricting access to particular devices, capping access hours during the day or enforcing MFA based on user behaviour. Identity fabric: Putting it all together Make sure your identity architecture is scalable, secure, and provides a seamless user experience These are just two elements of the identity fabric approach. Most organisations today have implemented pieces of an identity fabric, which is basically an organisation’s identity and access management (IAM) infrastructure and typically includes a mix of modular IAM solutions for multi-cloud and/or hybrid environments. Now, organisations need to define, enhance and develop this infrastructure. They must also institute guiding principles for how it should operate, meet current and future business requirements as well as identity-related cybersecurity challenges. In doing so, businesses can move past identity platforms and adopt an identity fabric perspective. The key is to make identity governance the starting point of your identity fabric strategy, ensuring seamless interoperability within your identity ecosystem. Make sure your identity architecture is scalable, secure, and provides a seamless user experience. Aligning security with business Due to the increase in knowledge workers using the cloud and working remotely, attackers are focusing on this group. These employees are easier to compromise, give access to valuable data and offer more attack targets. Knowledge workers also lack an administrator’s level of security expertise. Therefore, as part of their security fabric strategy, enterprises require a scalable IGA system. It is easier to comply with security and access regulations and takes less time for IT teams to do normal administrative activities when they invest in IGA, a crucial tenet of identity security. CISOs and boards, though, are currently looking at more than identity management. IGA is at the centre of the debate about security and governance. Taking an identity fabric-based approach, with a foundation built on modern, cloud-based IGA, will safeguard identities, increase productivity, and make staff adherence to organisational procedures easier.
Security beat
Fueled by mounting concerns about the cybersecurity vulnerability of U.S. ports, President Joe Biden has signed an Executive Order aimed at shoring up defences against cyberattacks. Cybersecurity initiative The cybersecurity initiative marks a significant shift in policy, empowering key agencies and outlining concrete actions to bolster defences. By empowering agencies, establishing clear standards, and fostering collaboration, the initiative aims to strengthen U.S. ports against the evolving threat of cyberattacks, safeguarding the nation's maritime economy and national security. Expanded authority for DHS The proactive approach aims to prevent incidents before they occur The Executive Order grants expanded authority to the Department of Homeland Security (DHS) and the Coast Guard to address maritime cyber threats. DHS gains the power to directly tackle these challenges, while the Coast Guard receives specific tools. The Coast Guard can compel vessels and waterfront facilities to address cyber vulnerabilities that endanger safety. The proactive approach aims to prevent incidents before they occur. Real-time information sharing Reporting any cyber threats or incidents targeting ports and harbors becomes mandatory. This real-time information sharing allows for swifter response and mitigation efforts. The Coast Guard also gains the authority to restrict the movement of vessels suspected of posing cyber threats. Inspections can be conducted on vessels and facilities deemed risky. Mandatory cybersecurity standards The standardisation aims to eliminate weak links in the chain and prevent attackers from exploiting Beyond these broad powers, the Executive Order establishes foundational elements for improved cybersecurity. Mandatory cybersecurity standards will be implemented for U.S. ports' networks and systems, ensuring a baseline level of protection across the board. This standardisation aims to eliminate weak links in the chain and prevent attackers from exploiting individual vulnerabilities. Importance of collaboration and transparency Furthermore, the initiative emphasises the importance of collaboration and information sharing. Mandatory reporting of cyber incidents fosters transparency and allows government agencies and private sector partners to work together in mitigating threats. Additionally, the Executive Order encourages increased information sharing among all stakeholders, facilitating a unified response to potential attacks. Maritime Security Directive The Executive Order encourages investment in research and development for innovative cybersecurity solutions To address specific concerns, the Coast Guard will issue a Maritime Security Directive targeting operators of Chinese-manufactured ship-to-shore cranes. This directive outlines risk management strategies to address identified vulnerabilities in these critical pieces of port infrastructure. The long-term success of this initiative hinges on effective implementation. The Executive Order encourages investment in research and development for innovative cybersecurity solutions, recognising the need for continuous improvement and adaptation to evolving threats. Recognising the urgency of cyber threats The initiative has been met with widespread support from port authorities, industry stakeholders, and cybersecurity experts who recognise the urgency of addressing cyber threats. However, some concerns exist regarding the potential burden of complying with new regulations for smaller port operators. Effective communication, resource