Office surveillance
Allied Telesis, a pioneer in intelligent networking, in partnership with Hanwha Vision America, announces the availability of a plug-in for Hanwha Vision America’s, Wisenet WAVE VMS system. As an extension of the two companies’ partnership announced earlier this year, the plug-in allows the Wisenet WAVE VMS administrator the ability to control and manage the Allied Telesis switches from a single pane of glass. This advancement streamlines security operations, mitigates risk, and imp...
British universities are cited as some of the best in the world; working on cutting-edge and revolutionary research. Physical security measures The Director General of MI5 and senior politicians warned last week these institutions are being targeted for their intellectual property (IP) by hostile states and spies and as a result, this is a threat to national security. In the face of this, universities must work at speed to increase their physical security measures and keep their academia and...
Global channel services provider, Agilitas IT Solutions, is pleased to announce its strategic partnership this week with Solink, a world-class business that provides trusted, cloud video surveillance systems. Driven by a shared commitment to safety and customer service, paired with Agilitas’ global footprint and Solink's best-in-class technology, the partnership will empower both organisations to serve a broader global customer base. Video surveillance systems This partnership comes at...
Regula, a global developer of forensic devices and identity verification solutions, has reached another milestone in enlarging its identity document templates database. The world’s largest commercially available database, it contains over 13,000 templates of ID from 247 countries and territories. Adaptable identity verification What sets it apart is knowledge of a full set of security attributes used to protect a document, since Regula leverages its 30-year experience in forensic hardwa...
Hackuity, the risk-based vulnerability management provider, announced the launch of Version 2.0 of its next-generation platform, featuring major enhancements to bring further support to organisations in prioritising risks. Vulnerability Management Hackuity’s intelligent Risk-Based Vulnerability Management combines threat intelligence, vulnerability severity, and unique business context, providing organisations with a quantified, measurable ‘True Risk Score’(TRS), f...
Xtract One Technologies, a technology-driven threat detection and security solution that prioritises the patron access experience by leveraging AI announced the Company will serve as the exclusive preferred supplier for the American Association of Professional Baseball (AAPB). Through this three-year partnership, Xtract One will have the unique ability to advise AAPB regarding security and weapon detection technology, deploy solutions, and ensure best practices to deliver first-class...
News
Boon Edam Inc., a manufacturer of secured entry solutions, will highlight their best practices for data centre layered security as a Silver Sponsor at 7x24 Exchange. The conference, to be held October 8-11, 2023 in Grapevine, TX, is an important event for those involved with protecting critical infrastructure such as data centres. Data centre protection “Helping to protect data centres with our suite of secured entry solutions is a core component of our mission at Boon Edam,” said Patrick Nora, President, and Managing Director, of Boon Edam. He adds, “Data centres are truly the lifeblood of today’s society, storing the essential information needed for the daily functioning of utilities, financial organisations, government, and more. We’re pleased to be a Silver Sponsor at 7x24 Exchange, to demonstrate how we can help to safeguard this important infrastructure.” 7x24 Exchange conference The 7x24 Exchange conference is a valuable forum for individuals and organisations like Boon Edam involved with all aspects of 7x24 infrastructures. Boon Edam’s interlocking portals, security revolving doors, turnstiles, and other secured entry solutions, help to protect data centres and the vital information they store while maintaining access for authorised individuals.
Solink®, a physical security company for businesses announced its new Blocked Exit Detection capability, delivering even more value to its customers. Blocked Exit Detection Solink’s Blocked Exit Detection uses security cameras on Solink to proactively detect when perimeter doors are obstructed and notifies users to take prompt action, mitigating costly fines and improving the health and safety of employees. Exit route obstructions cost U.S.-based businesses more than $6.25M in Occupational Safety and Health Administration (OSHA) citations in 2021. Exit route obstructions accounted for approximately 25% of total OSHA retail fines in the same year. AI-based software service Blocked Exit Detection is a software service that does not require the need for specialised hardware Through powerful AI algorithms, Blocked Exit Detection uncovers obstructions at exit doors over an extended period of time and sends notifications to local or central users when discovered. Notification reminders can be set if the obstruction is not cleared within a set period of time. Blocked Exit Detection is a software service that does not require the need for specialised hardware or new cameras. ROI-driven improvement "Our customers rely on Solink to help them protect their people, patrons, and profits," said Michael Matta, CEO, of Solink. "Blocked exits are the most commonly found hazard during OSHA inspections." "In many conversations with customers, we learned that fines and safety citations were increasing with the pressure of staffing shortages. Solink partners with our customers to provide ROI-driven improvement. With Blocked Exit Detection, we're making it even easier for our customers to keep their people safe and mitigate tens of thousands of dollars in potential OSHA fines."
Matrix, a prominent provider of Telecom and Security solutions, eagerly anticipates showcasing its range of security and telecom products at IREE 2023. This event is scheduled from 12th to 14th October 2023 and is dedicated to innovative security solutions. The venue is Booth No. 2.120, Pragati Maidan, New Delhi, India. Matrix is the first company to offer RDSO 6.0-compliant cameras for Indian Railways. Matrix cameras are certified by STQC, Delhi lab for following the OWASP ASVS 4.0 mandated by RDSO for cyber security. EN50155 compliant Matrix Cameras are designed to ensure that the data gathered by the cameras is secured against cyber threats both at the time of transmission and storage. Matrix will unveil its cutting-edge IP Video Surveillance solutions at this exhibition, encompassing enterprise-grade VMS, NVRs, and IP cameras with resolutions reaching up to 8 MP. Their latest camera in the range is ruggedised cameras that are EN50155 compliant. The cameras are anti-vibrant and shock-resistant making them ideal for roadways and railways. The comprehensive solution focuses on addressing three key client concerns: managing bandwidth and storage expenses, simplifying centralised video surveillance complexities, and offering proactive security measures. Matrix PTZ series 2MP cameras The IREE 2023 event in New Delhi, will feature a display of the Matrix Ruggedised Cameras In a recent addition to its diverse range of IP cameras for comprehensive security, Matrix introduces the ruggedised camera. Matrix ruggedised IP cameras cater to transportation's dynamic needs with high-quality video, low-light sensitivity, and versatile features for rail and roadway monitoring. It can capture images of vehicles moving in Zap Speed. The IREE 2023 event in New Delhi, will feature a display of the Matrix Ruggedised Cameras. Matrix also features PTZ cameras, enabling full 360-degree security coverage by enabling pan-tilt-zoom functions in multiple directions for extensive area monitoring. The Matrix PTZ series 2MP cameras with 25x/33x and 5MP Cameras with 42x optical zoom options enhance image clarity and surveillance efficiency. Project Series 5MP Cameras Furthermore, Matrix will also introduce its existing line of Project Series Cameras, specifically designed for large-scale organisations and project-based scenarios. The Project Series 5MP Cameras come with UL Certification, a globally recognised safety standard, and NEMA Certification, ensuring resilience against environmental threats. These cameras offer high-resolution imagery for enhanced clarity and protection. Advanced surveillance systems demand robust video recording solutions with ample storage capacity and redundancy to ensure continuous 24/7 surveillance with minimal downtime. Matrix addresses this need with its new ENVR line, capable of supporting up to 256 channels and boasting a storage capacity of up to 144 TB. Attendees of the event will have the opportunity to experience this innovation firsthand. SATATYA SAMAS range of solutions Matrix showcases the COSEC PANEL200P-a site controller ruling key operations for buildings To enhance proactive video surveillance capabilities, visitors can explore the SATATYA SAMAS range of solutions by Matrix, featuring features like tripwire, intrusion detection, motion detection, no-motion detection, and more. Within the realm of access control, Matrix will showcase the COSEC PANEL200P-a site controller overseeing access operations for entire buildings. This versatile controller functions in two distinct architectures: acting as a bridge between controllers and servers in network architecture, and operating autonomously without a server in Standalone Architecture. Its user interface can efficiently manage 255 COSEC door controllers and accommodate up to 25,000 users. COSEC ARC DC200P door controller Furthermore, Matrix will introduce the COSEC ARC DC200P door controller, an innovative IP-based access control terminal with several advantages over traditional models. Leveraging Power over Ethernet (PoE) eliminates the need for complex wiring and local power sources. Its compact design, offering both din rail and wall mount options, makes it suitable for even space-constrained environments. Matrix will raise the COSEC ARC DC200P door controller, an inventive IP-based access control Matrix's display will also feature the robust biometric door controller-VEGA FAX, boasting multiple connectivity options including Wi-Fi, PoE, and ethernet. The company will also present the COSEC ARGO FACE, a sophisticated face-based door controller renowned for its precise, swift, and reliable recognition capabilities, powered by cutting-edge AI-driven deep learning technology. Author's quote Kaushal Kadakia, Marketing Head, states, “IREE will provide an excellent opportunity for exhibitors to demonstrate our innovative security products for various industrial verticals. With a large crowd set to attend, we expect to meet some key decision-makers to advance our creative solutions. We look forward to understanding their organisational needs and showing them how our solutions will help them improve their security experience.” Matrix cordially invites to visit IREE 2023 from 12th to 14th October 2023 at Booth No. 2.120, Pragati Maidan, New Delhi, and get a hands-on experience with its enterprise-grade security solutions.