allocation, and collaboration among all stakeholders will be crucial to ensure the successful implementation of this comprehensive plan. Enhancing cybersecurity The more impactful and noteworthy piece is the associated NPRM from the U.S. Coast Guard (USCG) “This Executive Order is a positive move that will give the U.S. Coast Guard (USCG) additional authority to enhance cybersecurity within the marine transportation system and respond to cyber incidents,” comments Josh Kolleda, practice director, transport at NCC Group, a cybersecurity consulting firm. The more impactful and noteworthy piece is the associated Notice of Proposed Rulemaking (NPRM) from the U.S. Coast Guard (USCG) on “Cybersecurity in the Marine Transportation System,” adds Kolleda. Portions of the notice of proposed rulemaking (NPRM) look similar to the Transportation Security Administration (TSA) Security Directive for the rail industry and the Emergency Amendment for the aviation industry. Coordinating with TSA on lessons learned The USCG should be coordinating with TSA on lessons learned and incorporating them into additional guidance to stakeholders and processes to review plans and overall compliance, says Kolleda. “At first glance, the NPRM provides a great roadmap to increase cybersecurity posture across the various stakeholders, but it underestimates the cost to private companies in meeting the requirements, particularly in areas such as penetration testing,” says Kolleda. Cyber espionage and threats The focus is on PRC because nearly 80% of cranes operated at U.S. ports are manufactured there “It is unclear if or how the federal government will provide support for compliance efforts. As this seems to be an unfunded mandate, many private companies will opt for the bare minimum in compliance.” “Cyber espionage and threats have been reported by the Director of National Intelligence from multiple nation-states including China, Russia, and Iran,” adds Paul Kingsbury, principal security consultant & North America Maritime Lead at NCC Group. The focus here is on the People’s Republic of China (PRC) because nearly 80% of cranes operated at U.S. ports are manufactured there, he says. Destructive malware “The state-sponsored cyber actors’ goal is to disrupt critical functions by deploying destructive malware resulting in disruption to the U.S. supply chain,” says Kingsbury. “These threat actors do not only originate in China or other nation-states but also include advanced persistent threats (APTs) operated by criminal syndicates seeking financial gain from such disruptions." "The threat actors don’t care where the crane was manufactured but rather seek targets with limited protections and defences. The minimum cyber security requirements outlined within the NPRM should be adopted by all crane operators and all cranes, regardless of where they are manufactured.” PRC-manufactured cranes Kingsbury adds, “The pioneering risk outlined in the briefing is that these cranes (PRC manufactured) are controlled, serviced, and programmed from remote locations in China." "While this is a valid concern and should be assessed, there are certainly instances where PRC-manufactured cranes do not have control systems manufactured in PRC. For example, there are situations in maritime transportation system facilities where older cranes have been retrofitted with control systems of European Union or Japanese origin.” Monitoring wireless threats “The Biden Administration’s recent Executive Order is a critical step forward in protecting U.S. ports from cyberattacks and securing America’s supply chains,” says Dr. Brett Walkenhorst, CTO at Bastille, a wireless threat intelligence technology company. “To ensure proper defence against malicious actors accessing port-side networks, attention must also be paid to common wireless vulnerabilities." "Attacks leveraging Wi-Fi, Bluetooth, and IoT protocols may be used to access authorised infrastructure including IT and OT systems. Monitoring such wireless threats is an important element in a comprehensive approach to upgrading the defences of our nation’s critical infrastructure.”
Already a strong player, particularly in New Zealand and Australia, Gallagher is still climbing in the U.S. market, which it sees as a big opportunity to invest in the company. Active in the United States for 10 years, Gallagher undertook a more aggressive growth strategy about five years ago. There are 52 employees in Gallagher’s U.S. security business, and about half the workforce has been hired in the last couple of years. They have grown from three sales territories to 16, operated by a full sales and engineering staff. Culture of innovation sets As it happens, Gallagher’s U.S. headquarters is located a short drive from my home office in the wider vicinity of Atlanta. I missed seeing them at GSX in Dallas, so we scheduled an in-person visit to catch up on their company. Gallagher’s strong culture of innovation sets them apart, as does their “people-first” commitment, says Scott Elliott, Gallagher’s Executive Vice-President, The Americas. “We have intentionally recruited for a diversity of thought that drives the business,” says Elliott. “We are a people business.” Melissa Vidakovic, Director of Marketing, Americas; and Scott Elliott, Executive VP, Americas, at Gallagher Security's office in Canton, GA. Unified approach An advantage Gallagher has in the market is total ownership of their supply chain; it manufactures each of the hundreds of products used across their solutions, from plastic components to readers to controllers to their own software systems. Among other advantages, the unified approach enables tighter control from a hardening and cybersecurity perspective, enabling them to minimize any threat vectors or vulnerabilities. The strategy also avoids dependence on third-party suppliers, which was a huge advantage during recent supply chain disruptions. While competitors struggled with availability issues related to third-party manufacturers, Gallagher’s supply was uninterrupted. Gallagher’s commitment Gallagher uses the same norms as the nation and subjects its effects to inner and outer penetration As a manufacturer serving a broad spectrum of markets, it’s Gallagher’s commitment to the high end of the market (e.g., high-security applications), where the company incorporates core tenets such as authentication and encryption. Gallagher uses some of the same standards as the government and subjects its products to internal and external penetration testing. These core strengths are also integral to Gallagher’s complete product line. “If it’s good enough for a high-level customer, it’s good enough for Mr. Business Owner,” says Elliott. The New Zealand company was founded in 1938 and was the first company to commercialize the electric fence, which it still uses for its agriculture business sector, separate from the security business. Gallagher entered the access control business 35 years ago in 1988 when a product used to restrict access to fuel pumps evolved into broader access control. Gallagher platform In the intervening years, the product has grown into a unified platform that incorporates access control, intrusion detection, and perimeter detection in a single ecosystem. “The platform is all-encompassing,” says Elliott. “No other platform does all three.” Augmenting access control, intrusion, and perimeter protection, there are other applications available in the Gallagher platform, such as workforce management, health and safety functions, and a spectrum of features useful to a wider stakeholder community. Fatigue management applications For example, Gallagher can implement routine randomized checks to proactively mitigate potential risks such as drug or alcohol abuse, thus ensuring workers are fit to work, to operate various machinery and that they do not pose a threat to fellow employees or the company. “Fatigue management” applications can monitor the use of equipment to avoid repetitive injuries or manage how long an employee works at a job site, requiring a worker to swipe or tap a card to a reader mounted on a machine to monitor and limit the time they operate that machine. Mobile mustering provides location and identification of evacuees in case of an emergency. Impact of digital transformation Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation Gallagher is also embracing the “digital transformation” of the industry. Security companies must adapt to a more agile workforce and shifting processes, says Elliott. Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation on their workforce. They also seek to address the changing workforce, where Gen-Z’ers work side-by-side with tenured, experienced workers, and where creating trust is the best approach to closing the generational gap. Gallagher also seeks to educate the market on trends such as artificial intelligence (AI), machine learning, cloud adoption, various service delivery models, and other issues. Industry consolidation Gallagher has more than 1,200 employees; operates in 140 countries, from South America to Canada, Europe to the Asia-Pacific and Australia; and serves almost 16,000 customers. Gallagher is part of New Zealand’s growing technology export sector, which is growing 30% faster than the overall economy and is now the second-largest export sector in New Zealand. In an age of industry consolidation and a market dominated by corporate conglomerates, Gallagher is a privately held organization seeking to be agile and innovative, and to deliver customer value more quickly. Gallagher re-invests about 15% of its profits into research and development. “Our customer service is the primary reason people buy from us,” says Elliott. Security integrators Security integrators quickly appreciate the breadth and strength of the product line Gallagher positions itself as an alternative in a market in the midst of disruption. Brand awareness continues to be a challenge in the United States, and the sales team often hears the question: “Who is Gallagher?” Once the introduction is made, security integrators quickly appreciate the breadth and strength of the product line, says Elliott. “We allow our customers to select among best-of-breed platforms, and [using open systems,] we are not limited by the technology we offer,” says Elliott. “Our value proposition to the integrator channel is our focus on the relationship,” says Elliott. Supporting end users through an authorized, certified channel, Gallagher also emphasizes value, cost-competitiveness, and cybersecurity. “Our partner relationships are built around cultural alignment,” says Elliott. Product innovation perspective What’s ahead for Gallagher and for the industry as a whole? Hard to say, notes Elliott, given the unfolding of unpredictable geopolitical and financial trends. However, from a product innovation perspective, Gallagher will continue to evolve, balancing a dependence on “cash cow” legacy product lines with investment in leapfrog innovations such as frictionless access control, cloud platforms, and mobile systems. In general, Elliott predicts AI will yield an opportunity to analyze a person’s pattern of behavior and intent, thus enabling a security system to adapt down the road. “With the ability to predict with some degree of certainty what might happen, these capabilities will evolve,” says Elliott.