Idesco Corp., a New York-based ID card solutions provider announced the company is offering oversized degradable ID cards to customers in addition to the standard oversized cards. Environmentally friendly cards These new environmentally friendly cards will help event managers offer an eco-friendly solution to their customers. The cards went through stringent testing by Northeast Laboratories, Inc. which included a degradation test according to Method ASTM D5511 – Standard Test Method for Determining Anaerobic Biodegradation of Plastic Materials Under High-Solids Anaerobic-Digestion Conditions. Oversized ID card printers Idesco gives customers the option of either buying or renting printers for all their events Idesco has a strong presence in the event industry and has been working closely with event managers to help bring them the latest card technology over the years. With an extensive line of oversized ID card printers, Idesco gives customers the option of either buying or renting printers for all their events. Event managers can select from a full range of oversized printers and can order these degradable cards for the XXL printers. ID card solutions “Idesco is happy to be able to offer our customers an environmentally friendly option when it comes to oversized credentials,” states Andrew Schonzeit, President at Idesco Corp. “We are thrilled to not only help our environment; but give our customers all the options that they need when it comes to their ID card solutions.” Streamlining badging process These degradable cards are available blank or fully preprinted. Ordering preprinted cards in advance helps speed up the registration process at a live event and keeps lines moving. Attendees and visitors will get a professional badge while reducing their environmental footprint. Idesco offers event managers many options when it comes to streamlining their badging process.
ECS Industrial Computer Co., Ltd., (ECSIPC) is pleased to announce its participation in GITEX 2023 where it will showcase its latest smart retail turnkey solutions, new gaming and factory automation equipment, as well as its LIVA Z5 series family of mini PCs including LIVA Z5 Plus, LIVA Z5E Plus, and brand new LIVA Z5F Plus. ECSIPC LIVA Z5F Plus applications This highly efficient mini-PC is ideal for smart retail, security, and kiosk installations, and wide-ranging industrial use cases, such as edge computing, factories, and warehousing. The fanless design minimises maintenance and allows it to continue working flawlessly even in dusty environments. Features USB4 (20Gbps) and USB 3.2 Gen 2 (10Gbps) ports are available for ultra-high-speed IO devices Inside the LIVA Z5F Plus is an Intel® 13th Gen Core™ processor with ultra-efficient 15W TDP. A generous 64GB of memory is supported, along with dual-band Wi-Fi 6, dual gigabit Ethernet, dual DisplayPort (one via USB Type-C), and dual HDMI ports. Four COM ports provide necessary legacy IO for industrial use, while USB4 (20Gbps) and USB 3.2 Gen 2 (10Gbps) ports are available for ultra-high-speed IO devices. ECSIPC will also showcase the new LIVA Z5F Plus during GITEX 2023. LIVA Z5 Plus for smart retail, digital signage, and smart kiosks During GITEX 2023, ECSIPC will showcase a range of potential applications made by combining the highly capable LIVA Z5 Plus with ECSIPC’s own software in Windows and Linux environments. An Android OS option will follow soon, powered by an upcoming Arm-powered design available by the end of 2023. These include: A 24/7 energy-efficient, multi-display video wall with a focus on low maintenance. Large format displays can be made by combining up to four displays of 4/8K60, which can show customised content and advertising. The cloud-based content management system with a signage player allows convenient access via web UI or mobile app. The Smart Retail / KIOSK demonstration exhibits easy installation and energy efficiency while allowing a wide range of display sizes for advertising or product information. Wide voltage support offers greater flexibility for potential applications and operators that need to work in a variety of environments. AI-based facial recognition is supported for applications such as security, access management, and payment authentication. ECSIPC iM6501WT embedded box PC for industrial use COM, DIO, and USB ports are ready for industrial-grade peripherals Powered by the highly efficient Intel® 11th Gen Core™ processors, this embedded PC can be customised with up to 64GB of memory, M.2 PCI-Express Gen-4 NVMe SSD, M.2 LTE/5G cellular modem, up to four displays, and it supplies integrated Wi-Fi 6 and dual Ethernet (1G+2.5G) connectivity. COM, DIO, and USB ports are ready for industrial-grade peripherals, and its wide voltage (12-24V) DC input enables a range of deployment opportunities. ECSIPC RK3568-IS1 Arm SBC for industrial use Designed for industrial use cases with a focus on power efficiency and highly compact form factor, the ECSIPC RK3568-IS1 is a new Rockchip-based SBC featuring a quad-core Arm Cortex-A55 CPU and up to 0.8TOPS AI processing. With support for multiple displays up to 4K60, MIPI-CSI camera interface, M.2 PCI-Express for storage, I2C, several USB and COM ports, the addition of Wi-Fi and LTE/5G cellular modem, and dual Ethernet. The RK3568-IS1 supports both Android and Ubuntu OS, with rich toolchains and readily available resources that allow developers to quickly deploy their software applications. ECSIPC A620AM5-M9 AMD motherboard for commercial use A comprehensive solution for the latest AMD Ryzen 7000 series processors (up to 65W), the ECSIPC A620AM5-M9 motherboard is designed for high-performance commercial use cases. It supports up to 64GB of super-fast DDR5, a PCI-Express Gen-4 16x slot for graphics cards or add-in board expansion, an ultra-high speed M.2 PCI-Express Gen-4 NVMe storage slot, four SATA ports for further storage, M.2 socket for Wi-Fi/Bluetooth, and Gigabit Ethernet. 6-channel audio is enhanced by an integrated amplifier. Six USB ports (Type-A and Type-C), plus COM and LTP ports provide support for wide-ranging commercial peripherals such as scanners, printers, and communications.