As the physical security and cybersecurity worlds converge, many industry professionals are finding themselves moving from one realm to the other. Or, more likely, they are embracing both disciplines as integral to the future of security as a whole. One security professional bringing her cybersecurity expertise to the physical security market is Wendy Hoey, Director of Sales, US Sales Leadership, North America, for Milestone Systems. With more than 23 years of experience in cybersecurity, Wendy Hoey now works with a global company dedicated to empowering people, businesses and societies with data-driven video technology. Author's quote Caught up with Wendy Hoey to discuss how the security market can harness innovation “I'm thrilled to be joining the physical security industry at this transformative time when there's such tremendous potential to update legacy systems with pioneering technologies like AI and the Internet of Things,” says Hoey. “I'm energised by the chance to collaborate with colleagues to help transform physical security, enhance predictive capabilities, and realise a shared vision of seamless protection across the digital and physical realms.” Caught up with Wendy Hoey to discuss how the security market can harness innovation to make the world safer and more secure. “The future is bright, and I'm honoured to be part of this community,” says Hoey. Q: What can physical security learn from the world of cybersecurity? Hoey: Physical security can learn a great deal from the world of cybersecurity. With the rise of IoT and IP-connected devices, the lines between physical and digital security are blurring. Like cybersecurity, physical security needs to take a proactive approach to protecting core systems and perimeter access points. Understanding potential vulnerabilities and attacks is key. Physical security pros should continuously educate themselves on emerging technologies and threats and stay up to date on best practices. Adopting a customer-centric mindset is also critical. Rather than just selling technologies, physical security providers should focus on understanding clients' unique risks, objectives, and pain points. By taking cues from cybersecurity, the physical security industry can transform itself, innovate, and provide smarter solutions. Q: How is physical security a unique application for IT? How do physical security (and/or video) systems differ from “other” IT systems? Hoey: Physical security has unique challenges compared to traditional IT systems, but also shares some commonalities. At its core, physical security relies on networked hardware like cameras, access control and detectors that must be online and recording effectively at all times. This is like IT infrastructure in that uptime and availability are critical. With the rise of IoT, cyber and physical security are converging. Physical security systems have vulnerabilities that didn't exist before everything became IP-connected. Staying on top of emerging technologies and threats is crucial. At the end of the day, both physical and cyber security share the goal of minimising organisational risk, and both disciplines must come together and cooperate to optimise security and safety. Q: How can security integrators ensure their workforce (i.e., installers) have the required IT skills to address the needs of the physical security market? Hoey: As security networks converge more deeply with IT infrastructure, integrators must invest in training to ensure their installers have the required skills. Whether pursuing vendor certifications, in-house training programs, or partnerships with IT services firms, integrators must recognise that security solutions require IT fluency. A willingness to upskill installers and keep pace with technological change will prepare integrators to deliver the solutions end users demand in an increasingly connected physical security ecosystem. Q: What is the role of the manufacturer to ease the application of IT technologies to the physical security market? Hoey: The role of the security manufacturer is to simplify and facilitate the application of IT technologies by serving as a trusted advisor and educator. Manufacturers must provide guidance, case studies, and domain expertise to help partners and end users understand the full capabilities of technologies and how they can be leveraged most effectively. Rather than just promoting a specific product, manufacturers should always take an active role in informing the channel and customers on available possibilities, bringing real partnership through tailored advice and solutions. Q: What challenges remain relating to implementing IT technologies in the physical security industry? How will new technologies (e.g., AI) transform the IT environment for physical security now and in the future? Hoey: When implemented thoughtfully, AI has enormous potential to transform physical security by helping security professionals identify anomalies and patterns in data to enable predictive analytics. With the right solutions, AI can act as a force multiplier by monitoring behaviours and giving security teams advance warnings before incidents occur. As AI and other emerging technologies mature, they will bring the industry in line with the most advanced security tools available. The future looks bright for a truly integrated physical and digital security environment with AI pioneering the charge.
Case studies
Arana Security, a specialist in providing end-to-end security systems for businesses, has chosen Custom Consoles control room desks for a major client in the manufacturing sector. The project includes a main desk and supervisor’s desk from the Custom Consoles SteelBase series plus a MediaWall and auxiliary furniture. Arana Security was founded in 2013 to serve a growing market of smart card solutions and security systems. In 2015 it started to move towards providing clients with the advanced security that biometric technology offers. The company is a globally active service provider specialising in integrated biometric security solutions for the corporate, financial, governmental and logistics sectors. Latest-generation models “This is the most recent of many security-related control room commissions we have worked on over the years,” says Gary Fuller, sales manager at Custom Consoles. “Both SteelBase desks are latest-generation models with blue LED lighting on the underside of the worktop. This style of lighting provides sufficient illumination for staff to concentrate on the monitor displays without distraction while still being able to move around the room easily. It also helps to reduce fatigue during a long or uneventful operating shift." “The main desk is a 4.3-metre wide six-bay unit configured for use by two operators. Each bay is fitted with a lockable front and rear door providing easy access to computer equipment and related cabling. The desktop is 80 cm high and has a 120 cm front-to-back reach. A removable section of the worktop covers a full-desk-width cable tray. Four monitor screens are mounted near the rear edge of the desk. The desk faces directly towards a 3 metre wide MediaWall supporting six large multiscreen monitor video screens forming three wide by two high display grid." Desk worktops Desk worktops are finished in grey Marmoleum with black PVC edging, plus matching grey doors Fuller added: “Situated behind and to the right of the main control desk, the supervisor’s desk is a 1.6-metre wide two-bay SteelBase with dual 24-inch monitor screens, again located near the rear of the worktop. This desk too has blue LED underlighting.” The desk worktops are finished in grey Marmoleum with black PVC edging, plus matching grey doors and side panels. Also provided were a dual-bay control room and crisis room storage units with doors, a 2.2 x 1-metre crisis room meeting table, 24/7 operator chairs, monitor arms plus meeting table chairs. Cable management features Custom Consoles' SteelBase is a high-strength desking system developed to withstand the demands of heavy industry. Built around steel frames with hinged lockable front and rear doors, SteelBase can be configured for use by individual operators or teams of practically any number without the cost and long delivery time usually associated with project-specific furniture. Each bay can include an optional sliding shelf which gives easy access to internally stowed PCs Each bay can include an optional sliding shelf which gives easy access to internally stowed PCs. Predrilled monitor arm mounting points are positioned at the rear upper edge of each bay. Cable management features include a removable worktop section with dual brush strips providing an uninterrupted cable exit for telephones, monitor cables and computer peripherals. Integral cableways allow heavy-duty wiring to be fully concealed within the desk structure while retaining easy access for routine maintenance or adjustment. SteelBase desktops Desktop equipment pods can be specified if required. SteelBase desktops are available in a choice of 120 cm (standard) or 100 cm (SteelBase Lite) front-to-back sizes with a choice of hard-wearing Marmoleum or laminate work surfaces. All elements are guaranteed against component failure for five years of normal use. All elements are guaranteed against component failure for five years of normal use MediaWall is a video and audio monitor support frame system providing a combination of structural rigidity and operational versatility. Flat-screen video displays of practically any size can be mounted in almost any configuration. Video display screens Incorporating height-adjustable horizontal beams and T-slot mounts, MediaWall is fully adjustable to ensure optimal sight lines. Individual or multiple frames can be used in self-supporting mode or coupled directly to the studio wall. Video display screens can be positioned so that the edges meet exactly to form a continuous horizontal display limited only by the monitor panel bezel. Monitor signal and power cables are fully concealed and can enter or leave the structure at any desired point.