Cohesity, a pioneer in AI-powered data security and management announced it is expanding its Data Security Alliance ecosystem with six pioneering Data Security Posture Management (DSPM) vendors, including long-standing partner BigID, as well as Cyera, Dig Security, Normalyze, Sentra, and Securiti. Challenges with cloud Cloud adoption continues to increase, but copies of data are often shared between clouds without oversight by IT or security, resulting in the growth of shadow data. Because of this, data security, cyber recovery, and compliance are at risk, as evidenced by 82% of breaches involving data stored in the cloud. Need for DSPM capabilities DSPM gives customers a deep understanding of where their sensitive data is, who has access to it The need for DSPM capabilities, coupled with modern data security and management services, has never been greater. DSPM gives customers a deep understanding of where their sensitive data is, who has access to it, how it is being used, and where it is stored. When combined with Cohesity’s modern data security and management technology, customers are building a strong cyber resilience posture. Flexibility With these partnerships, Cohesity expects to integrate with the broadest and most comprehensive selection of DSPM solutions in the industry. Collectively, this newly formed group represents the majority of the DSPM market, providing Cohesity customers with the flexibility to choose the solution that best fits their needs. Data visibility challenge Organisations face a significant challenge when it comes to the visibility of critical data across a growing multitude of repositories. Accelerating cloud adoption, compounded by an explosion of microservices, and a high rate of change (driven by modern DevOps practices) put customers at risk of significant data sprawl. Addressing visibility gaps Joint customers maintain visibility and help assure all their stakeholders that their sensitive data is protected Due to these visibility gaps, critical and sensitive data becomes hidden from IT teams and oftentimes goes unprotected. Cohesity is working to solve this issue by partnering with the pioneering DSPM vendors and members of the Cohesity Data Security Alliance. With this unique collaboration, joint customers maintain visibility and help assure all their stakeholders, including employees, customers, and shareholders that their sensitive data is protected. Sensitive data assessment Cohesity’s pioneering data security and management technology, coupled with the benefits of DSPM, will deliver instant discovery of all data workloads, both sanctioned and unsanctioned, while also providing assessments of which data workloads have sensitive data that are often targeted by bad actors. These capabilities enable enterprises to be even more proactive in the fight against cyberattacks and provide the following cyber resilience benefits: Backup admins can easily see which objects have sensitive data. IT and security can instantly identify protection gaps for critical workloads. Actionable Cyber Recovery risk reports go directly to compliance teams. Identify and protect data As organisations rapidly expand their hybrid cloud footprint, their data risk and exposure increase in lockstep" “As organisations rapidly expand their hybrid cloud footprint, their data risk and exposure increase in lockstep,” said Elad Horn, group vice president, of Product, Cohesity. “We look forward to continuing our partnership with pioneering DSPM vendors to help our joint customers rapidly identify and protect their most sensitive and business-critical data across both public cloud and private cloud environments.” Cyber attack and ransomware protection “Cohesity is helping some of the largest enterprises in the world protect their data against ransomware and cyber threats in hybrid cloud environments,“ said Amer Deeba, CEO and Co-founder of Normalyze. “Now with the integration with Normalyze DSPM platform, customers get full visibility into their data across all clouds, SaaS, and on-prem." "The joint solution gives security teams unprecedented visibility into their sensitive data locations and types; identifies and prioritises risks based on the highest monetary impact to the organisation in case of a data breach, and proactively protects the data from ransomware and cyber attacks.” DSPM solutions “Cohesity’s Data Security Alliance ecosystem offers customers the opportunity to implement security on their terms, making it easy to integrate with vendors in adjacent technology spaces,” said Jennifer Glenn, research director for the IDC Security and Trust Group. “The expansion of the program to include DSPM solutions such as BigID and Normalyze, as well as other pending integrations, gives customers more insight and visibility into their data and more confidence that it will be protected appropriately.” Data Security Alliance Cohesity’s Data Security Alliance offers a unique and comprehensive approach to security The Cohesity Data Security Alliance was founded in November 2022 and contains 15 members including BigID, Cisco, CyberArk, Mandiant, Netskope, Okta, Palo Alto Networks, PwC UK, Qualys, Securonix, ServiceNow, Splunk, TCS, Zscaler. The addition of the six DSPM security vendors brings the total membership to 21. Cohesity’s Data Security Alliance offers a unique and comprehensive approach to security. Security and data management Through this one-of-a-kind alliance, pioneering cyber security, data security and management, and services vendors partner to seamlessly bridge enterprise IT and security by sharing context and enabling new workflows. This collaboration can help customers detect threats and respond to attacks faster, improve remediation, and advance cyber resilience, all while utilising their existing security and data management investments. Remediate data risks “It’s more important than ever for organisations of all sizes to proactively identify and remediate risk across their entire data landscape – including dark data, shadow data, and critical data,” said Tyler Young, CISO at BigID. BigID’s market-pioneering DSPM capabilities enable companies to accelerate their security strategies" “BigID’s market-leading DSPM capabilities enable companies to accelerate their security strategies and improve their security posture with differentiated actionability, risk remediation, and unmatched data discovery and classification built for the enterprise. Our partnership with Cohesity is a natural fit to extend DSPM capabilities to help customers better manage, reduce, and remediate risk.” Availability The integration with Normalyze, Cohesity’s initial design partner, is expected to be available within 30 days. The company’s partnership with BigID on enterprise-grade, AI-powered data classification grows through this new integration with SmallID (BigID’s DSPM product) and is expected to be available in 60 days. Additional DSPM partner integrations will be available in the coming months.
Expert commentary
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Open platform video technology software is more than just a product; it's a tool that helps customers achieve their desired business outcomes. Safety, round-the-clock security, and increased operational efficiencies are now the norm due to video technology. Responsible Technology Despite humanity’s impressive technological advances, we also recognise the immense responsibility that comes with technological innovation. It's not enough to focus solely on the positive impact video technology can make, we must also be vigilant in identifying and addressing any potential negative consequences it can have on society and its citizens. This is the role of Responsible Technology. Data privacy We want to use all the good things that technology innovation brings, whether it be video, AI, ML, facial recognition, etc. We want to use all the good things that technology innovation brings, whether it be video, Artificial Intelligence, machine learning, facial recognition, etc. to serve people in societies in a responsible way. That means making sure that we regulate technology in a way that respects human rights and data privacy. Addressing the challenges The challenge is, that rather often technology leaders and policymakers either have conflicting interests or collaborate too late. To be responsible, business leaders must support their societies and policymakers in making regulations in the interest of the common good. At Milestone Systems, we are actively looking at how we develop our software responsibly, how our partners responsibly sell our software, and very importantly, how our customers use our software with a responsible mindset. Ensuring good corporate governance As a long-time partner within the security industry, we’re celebrating our 25th Anniversary this year, we are supporting the regulation of video technology for the good of society. However, it of course needs to strike the fine line between the right legislation and not hindering innovation. UNGP The UNGP is the most authoritative and widely adopted set of principles for responsible business At Milestone Systems, we want to play an active role in this and that is why we have pledged our support to the UN's Guiding Principles on Business and Human Rights (UNGP). The UNGP is the most authoritative and widely adopted set of principles for responsible business. The principles call on governments and companies to identify, prevent, mitigate, and remedy actual and potential human rights abuses. Since its launch in 2011, the UNGPs have received wide support from states, civil society organisations, and the private sector, making them the key global foundation for business and human rights. Protect, respect, and remedy Through this commitment, we are taking steps to ensure good corporate governance and ethical standards in the development of our technology. We're generating mechanisms to prevent misuse and we are building educational practices internally. Based on the UNGP’s three pillars: protect, respect, and remedy, we are developing a set of Responsible Technology Principles and procedures for the development, selling, and use of our products. Need for video technology regulation In addition, we are currently evaluating all the various technology areas in which our video software can be used, such as with third-party integrations that utilise e.g., facial recognition. We are mapping out the advantages and disadvantages for societies. One key area of concern is how local authorities are mapping and storing data about us as individuals. This is the reason why we're inviting more legislation to regulate video technology rather than less. Engaging With policymakers We are meeting ministers and trade organisations as we believe this needs to be a joint effort where all parties are heard We are proactively reaching out to and connecting with policymakers and other relevant stakeholders to discuss our approach to and take on Responsible Technology and encouraging the political landscape to work with us around regulation and legislation. We are meeting ministers and trade organisations as we believe this needs to be a joint effort where all parties are heard and where we can openly weigh the advantages and the challenges of technology, whether it is video, facial recognition, machine learning, Artificial Intelligence, or other technologies. Striking a balance Implementing Responsible Technology is a journey, not a destination. To give it the focus needed, we have created a dedicated team to implement this initiative at Milestone Systems. At the same time, we are reaching out to the political landscape to discuss how we balance regulation without hindering innovation. Video technology used ethically We are a global company with worldwide operations, and we are having dialogues about how video technology is being used and how we can have meaningful talks about what regulation and legislation should look like. However, we don’t necessarily want to limit access to the technology itself. Facial recognition We encourage the policymakers to engage with us in the industry so that together we can strike the fine line Facial recognition is a great example of this. The EU is considering making live facial recognition illegal. That would be a huge inhibitor of proactive terrorism prevention. For example, if a well-known terrorist is walking down the street and is being mapped out against Interpol’s most wanted list, the authorities should be able to react. However, if a person walking down the street but is not mapped out or does not have any priors then the city should not be allowed to store the data of that individual’s whereabouts at that point in time. This potential legislation is concerning to me as a citizen of Europe. Instead, we encourage the policymakers to engage with us in the industry so that together we can strike the fine line for the better good of all of us. Maintaining high ethical standards We have a firm understanding and expectation that ethical standards are a huge driver in the security business. Citizens are not in favour of technology companies abusing data about them and monetising from things that they have not opted in to do. Soon, I think we will see many more companies and governments leaning toward suppliers that do have a responsible mindset and high ethical standards for partnerships. Ethical practices Our journey toward Responsible Technology is an ongoing process, and we must remain steadfast in our commitment to ethical practices and the protection of human rights. We recognise that the rapidly changing technological landscape continually presents new challenges and opportunities. For this reason, we continuously look into how we can improve, for example, our end user licence agreements to avoid potential human rights abuses. An industry responsibility Security companies must prioritise careful planning and preparation, including developing policies and procedures For Responsible Technology to truly become a reality, compliance with international human rights laws and data privacy regulations is critical. Security companies must prioritise careful planning and preparation, including developing policies and procedures that govern the ethical use of video surveillance systems. The secure and ethical community In today's technology environment where deep integrations, machine learning, and artificial intelligence are becoming the norm, Responsible Technology is more relevant than ever. The security industry has a unique opportunity to set an example for other sectors by promoting a secure and ethical development community that prioritises Responsible Technology, trustworthy data collection, and the protection of human rights. We must all rise to this challenge and embrace our role as ethical leaders for the greater good of both people and societies.
Inadequate security measures on your essential infrastructure can have severe consequences. Consequences Consider the rail industry: If a vandal cuts the cables on a vital mechanism that controls train signals, train safety is jeopardised. To avoid train collisions or derailments and thus significant damage to property and potential loss of life, the operating company must shut down the service until the infrastructure is repaired and the network is up and running again. The disruption affects the rail ecosystem itself, but also the people using the trains, the transportation of cargo, and more. The financial cost of repairing the damage, restoring signal functionality, and compensating for delays can be substantial. For another example, consider electrical substations: A fire or targeted attack can damage the system and lead to devastating power outages. Traditional surveillance limitations Traditional video surveillance has its limits when it comes to protecting transformer stations Traditional video surveillance has its limits when it comes to protecting transformer stations. The facilities are often located in rural areas, where straying animals or flying leaves trigger false alarms. 3D Surveillance solutions overcome these challenges by volumetrically securing the area and immediately detecting intruders only raising the alarm in the event of a human intruder and even identifying drone attacks. Protecting critical infrastructure with 3D surveillance Critical infrastructure must be monitored. It remains at risk if operators do not have systems for monitoring entire areas rather than just the periphery if security personnel has limited information in case of an intrusion and if security response protocols are not automated. 3D Surveillance solutions 3D Surveillance is an important tool for protecting critical infrastructure and ensuring the safety of those who rely on it. Integrating LiDAR technology, 3D Surveillance solutions provide a comprehensive view of the area being monitored with real-time monitoring and response, protecting critical infrastructure from damage and providing a more comprehensive security system. Advanced analytics and artificial intelligence Security personnel can identify and verify threats more easily and track the movements of individuals or vehicles, as well as respond to incidents as they happen. 3D Surveillance systems can be equipped with advanced analytics and artificial intelligence (AI) capabilities to detect patterns and anomalies that may indicate a potential threat. This can help to prevent potential attacks or accidents before they occur, as well as enable more accurate responses to incidents. Talent challenge Turning to autonomy by implementing sensor- and software-based solutions requires fewer if any, in-person patrols 3D Surveillance can also help tackle the talent challenge in the industry: Recruiting security professionals involves extensive background checks, and jobs in the industry are notorious for their low salaries, which results in high staff turnover. Turning to autonomy by implementing sensor- and software-based solutions requires fewer if any, in-person patrols and ensure reliable infrastructure protection. Additional security measures In many countries, more stringent legislation now mandates the implementation of additional security measures to safeguard critical infrastructure, particularly at a country's points of entry, such as airports and harbours. Protecting the perimeter is no longer enough. For instance, airport management must ensure that critical areas, including the space around aircraft and near unauthorised access points, are secure. While multi-layered screening of individuals at the perimeter is a valuable security measure, it must be complemented by smooth and efficient surveillance of the entire area, which can only be achieved through advanced technology. Different adoption rates 3D Surveillance technology is only beginning to gain traction in most locations, and adoption rates differ significantly from one region to another. For instance, Scandinavia and Eastern Europe have embraced 3D Surveillance to a greater extent than Western Europe. Regions with lower adoption rates will likely catch up as they seek to reinforce the security of their critical infrastructure, especially given the conflict in Eastern Europe. Vandalism and damage protection 3D Surveillance enhances the security of critical infrastructure, reduces the risk of downtime and loss of revenue 3D Surveillance offers reliable protection against vandalism and damage - major concerns for companies that rely on critical infrastructure. LiDAR-based, software-enhanced 3D Surveillance solutions provide real-time insights and enable automatic processing of the information so that operators can autonomously and quickly detect and respond to potential threats. These solutions are scalable and customisable, allowing companies to adapt their security measures to their unique needs and changing environments. 3D Surveillance enhances the security of critical infrastructure, reduces the risk of downtime and loss of revenue, and ensures compliance with regulatory requirements. Asset management and maintenance planning Beyond its security benefits, 3D Surveillance can help with tasks such as asset management and maintenance planning. It can help identify potential problems or maintenance needs before they become more serious issues by providing a real-time view of the monitored infrastructure. This can help to reduce downtime and keep critical infrastructure running smoothly. Real-time management The same technology can also perform volume monitoring tasks and thus facilitate the management of valuable resources such as bulk material, grain, wood chips, or chemicals. By scanning the stock 24/7 and automatically calculating stock volume updating records in real-time, this technology supports lean production systems and automated processing.