Genetec Inc., a pioneering technology provider of unified security, public safety, operations, and business intelligence solutions, announced that Heathrow Airport’s multi-year investment in Genetec solutions is enabling them to continuously innovate and transform operations. The joint effort provides Heathrow with a unified view across large-scale airport operations to secure people and assets, bringing efficiency and enhancing the passenger experience while ensuring data privacy and cybersecurity compliance. Deployed Genetec Security Centre Heathrow deployed Genetec Security Centre to bring all of its IP security systems onto one unified forum London Heathrow is Europe’s busiest airport, handling approximately 80 million passengers and 14 million tons of goods annually. Over 76,000 employees work around the clock to ensure the airport’s smooth operations across its 1,227-hectare site, including maintaining passenger flow, securing the premises, and managing over 1,300 daily take-offs and landings for 89 different airlines. Heathrow initially deployed Genetec Security Centre to bring all of its IP security systems onto one unified platform. What began as a 2,000-camera deployment in 2016 has since more than quadrupled in size, incorporating everything from video and access control to LIDAR, analytics, automatic licence plate recognition (ALPR), and more. Genetec solutions Genetec solutions are used to go far beyond security. For example, Genetec solutions are used to monitor over 150 km (93 miles) of baggage belts and facilitate the daily entry and exit of over 150,000 vehicles. “We’re essentially running a small city operation that happens to be called Heathrow,” explains Danny Long, IT Product Owner for physical security products at Heathrow. “Alongside the traditional airport security functions, we’re responsible for the monitoring of roads, retail space, three train stations, a bus terminal, offices, a church, fuel stores, a high voltage electrical network, and all the other associated infrastructure that maintains passenger flow.” Software and firmware updates Genetec Security Centre supports 90 other stakeholder groups working across 110 control rooms Genetec Security Centre now supports 90 different stakeholder groups working across 110 distinct control rooms, all of whom have different needs and access rights. Customised dashboards enable individual teams and third parties, such as police, government agencies, airlines, and retailers, to focus on their specific tasks. For example, some operational staff are given the tools to monitor passenger flow and are automatically notified when security lines grow too long. Meanwhile, colleagues in IT don’t see camera feeds. Instead, they have access to system health dashboards that notify them of devices that have fallen offline or require software/firmware updates. New requirements “The joy of working with London Heathrow is that the team is constantly striving to put our system through its paces and identify new areas where it can add value,” states Simon Barnes, Director of Business Development, Genetec, Inc. “While our software is configured to their requirements at the time, once in the field, new requirements emerge, and we have to adjust to their reality." “My job is to translate business requirements into workable solutions and Genetec provides me with the valuable tools to achieve that,” concludes Long. “Our experience with Genetec has been very positive. We’re only looking to expand in terms of the size and usage of the system.”