Security beat
New buzzwords were abundant in the articles that generated the most clicks on our website in 2022. From the metaverse to the Internet of Things, from frictionless access control to artificial intelligence (AI), the topics most popular among our site’s visitors were at the cutting edge of change and innovation in the physical security marketplace. Here is a review of the Top 10 Articles of 2022, based on reader clicks, including links to the original content: Metaverse will promote collaboration and enable more efficiencies for security Metaverse is a familiar buzzword currently, but few people grasp what it means. In the simplest terms, the metaverse is an online “place” where physical, virtual, and augmented realities are shared. The term, Metaverse, suggests a more immersive online environment that combines elements of augmented reality (AR) and virtual reality (VR). For the physical security industry, the looming creation of a complex online environment offers possibilities and challenges. Establishing identity will be a central principle of the metaverse, and various biometrics are at the core of ensuring the identity of someone interacting in the virtual world. Cybersecurity elements are also key. On the benefits side, the security market is already taking advantage of technologies related to the eventual evolution of the metaverse. For example, the industry has deployed AR to provide information about a door lock’s status on a screen, headset, or smart glasses as a patrolling guard walks by. What are the security challenges of the transportation industry? Because transit agencies rely on several IoT devices, they get exposed to higher cybersecurity risks Rapid technological advancement, increasing urbanisation, and the growing expectations of commuters and governments are pressuring transit industry players to modernise. Commuters, urban planners, first responders, and other stakeholders want to use transit data to support their decision-making. Transit agencies’ security and operations teams need closer collaboration to stay ahead. However, for many years, most transit agencies have relied on siloed, proprietary systems. Because transit agencies rely on an ever-growing number of Internet of Things (IoT) devices, they also get exposed to higher cybersecurity risks as there are more network access points to manage. The future is here: ADT’s innovation lab evaluating robots and indoor drones New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the latest technologies’ value to customers and some typical use cases. The ideal use of humanoid robots is to perform jobs that are considered repetitive, dirty, dangerous, and/or mundane. In security, that describes most security guard positions. As the name implies, autonomous indoor drones are focused on flying indoors versus the outdoor environment, which is heavily regulated by the U.S. Federal Aviation Administration (FAA). Flying autonomously indoors not only eliminates FAA oversight but also will enable ADT Commercial to offer another choice to customers to further reduce their dependencies on and costs of human guards. Innovative security: the key to business efficiency, cost savings, and more Organisations have shifted business focus countless times since the onset of the pandemic. While many leaders have been primarily concerned with the immediate health and safety of their customers and employees, 2022 has given rise to a new trend. More than ever, business leaders are seeking security solutions that increase operational efficiency and cost savings as well as improve logistics and business insight. As working environments become more complex, organisations looking to drive higher productivity and profitability margins should consider security upgrades that prioritise integrated analytics and automation. Shoplifting today is more sophisticated, and so are the tools to fight it One tool to fight shoplifting is analytics, which can be used to determine where shrink is occurring Shoplifting is often viewed as petty theft by individuals, but that is not always the case. Overall, shoplifting is becoming more sophisticated and coordinated. Traditional “shoplifting” has two major differences when compared to organised retail crime (ORC). The differences are numbers and motivation. ORC consists of groups working together to monetise theft, very different than an individual taking an item they need. One tool to fight to shoplift is analytics, which can be used to determine where shrink is occurring. Understanding where crimes take place helps retailers make strategic decisions about where to place their loss prevention efforts. Oosto offers 10 reasons to switch to frictionless access control in commercial buildings Access control for buildings is nothing new. It’s only in recent years that the urgency to implement smarter, more efficient, and more convenient forms of access control has increased, in the context of public and private sector digital transformation. Upheavals from the COVID-19 pandemic have forced organisations to re-think, pivot, and invest in new technology solutions that will incorporate Artificial Intelligence (AI) and Machine Learning, to gain speed in their operations, glean actionable insights from their video analytics, and enhance productivity with their teams. Which security trend is here to stay? Technologies and trends in the security marketplace come and go with some regularity. But how can you tell which trends are gaining traction and which amount to “the flavor of the month.” For example, while many physical security departments were hesitant to consider cloud-connected solutions in the past, they now better understand the benefits these solutions bring and how they can help them utilize their resources to achieve business goals while minimising overall operational complexity. Other technologies mentioned in the article include mobile credentials, AI-based analytics, video management systems, cybersecurity, and a new emphasis on data. What do these technology trends have in common? They are opening new possibilities for greater system efficiency and functionality. In short, they are playing a role in transforming our industry. GSX 2022 reflects changing technologies and evolving role of security The role of the security director increasingly will encompass facets of cybersecurity and physical security GSX 2022 in Atlanta highlighted the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge shared on the show floor in the exhibit hall. Consolidation changing the face of the security market Consolidation is a dominant trend in the security marketplace. Large companies typically swallow up smaller companies as a means of expanding both their technology portfolios and their geographic reach. Sometimes a big fish is swallowed up by an even bigger fish. Despite the pandemic and resulting economic challenges, the security market has continued to be a desirable environment for both big players and startups, which then provide abundant acquisition targets for larger companies. This article highlighted recent mergers and acquisition news. Six trends at the intersection of video and AI Video has evolved beyond the capabilities of advanced imaging and performance to include another level: Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise. This is more than a big development for the physical security industry; it is a monumental paradigm shift that is changing how security system models are envisioned, designed, and deployed. Much of the heightened demand for advanced video analytics is being driven by six prevalent industry trends.
Clean, safe mass transit systems benefit everyone. Today’s transit operators face tremendous challenges, including declining revenue due to work-from-home policies, concerns about disease prevention, and high crime environments. Among these concerns, difficulty recruiting and retaining police resources has been exacerbated by the ongoing mental health crisis that disproportionately impacts public transportation networks. Mass transit systems Safe cities require an operational environment where people feel comfortable on mass transit. Sustainable cities are built upon the growth of mass transit systems. Safe cities and mass transit go hand-in-hand. The safety of an urban city is intrinsically linked to the safety of its mass transit systems. Safe cities require an operational environment where people feel comfortable on mass transit For additional insights into the security of transit systems, we spoke with Angela Osborne, Associate Vice President of Risk and Emergency Management Solutions at Guidepost Solutions, who specialises in emergency management planning, security risk assessments, and physical security assessments. Q: How did the COVID pandemic impact the security of transit systems? Angela Osborne: The pandemic had a profound impact on transit system security. Transit systems are already highly susceptible to crime prevention through environmental design (CTPED) issues. Facilities with poor maintenance, lack of active monitoring or incidence response, and low foot traffic all contribute to CTPED issues, and the pandemic only aggravated this. Many regular commuters began remote work, thus leading to less use of transit facilities. Transit centres experienced an uptick in individuals engaging in drug activity, encampments, encounters with mentally disturbed persons, and opportunistic crime. As a result, individuals who maintained their commute became fearful due to safety and public health concerns. Q: How do millions of employees returning to work (after working at home, for example) change the transit security challenges? This has become a reason why individuals are resistant to returning to working onsite Osborne: While employees returning to work has increased foot traffic and the use of transit has provided positive CPTED elements in terms of having additional eyes and ears around, many individuals are stepping back into a risk environment that has significantly changed since these systems were last widely used. Due to the increase of illegal behaviour in transit facilities, criminality has surged across numerous urban areas. Many returning transit users were not prepared to face these changes. This has become a reason why individuals are resistant to returning to working onsite. Q: What role can employers play in keeping commuters safe as they return to the office? Osborne: Organisations need to provide security awareness training focused on transit. At a minimum, they should share safety resources provided by transit authorities. In addition, harassment on transit systems is a persistent issue that should not be overlooked. Organisations need to provide security awareness training focused on transit Organisations cannot assume that everyone is familiar with these elements, taking into consideration that some individuals began employment at the organisation during the pandemic or are recent graduates. Others may not have had to navigate transportation to the office in years. If an organisation is requiring staff to come to an office, the organisation should fulfil its duty by providing training and resources. Q: What other current trends are impacting transit security -- for better or for worse? Osborne: Transit systems are impacted by many serious trends. Transit is a target for terrorists and saboteurs due to the trends of cybersecurity attacks and active assailant targeting. We recently saw how a cyber sabotage event crippled train operations in Germany. Whether the threat actor is a nation-state or non-state actor, many systems have significant cybersecurity vulnerabilities. As more individuals return to the office, more opportunities for targeting arise. In terms of physical threats, most transit systems are simply not equipped to conduct weapons screenings and have difficulty deterring weapons due to legal regulations. Q: What is the biggest missed opportunity when it comes to transit security? By incorporating AI features, systems can leverage an exceptions-based alerting system Osborne: The biggest missed opportunity is leveraging artificial intelligence (AI) advancements for video surveillance. We tend to find that transit systems have a lot of cameras, but systems are rarely monitoring all cameras in real-time due to the high number of cameras present. By incorporating AI features, systems can leverage an exceptions-based alerting system. Many existing cameras have some form of analytics present that can be leveraged to indicate a line cross and alert on motion; however, AI allows for a greater range of options to alert operators to issues. Q: What is the role of technology to ensure a secure transit system? How well does technology, in general, address the need? Osborne: Technology is an important element in securing a transit system. The current challenge is that the use of technology systems is used reactively rather than proactively. For instance, a video surveillance system is usually leveraged after an incident has taken place. Integrating access control systems, intrusion detection and alarms, and video surveillance can provide a much more proactive approach leading to faster detection or system alerts, enabling a safer and more accessible response. Technology can only accomplish this when paired with a response mechanism. Q: How will the practice and impact of transit security change in the next 10 years? One of the big factors will be the ability to recruit and retain transit police or supporting law enforcement Osborne: Most transit systems will need to adapt to a hybrid work approach to right-size their operations and consider greater consolidation to make security resources more sustainable. One of the big factors will be the ability to recruit and retain transit police or supporting law enforcement. This is a challenge for many urban departments and could continue to have ripple effects for mass transit. As more individuals use mass transit and return to some level of pre-pandemic life, people are likely to feel more comfortable on mass transit (pending no follow-on pandemics) with these safeguards in place. Q: What else do transit security professionals need to know? Osborne: I encourage all transit security systems to conduct a threat, risk, and vulnerability assessment to better understand the risk environment. Data is generated across these systems; however, it is often not being collected and leveraged to its fullest capacity to enable informed security and safety decisions. I would also recommend that new transit systems consider full barriers to prevent individuals from deliberately jumping or accidentally falling onto tracks. Although retrofitting stations to include this is difficult, new build stations offer a good opportunity to incorporate safe and secure design from the start.
Operational technology (OT) uses hardware and software to monitor and control physical processes, devices, and infrastructure. Historically, OT systems were not connected to the Internet and were therefore not vulnerable to cyber-threats. Internet of Things (IoT) However, today’s OT systems are increasingly part of a company’s networks as technologies converge and the Internet of Things (IoT) gains prominence. No longer can OT systems be counted on to be “air-gapped,” that is, not connected to other systems. When OT systems are vulnerable, companies face a “cyber-physical risk.” A bad actor could create a catastrophic risk in the physical security world by compromising OT systems. To understand more about OT and the related cybersecurity concerns, we spoke with Lisa Hammill, VP of Commercial Markets for Shift5, a company that applies cybersecurity best practices to OT systems and networks, thus dramatically reducing their cyber risk. Q: What is operational technology (OT)? How are the cybersecurity concerns for OT different than those for information technology (IT) systems? Hammill: Operational technology (OT) refers to the computer systems that underpin critical infrastructure, enabling it to run continuously and reliably. For example, planes and trains rely on OT to execute basic flying or driving commands. OT cybersecurity solutions for planes, trains, or weapon systems must be capable of the basics of IT cyber-hygiene Most OT is built on legacy technology manufactured before cybersecurity became a priority and relies on serial bus networks like MIL-STD 1553, CAN 2.0, or RS-232, instead of the standard TCP/IP communications protocols that IT security solutions can monitor and defend. Any effective OT cybersecurity solution for planes, trains, or weapon systems must be capable of the basics of IT cyber-hygiene, including ensuring signed software and firmware updates, full data capture, and continuous monitoring and detection aboard planes, trains, and weapon systems. This all makes cybersecurity for onboard OT difficult, but not impossible. Q: What is a “cyber-physical risk” and why is the term important? Hammill: Cyber-physical systems integrate digital components into physical objects and infrastructure; we focus on critical infrastructure like transportation as well as weapon systems. Cyber-physical risks manifest when actors intrude on these delicate processes to manipulate real-world outcomes, whether that’s grounding plane flights, or disabling train brakes. The risks of attacks facing OT within cyber-physical systems are highly consequential, can cause disruptions to civil society, economic disruption, and potential harm to citizens, as well as shift the balance of power in military conflict and geo-political matters. Q: Please describe the breadth of the risks when it comes to OT cybersecurity. Hammill: Cyber-physical attacks can jeopardise business and mission-critical operations, and risks are highly consequential when it comes to transportation systems, creating safety risks for operators and passengers, economic impact, and millions in downtime losses, remediation, and ransom payments. Transportation is a particularly vulnerable sector of critical infrastructure. An attacker could leverage a tested playbook to disrupt operations with minimal effort As we’ve seen from recent attacks demonstrating the attackers’ focus is trained on this space. The motivation of an attacker will vary, but for example, let’s say a bad actor wanted to target an aircraft to disrupt service and ground a flight. There have been examples of basic cyber-attacks targeting noncritical aircraft systems; however, many of these systems remain vulnerable. An attacker could leverage a tested playbook to disrupt operations with minimal effort. An attacker could target a system considered least critical to passenger safety systems categorised as a Design Assurance Level E (DAL E) like an in-flight entertainment system. This type of system has been hacked before and could be used as a vector for a ransomware attack. If an attacker takes control of video screens on seatbacks mid-flight, they would certainly damage passenger trust. They would also likely try to move up the design assurance level chain to gain further access. For example, when a plane pulls into a gate, communication between the aircraft and airline operations happens automatically. An attacker could exploit this connection to move from one system to another. If an attacker gets into those communications channels, they could alter data or hold it hostage, while the airline halted operations to resolve the issue. Q: What industries/markets are most vulnerable to OT cybersecurity threats and why? Hammill: Operational technology lacks the historical focus on cybersecurity that IT has, and basic best practices are nascent for OT industry-wide. Cyber-attacks targeting Colonial Pipeline and Florida's water systems (in 2021) have spurred those industries into action to prioritise cyber hygiene. The aviation and rail industries are watching and taking proactive steps to prevent such cyber-attacks. As weapons systems and vehicles on roads, rail lines, and in the air add on new technology, they are at risk of cyber-attacks Shift5 defends planes, trains, and weapon systems because these vehicles leverage a vast swath of distinct serial bus networks and protocols unseen in other critical infrastructure technologies. We have experts creating a tool that can monitor and detect traffic aboard these bespoke networks. And as weapons systems and vehicles on roads, rail lines, and in the air add on new technology, like autonomation, they are increasingly at risk of cyber-attacks. Q: What are the various sources of OT cybersecurity risks (e.g., other governments, individual hackers, criminal organisations, etc.)? Which are the most urgent and/or pervasive? Hammill: Because of their ability to cause deeply consequential impacts on the business, economy, and human safety, OT cybersecurity risks must be considered scrupulously. Attackers targeting OT could have a range of motivations, from financial gain or market advantage through the theft of intellectual property, to insider threats and geopolitical advantage in a contested environment. It’s no secret that most malicious adversaries choose the path of least resistance when developing their attack strategy. When OT is aboard planes, trains, and tanks, we’re only in the early innings of creating obstacles for those actors to overcome. One threat we’re watching closely is the evolution of ransomware targeting OT. Digital extortion could cause operational disruption and impact consumer trust. Q: What is the Shift5 approach to cybersecurity? Hammill: Shift5 extends 40 years of expertise in adversarial tactics, techniques, and procedures from IT endpoint security into the OT world. For the first time in history, operators can apply cybersecurity best practices to OT systems and networks, dramatically reducing their cyber risk. Shift5 allows rail, aerospace, and defense to generate data-informed insights and make accurate decisions Shift5 brings complete observability and threat detection to OT systems as cyber-physical attacks become an increasingly attractive strategy for digital attackers. By providing visibility into the data that powers their most expensive, longest-lived, and most consequential fleet assets, Shift5 allows rail, aerospace, and defense companies to generate data-informed insights and make timely, accurate decisions once considered impossible. Q: Has OT cybersecurity trailed IT cybersecurity in terms of awareness? If so, why is it true, and how can organisations become more aware (and more prepared) of OT cybersecurity risks? Hammill: OT cybersecurity is nascent compared to IT security, but the industry is catching up. While most organisations understand the importance of visibility and observability in IT systems to enable their defense, very few have this same level of oversight for their most expensive, consequential, and longest-lived OT-powered assets. Simple best practices geared towards defending OT can make an adversary’s job more difficult. Start with taking inventory of all OT assets, then move to gain situational awareness so you can develop your baseline for “normal” operations (and can identify any abnormal events), and finally take steps to shore up gaps in cybersecurity. Q: Tell me more about Shift5. Hammill: Shift5 was founded by Josh Lospinoso and Michael Weigand, two of 40 people hand-selected to stand up to U.S. Cyber Command, the nation’s most elite unit of cyber-defenders. There, Mike and Josh became familiar with challenges in defending weapons systems, and the idea for Shift5 was born. Shift5 provides OT cybersecurity and operational intelligence for fleet operators and military platforms Military weapon systems are built on the same OT infrastructure found within planes and trains, and today Shift5 provides OT cybersecurity and operational intelligence for fleet operators and military platforms. Our customers include the DoD, US Army, Air Force, and Navy, and several of the largest U.S. passenger rail and household-name aviation companies. Many of these industries are beginning to seek out partnerships with Shift5; for example, AEI HorizonX, the venture capital investment platform formed between AE Industrial and The Boeing Company, today works with Shift5. Q: What is the biggest misconception when it comes to OT cybersecurity? Hammill: A common misconception is that OT aboard planes, trains, or weapon systems isn’t at risk. Many security experts have implemented air gapping as a cybersecurity strategy to keep cybersecurity threats away from sensitive systems. However, due to the convergence of IT and OT, there are more inroads to OT than ever, and air gapping isn’t as effective. Transportation assets like planes and trains are flying and rolling data centers that produce valuable and useful data, and they need to be protected just as we protect client data or IP. It’s a hard problem to solve, but the stakes are high and attackers are increasingly aiming their attention at this surface area. Modern cybersecurity principles must be extended to the onboard OT networks of aerospace, rail, and defense Amid the war in Ukraine, we saw attackers target the Belarusian Rail System to thwart Russian adversaries, and Russia digitally attacked Viasat to disable this critical piece of infrastructure ahead of a kinetic strike. Digital attacks facing aerospace, rail, and defense targets are on the rise, and modern cybersecurity principles must be extended to their onboard OT networks. Q: How can organisations start to address these challenges? Hammill: Cybersecurity done well is a lot of preventative work, and when we hear no news, that’s often good news. The U.S. government has increased the levels of dialogue around cybersecurity risks facing US critical infrastructure operators and has led by example in sharing information to help critical infrastructure organisations bolster their defenses. I recommend that transportation organisations engage proactively with local FBI field offices or CISA Regional Offices to establish relationships in advance of any cyber-incidents and visit the websites of CISA and the FBI where they will find technical information and other useful resources. They should also take advantage of other resources like TSA, AAR, ICA, and relevant ISACs that have working groups focused on these challenges. I encourage every transportation operator to understand the risks for these large transportation assets through vulnerability assessments, pen testing, and exercises just as they do with their IT environments.