A mix of Hubble Panoramic and PTZ cameras from Dahua Technology have been installed at Tripoli Stadium in Libya to help it meet modern international standards. Built in 1970, it is the largest Olympic stadium in the country and has been renovated and refurbished to meet FIFA’s requirements for stadium safety and security. Challenges With a capacity of 50,000 spectators, the stadium becomes crowded on match days and control of spectators and crowds becomes paramount. With only a limited number of police, security and stadium staff to rely on, stadium managers needed to have an overview of crowd flows and potential congestion to help ensure safety at these busy times. In addition, the stadium needed to stream images of match action to large screens strategically located inside and outside the stadium for fan interaction, as well as provide screens for advertising. Solution Cameras contain wise roles such as face recognition, perimeter protection and people-counting A mixture of eight Hubble panoramic and more than 180 WizMind 5 series cameras have been installed at the stadium to improve the situational awareness for stadium managers and the security team. The Hubble cameras are situated high up in the stadium to provide a panoramic overview, while being able to track specific incidents. They consist of an array of fixed cameras providing 180o, 270o or 360o coverage, together with an integrated dome camera to zoom into a particular scene and track specific objects. With Ultra HD resolution of up to 24MP, Hubble also features crowd number and density detection, vehicle-counting and density monitoring and augmented reality mapping. Dahua’s DSS video management software The cameras are available in dust-proof, waterproof and vandal-proof versions Also installed are more than 180 WizMind 5 series cameras. Featuring Starlight and deep learning algorithms, the cameras incorporate intelligent functions such as face recognition, perimeter protection and people-counting, which all greatly improve the accuracy of video analysis. The cameras are available in dust-proof, waterproof and vandal-proof versions. Intelligent recognition plays a big part in the security of the stadium, with cameras being able to identify and subsequently track any blocklisted suspects. This feature is also used at the entrance of the stadium to validate authorised ticket holders. Also installed are giant 15m x 9m LED screens to provide images of play on the pitch, as well as advertising coverage. All equipment is managed by Dahua’s DSS video management software located in the central control room. Results The installation of the Dahua equipment has provided stadium staff and security personnel with a high degree of situational awareness at the venue. They are now able to control access to the stadium through face recognition, anticipate overcrowding and potential congestion points with automatic heat mapping from camera images and track suspicious people or potential incidents. The cameras also provide a high degree of perimeter protection to detect and track abnormal intrusion.
Jacksons Fencing has recently completed a project with the Kingdom Hall in Hoddesdon, striving to enhance both the safety and visual appeal of its premises. As a place of worship for Jehovah’s Witnesses, the Kingdom Hall is meticulously maintained by its congregants to embody modesty and purpose. Enhancing security and aesthetics The primary goal was to bolster security against unauthorised access, vandalism, and theft, while also complementing the dignified exterior of the place of worship. Recognising the importance of creating a secure yet welcoming environment for congregation members and visitors alike, Jacksons Fencing was entrusted to install vertical bar railings around the building’s perimeter. These railings, coated in black architectural grade polyester powder, were chosen for their security features and aesthetic compatibility with the existing brick façade. The solution The black polyester powder-coated finish was chosen for its longevity and low maintenance The selection of a black polyester powder coating not only ensures durability and weather resistance, but also aligns with the hall’s commitment to sustainability and environmental stewardship, by minimising maintenance needs. Safety and security were paramount concerns for the premises. To prevent unauthorised access, vandalism, and theft, and to safeguard everyone within the premises, the installation of vertical bar railings was deemed essential. Additionally, enhancing the building's exterior aesthetics was a key consideration. The decision to use black polyester powder-coated railings was driven by the ability to harmonise with the brick façade, thereby enhancing the overall sophistication of the hall’s appearance. Jacksons Fencing’s experienced installation team anchored the Barbican Imperial® vertical bar railings to the brick wall, utilising cranked posts for added stability. The black polyester powder-coated finish was chosen for its longevity and low maintenance, reflecting Jehovah’s Witnesses' emphasis on sustainable practices and responsible investments. Ensuring sustainability Environmental stewardship is at the heart of Jehovah’s Witnesses teachings, and this principle guided every aspect of the project. Emphasising quality and longevity reduces lifetime costs and environmental impact by decreasing waste and the need for replacements. Jacksons Fencing’s 25 year guarantee on both steel and timber products further ensured that the fencing and gates were an ideal fit for this project. The power of protection Project not only managed the useful needs of the flock but also enhanced the visual harmony The installation of the vertical bar railings not only delineated clear boundaries but also effectively deterred unauthorised access, ensuring unobstructed views from inside the building to the surroundings and contributing to a safer environment. Through detailed planning, bespoke design, and precise execution, the Kingdom Hall achieved significant advancements in both security and aesthetics. This project not only addressed the practical needs of the congregation but also enhanced the visual harmony of the premises, creating a secure and welcoming environment for all. Well-being of congregation members Peter Jackson, Managing Director, Jacksons Fencing, says “We are proud to have contributed to creating a secure and welcoming environment for the Kingdom Hall in Hoddesdon. In today’s world, ensuring the safety and well-being of congregation members and visitors is more important than ever." "We have worked closely with the congregation to ensure the final solution is fit for purpose now and well into the future. Our products aim to help the community feel safe and secure as they worship and gather.”