Case studies
As one of the main tourist destinations in the Caribbean, The Bahamas welcomes nearly seven million visitors every year. Unfortunately, the City of Nassau, the capital of the Bahamas, has seen increased crime in certain parts of the city over the last several years from pickpockets and vehicular crimes to armed robberies and kidnappings. Policing, safety, and security Based in Nassau, the Royal Bahamas Police Force (RBPF) employs over 3,000 officers and provides policing, safety, and security services to residents and visitors. However, the RBPF was challenged to keep up with the rising tide of criminal activity. The government fully supported the RBPF’s initiative to expand the country's surveillance system as a strategic tool in the fight against crime. Track and monitor, situational awareness The RBPF added system infrastructure and hundreds of new IP-video cameras to increase police presence" “There are known criminal hotspots across the city that people of interest frequent," said Ethan Munnings, CTIO at Proficient Business Services, Bahamas, and the lead engineer for the City of Nassau video surveillance project. “To curb incidents in those areas and to better track and monitor suspects, gain situational awareness, and to be able to help locate or identify people after leaving the scene, the RBPF added system infrastructure and hundreds of new IP-video cameras to increase police presence. One of those areas, for example, is the surroundings of the house of the Prime Minister.” Milestone video management system In 2011, the city set up its initial Milestone video management system, overseeing around 250 cameras. Later, in 2019, Nassau officials collaborated with Proficient Business Services to integrate almost 500 additional cameras and edge devices into the system. A restructuring of the network infrastructure was required to consolidate all data feeds to the city's Real-Time Crime centre. The new crime centre, located at the police headquarters, opened in February 2021, acting as the Royal Bahamas Police Force's technological epicentre. Innovative technology Integration In early 2020, the Ministry of National Security of the Bahamas began expanding its existing Milestone XProtect video management system. Milestone's open platform data-driven video technology system is compatible with various hardware and software vendors. The upgrade led to redesigning of the network infrastructure and the addition of over 500 high-quality network cameras from Axis Communications. Facial recognition and video analytics ShotSpotter, the gunshot detection system was also integrated into the greatly expanded system The project involved several Milestone technology partners, including system servers from Rasilient Systems, and video analytics applications such as Licence Plate Recognition (LPR) and facial recognition from BriefCam. ShotSpotter, the gunshot detection system from SoundThinking, was also integrated into the greatly expanded system. Artificial intelligence and deep learning Within the Milestone VMS, the cameras and servers integrate with BriefCam’s video analytics, providing facial recognition and person/object tracking. By harnessing the power of artificial intelligence and deep learning, integrated BriefCam technologies transform video data into valuable insights for rapid video review, search, and real-time alerting. Two types of LPR The system also offers two types of Licence Plate Recognition. The first is via the Milestone LPR add-on, and the second is through direct integration with BriefCam. A team of 14 operators relies on Auvik for device monitoring and SolarWinds to manage the core network. The fiber network, with a 10G backbone, is based on Cisco technologies. Traffic safety revolutionised Video technology was pivotal in this endeavor, with fatal accidents in New Providence dropping to 33 in 2019 Beyond enhancing security, Nassau's updated city video system has proved instrumental in monitoring traffic accidents and holding drivers responsible for their behaviour. Eyewitness News from Nassau reported 69 deaths related to traffic in 2018. After witnessing an almost 30 percent surge in fatalities from 2017 to 2018, authorities committed to reducing traffic-related deaths and accidents. Video technology was pivotal in this endeavour, with fatal accidents in New Providence dropping to 33 in 2019. Traffic surveillance “The cameras we have strategically installed on traffic lights around the city use LPR integrated with Milestone Systems, which have helped control hit-and-run accidents,” said Munnings. “There have been cases of pedestrians being hit by vehicles that didn’t stop; now the police can track those vehicles and bring those drivers to justice. The new surveillance system has also helped prevent human abductions.” Technology and innovation For more than 12 years, the City of Nassau has been relying on and expanding the capabilities of its video surveillance system. With the help of technologies and deep integration within an open platform VMS ecosystem, the city's authorities and police have effectively addressed evolving challenges to ensure safety for both residents and tourists. “Technology and innovation have taken off at the speed of light and this will only accelerate. Embracing the innovations that improve police work is no longer optional," said Zhivago Dames, Assistant Commis.
Sandwell Aquatics Centre in Smethwick is a state-of-the-art leisure centre that originated as a purpose-built arena for the 2022 Commonwealth Games in Birmingham. The facility played host to the highest number of medal events compared to any other, showcasing both swimming and diving competitions. The newly constructed complex included a competition pool for swimming and diving, a temporary pool for swimming and para-swimming warm-up, and an area dedicated to dry-dive training. Reclaiming the space Following its key role in the games, the original structure was reconfigured so it could be used by the local community from the summer of 2023 onwards. The 4000 temporary seats have been removed and fresh facilities tailored for community use have replaced them. The leisure hub boasts a gym with over 100 stations, a specialised ladies-only gym with 25+ stations, along with amenities such as a sauna, steam room, football pitch, two 4-court sports halls, three exercise studios, an indoor cycling studio, and a trio of swimming pools. Plant noise assessment The anticipated noise levels generated by various mechanical components within the plant room In the proposal documents, Mach Acoustics included two detailed acoustic reports – one addressing operational noise and the other focusing on plant noise. The plant noise assessment specifically outlined the anticipated noise levels generated by various mechanical components within the plant room, which includes several pumps and air handling units. Acoustic barrier with integrated louvre The acoustician's initial recommendation proposed an acoustic barrier with integrated louvre features to ensure adequate airflow while mitigating noise. However, a subsequent design amendment specified a solid acoustic barrier with slatted top sections to maintain airflow and enhance aesthetics. Additionally, steel louvre doors were specified for access. Absorptive acoustic barriers These barriers effectively reduce noise pollution originating from mechanical plant areas It has become standard practice to install absorptive acoustic barriers around new and renovated leisure centres. These barriers effectively reduce noise pollution originating from mechanical plant areas and operational compounds. It's not uncommon for heat pumps and air conditioning units to produce a continuous low-level hum or buzzing noise, which can disrupt neighbouring properties and create an unpleasant auditory environment for facility members and visitors alike. Game-changing solutions With prior experience in similar acoustic installations for aquatic and leisure centres, Jacksons Fencing successfully secured a subcontractor contract with Wates. They designed, manufactured, and installed customised acoustic fencing and gates across three elevations: The first elevation covered 16.5m and featured 2.8m high Jakoustic Reflective panels with 2.1m high timber slats above. The second elevation spanned 11m, incorporating 3.2m high Jakoustic Reflective panels with 2.1m high timber slats above, 9.64m of 5.3m high panels, and 11.3m of 3.2m high panels with 2.1m high timber slats. The third elevation extended 16.5m and used 3.2m high Jakoustic Reflective panels with 2.1m high timber slats above. Benefits of solid acoustic barriers These barriers offer an appealing noise reduction solution that conceals machinery and serves as a robust security barrier The different heights of the solid acoustic barriers were strategically chosen to benefit noise reduction, with timber slats enhancing aesthetics and airflow. The project also included matching double-leaf acoustic gates for access. In the first elevation, two apertures were left for steel louvre panels. The acoustic barriers, mounted on galvanised steel posts, were constructed from tongue and groove boards with a deep V profile, tightly slotting together to reflect noise by up to 28dB. These barriers not only offer an appealing noise reduction solution that conceals machinery but also serve as a robust security barrier, devoid of footholds and challenging to scale. Tailored security solutions Peter Jackson, Managing Director, of Jacksons Fencing says, “The Sandwell Aquatics Centre serves as a remarkable example of how facilities can undergo effective reconfiguration to align with their new objectives to ensure they are being utilised effectively." "This project showcases our team's dedication to tailoring security solutions precisely to the task at hand, achieved through the customisation of acoustic fencing. The outcome not only exudes a sleek and sophisticated appearance but also fulfils its vital function. Coupled with a reliable 25-year guarantee, this acoustic fencing ensures enduring noise reduction, cost efficiency, and sustainability.”