A renowned global pioneer in international education services provides various programs and comprehensive support to students pursuing their educational goals abroad. Originating from Australia in 1969, its primary objective has been facilitating educational opportunities worldwide. The company is closely associated with IELTS (International English Language Testing System), and it assists students in studying in English-speaking nations like Australia, New Zealand, Canada, Ireland, the UK, and the US. Company profile In India alone, it has over 70 offices across 61 cities and grew its operations in Southeast Asian nations Situated in Delhi, India, the company’s Indian headquarters serves as a central operational hub, addressing the diverse needs of Indian students aspiring for overseas education. With a team of dedicated experts, the centre offers students personalised guidance, counselling, and support nationwide. In India alone, it has over 70 offices across 61 cities and expanded its operations in Southeast Asian countries. Motivated by a commitment to excellence, integrity, and student success, the company continues to empower individuals, fostering global connections and promoting cultural understanding through international education. Challenges Ensuring the integrity of its assessment process Needed a standard procedure that could be replicated across 61 locations Evidence capturing to confirm the identity of the student appearing for the exam Needed a surveillance solution that ensured compliance at the centre Need to capture footage locally and centralised monitoring The surveillance solution should be dependable, scalable, and interoperable Business scenario The institute sought a wide surveillance solution that captured the details of every student As the co-owner of the IELTS, the institute faced significant challenges in ensuring the integrity of its assessment process for students studying in English-speaking countries. With centres spread across India and other Southeast Asian countries like Sri Lanka, Bangladesh, and Bhutan, they needed a reliable surveillance solution to verify the identity of candidates at their assessment centres. It was crucial for the assessment process to be standardised across 61 locations and easily replicable in new centres. With 11 assessment centres and 49 centres where students arrived for assessment, the institute sought a comprehensive surveillance solution that captured the details of every student entering their premises and cross-referenced them with their system centrally. Additionally, they required a robust recording architecture to store video evidence for future reference as needed securely. In essence, the company faced the distressing challenge of establishing a surveillance solution that was dependable, scalable, capable of capturing essential details, and interoperable. They needed a distributed architecture with centralised control to meet their surveillance requirements effectively. Solution The surveillance solution comprised of: The challenges faced by the institute were swiftly assessed by Matrix experts, who devised a robust surveillance structure to ensure compliance across multiple centres in India and abroad. In all 61 centres, Matrix 2MP PTZ cameras with 25x optical zoom were strategically installed to capture the faces of candidates arriving for tests and match them with their recorded details in the system. The movement of each candidate was meticulously recorded in the system to maintain accurate identity records. The action of each candidate was meticulously recorded in the system to keep real identity records Further, the accuracy was enhanced by adding a secondary layer of surveillance to monitor compliance with the SOP. Matrix PTZ cameras with 25x optical zoom adeptly captured intricate event details recorded in the computer. To meet the needs of each centre, NVRs (Network Video Recorders) with different capacities were installed. This enabled the local recording of details at each centre. Following the client's specifications, the NVRs were configured to store recorded details for three months. Additionally, cameras were installed at the 11 OSM sites to ensure compliance at the places where the papers were assessed. Products offered SATATYA MIBR20FL36CWP: 543 2MP IR Bullet Camera with 3.6mm Lens with Audio SATATYA MIDR20FL36CWP: 264 2MP IR Dome Camera with 3.6mm Lens with Audio SATATYA PZCR20ML25CWP: 76 2MP Pan-Tilt-Zoom Camera with 25x Optical Zoom SATATYA NVR1601X - 8 Nos 16 Channel NVR with 1 SATA Port SATATYA NVR1602X - 8Nos 16 Channel NVR with 2 SATA Port - 8 Nos SATATYA NVR3202X - 1Nos 32 Channel NVR with 2 SATA Port SATATYA NVR3204X - 31Nos 32 Channel NVR with 4 SATA Port SATATYA NVR6404X - 2Nos 64 Channel NVR with 4 SATA Port SATATYA NVR6408X - 7Nos 64 Channel NVR with 8 SATA Port MATRIX LICENCE DONGLE 200 Enterprise VMS: USB Dongle to Run Licence Application SATATYA SAMAS PLT Enterprise VMS: Software for up to 65,535 Cameras SATATYA SAMAS CAM100 - 5Nos Enterprise VMS: 100 Camera Licence SATATYA SAMAS USER3 - 5Nos Enterprise VMS: 3 Concurrent User Licence Benefits Enhanced Assessment Integrity: By implementing Matrix 2MP PTZ cameras with 25x optical zoom across all 61 assessment centres, the company ensured the integrity of the assessment process. These cameras meticulously capture the faces of candidates arriving for tests, allowing them to verify their identities and maintain accurate records. Standardised and Replicable Procedure: The Education Centre needed a standard procedure that could be replicated across the extensive network of centres. The Matrix surveillance solution provided it with a standardised approach that could be easily implemented in new locations, ensuring consistency in its assessment process. Compliance Assurance: The addition of Matrix PTZ cameras with 25x optical zoom and a secondary layer of surveillance helped them monitor and ensure compliance with the Standard Operating Procedures (SOP) at all times. Dependable and Scalable Surveillance: Matrix's NVRs with different capacities allowed the Institute to locally store recorded details at each centre while ensuring reliability and scalability for future expansion. Centralised Monitoring: To streamline the operations, they needed a surveillance solution that allowed seamless central monitoring. Matrix's solution facilitated the cross-referencing of student details with their system centrally and, enhancing efficiency and data accuracy. Interoperability: Matrix's surveillance solution is designed to be interoperable, ensuring seamless integration with the existing infrastructure. This interoperability enables them to adapt to evolving technological requirements while maintaining the integrity of the assessment process. In summary, Matrix's comprehensive surveillance solution not only addressed the immediate challenges but also provided a robust foundation for the assessment process, enabling them to uphold the highest standards of integrity, compliance, and efficiency across all assessment centres.
Metrasens, a recognised pioneer in advanced detection systems for security and safety applications, announced its selection by the Fort Worth Independent School District (FWISD) in bolstering safety measures for graduation ceremonies and extracurricular events. Serving nearly 75,000 students across 140 schools, FWISD conducted a meticulous internal assessment of various technologies, ultimately selecting Metrasens as the preferred solution. FWISD deployed six Metrasens Ultra systems during its 2024 graduation ceremonies. The deployments strengthened safety protocols while synergizing with existing security measures, underscoring the district's unwavering commitment to safety as evidenced by its comprehensive security and safety policies. Fort Worth ISD graduations "We are confident in our choice of Metrasens Ultra to elevate our extracurricular safety efforts," said Daniel Garcia, Safety & Security Executive Director at Fort Worth ISD. "With regards to Fort Worth ISD graduations and other ceremonies, it's paramount that students, faculty, and visiting families feel assured and confident as they come together to commemorate these special occasions." "As we open our facilities to families, it's essential to offer reassurance that Metrasens Ultra systems provide a completely safe solution for all members of our school community." Metrasens Ultra systems The passive nature of Metrasens Ultra systems adds an additional layer of safety for all Metrasens Ultra, renowned for its cutting-edge sensor technology, swiftly and accurately pinpointing potential threats such as concealed weapons, all without emitting any harmful radiation. Its versatility enables effortless transition between indoor and outdoor settings, while its portability ensures convenient setup and relocation between facilities, without necessitating physical contact. The passive nature of Metrasens Ultra systems adds an additional layer of safety for all, including individuals with medical implants or expectant mothers. Moreover, the systems' sleek design and portability seamlessly align with the steadfast commitment to ensuring the safety of all attendees. Advanced detection technology "We are honoured to have been chosen by Fort Worth ISD to implement our advanced detection technology at their extracurricular events," said Chris Arbeitman, Vice President of Market and Business Development at Metrasens. "The district's dedication to safety aligns perfectly with our mission to provide innovative solutions that meet the diverse security needs of our customers."
Round table discussion
Factors such as stable demand and large contracts make the government market particularly enticing for security companies and professionals. However, entering and thriving in the government market presents a number of challenges. We asked this week's Expert Panel Roundtable: What are the unique aspects of the government market, and how should the industry adapt?
Manufacturers make things. That hasn’t changed. Manufacturers today still produce finished goods from raw materials using various tools, equipment, and processes. What is evolving is a greater emphasis among manufacturers on understanding and meeting customer needs. In the security industry and elsewhere, the role of a manufacturer is expanding from a purely production-focused function to one that embraces technology, prioritises adaptability, expands service offerings, and caters to a more demanding customer base. We asked this week’s Expert Panel Roundtable: How is the role of the manufacturer changing in the security market? Is “manufacturer” still the best term to reflect the changing role?
In today's interconnected world, the lines between physical and digital security are blurring. This means that threats can easily exploit vulnerabilities in both realms, potentially causing significant damage. That's why the convergence of cyber- and physical security systems is becoming increasingly important. It has already been a topic of discussion in the security market for more than a decade. To get a reality check, we asked this week’s Expert Panel Roundtable: Has convergence been achieved in security systems? Why or why not?
Products
White papers
Guide for HAAS: New choice of SMB security system
DownloadIntegrating IT & physical security teams
DownloadTroubleshooting IP video systems
Download5 easy steps to an upgraded video surveillance system
DownloadCombining access control and intercoms for better security
DownloadThe wireless access control report 2023
DownloadMachine Operator Authentication
DownloadUnlocking wide-angle camera dewarping
DownloadLevelling up with campus safety
DownloadSimple Security Solutions for SMBs
DownloadIoT connectivity
DownloadModernizing facilities management
DownloadCharting the path to safe cities
DownloadConnected video technology for safe cities
Download10 top insights in access, cloud and more
DownloadVideos
Internet of Things (IoT): Manufacturers & Suppliers
Honeywell GARD USB threat report 2024
DownloadThe role of artificial intelligence to transform video imaging
DownloadAccess control system planning phase 1
DownloadKey Findings from the 2024 Thales Cloud Security Study
DownloadArtificial intelligence
Download