Like most stadiums worldwide, the Alsancak Mustafa Denizli Stadium suffers from vandalism and riots by individual fans. To be able to better identify and track perpetrators and thus reduce financial and non-material damage, the operator opted for a video security solution from the German manufacturer Dallmeier. The Alsancak Mustafa DenizIi Stadium in Izmir–named after former Turkish football player and current football coach Mustafa Denizli–is a multipurpose stadium that mainly hosts football matches. With over 15,000 seats, it is one of the medium-sized stadiums in Türkiye. Originally built in 1929, it was demolished in 2015 and reopened after reconstruction in November 2021. Up to 15% fewer spectators due to riots Outcomes have been painful, ranging from classic fines to the closure of an entire block of viewers In Türkiye, stadiums are usually owned by the Ministry of Sport, which then grants the rights of use to an operator. In the case of the Alsancak stadium, the operator is “Altay Izmir”, an Izmir-based football club that currently plays in Türkiye’s top professional league. The club, like so many other football stadiums, has had its fair share of repeated incidents and threats to spectators and players. These have included verbal abuse and even the throwing of objects onto the pitch. In addition to the intangible damage to the image, the consequences have been painful, ranging from traditional fines to the closure of an entire block of spectators–a loss of 1,000 to 2,000 spectators per home game, and that on a regular basis. How is image quality defined to recognise perpetrators? Under these conditions, the operators were looking for a solution that would allow them to reliably detect and track potential offenders. The tender specified a minimum resolution density of 144 pixels per metre (px/m), which is also required by law. This means that there must be at least 144 pixels in the camera image to represent every metre of “reality” in the stands. This value is between the “recognition” (125 px/m) and “identification” (250 px/m) qualities specified in the IEC EN 62676-4 standard for video surveillance systems. Only ten cameras to monitor the stands The Ministry of Sports decided to invite various manufacturers to a comparative test To find the most suitable solution for the Alsancak Stadium, the Ministry of Sports decided to invite various manufacturers to a comparative test. After receiving the proofs of concept (PoCs) of several companies, the owner chose a solution from the German manufacturer Dallmeier Electronic. In addition to around 140 single-sensor cameras for corridors, outdoor areas and entrances, only ten “Panomera®” multifocal sensor systems are required for the particularly critical grandstand surveillance. 39% more resolution than required The low number of camera systems required for grandstand surveillance is due to the patented multifocal sensor technology: Panomera® cameras combine the images from up to seven detail sensors and one overview sensor in a single camera system. This provides the user with a high-resolution overview of the entire area to be monitored, which acts as a single image of a vast environment. Within this overall picture, system operators can now open any number of detail views at the same time, while the overall scene is always available in high resolution–even during recording, which is essential for possible prosecution. This provides an optimal overview of the situation and ensures that all events can be followed in real-time, in high resolution and in detail. Thanks to this technology, a minimum of 200 px/m is now available throughout the Alsancak stadium instead of the required 144 px/m – 39 percent more than originally required. No surprises: Remote “FAT” and training from Dallmeier Türkiye Due to the COVID-19 pandemic, the stadium's technicians were unable to travel to Dallmeier's headquarters in Regensburg, Germany, to commission the system and attend classroom training. For this reason, the so-called Dallmeier Factory Acceptance Test (FAT) took place online. The entire system was set up, configured and remotely accepted in the FAT centre in Regensburg. The training of the technicians and operators was carried out by Dallmeier Türkiye experts on-site The training of the technicians and operators was carried out by Dallmeier Türkiye experts on site. Serkan Atalar, CEO of RESA Construction Electromechanical Inc. Co, the installer company that implemented the project, is very pleased: “Dallmeier's sincere and collaborative approach, as well as the high-tech products and after-sale support they offered were very impressive. We thank Dallmeier Türkiye for the great cooperation.” Author's quote “The customer is very satisfied with the Panomera® systems. The benefits are equivalent to combining a powerful megapixel camera with any number of high-resolution 'virtual' PTZ cameras. At the same time, the systems reduce the total cost of ownership for infrastructure, cables, masts, screens, workstations, etc.,” Serkan Atalar summarises. “Alsancak Stadium only needs three system operators with one monitor each. They also have two workstations for the police and management. The solution always gives them 100% control of the security situation in the stadium, allowing them to react immediately and reliably track down perpetrators. And all this at a low total cost of ownership and with minimal manpower thanks to the unique multifocal sensor technology.”
Quanergy Solutions, Inc., a provider of 3D LiDAR (Light Detection and Ranging) solutions for highly dynamic environments, has successfully partnered with a prominent social media provider to effectively optimise the organisation’s use of space across campuses for enhanced productivity and improved employee experience. Improve space utilisation The social media giant faced the critical need to improve space utilisation across their campuses, which comprised of numerous conference rooms, cafeterias, and other general-purpose areas. Existing legacy solutions proved unreliable in these complex environments, failing to provide the desired level of accuracy while compromising employee privacy. Q-Track Q-Track ensures that employees’ privacy is protected while enabling the sensors to track individuals seamlessly To overcome these limitations, Quanergy leverages their seamlessly integrated solution that combines long-range 3D LiDAR sensors with advanced perception software. Quanergy’s solution provides extensive coverage across the diverse campus environments, accommodating both large and small rooms with various occlusions, such as tables, chairs, cabinets, columns, and pillars. With a unique object stitching mechanism, Q-Track ensures that employees’ privacy is protected while enabling the sensors to track individuals seamlessly, even when temporarily obscured from view. Hyper-accurate detection, tracking Quanergy’s solution resulted in the hyper-accurate detection, tracking, and classification of employees without compromising privacy or capturing any Personal Identifiable Information (PII). Through the use of occupancy related insights, the social media giant can optimise the use of available areas and achieve enhanced productivity among its workforce. The result is a comprehensive solution that outperforms traditional camera-based solutions and dramatically lowers total cost of ownership. 3-D LiDAR solutions Quanergy’s success in optimising space utilisation for the social media giant showcases the transformative potential of 3-D LiDAR technology in smart spaces. With its privacy-preserving capabilities and accurate tracking, Quanergy 3-D LiDAR solutions are already the preferred solution at over 100 global locations providing security for critical infrastructure such as data centres, utility plants, and airports, as well as for safe cities, and industrial automation.
Gunnebo Entrance Control solutions have been installed at travel software and technology specialist Sabre’s remodelled office in Uruguay, to ensure the safety and well-being of its employees, clients and visitors. As a global technology company serving the travel industry, Sabre’s innovative software has revolutionised the way personalised travel experiences can be delivered, pioneering to an increasingly digital and interconnected world. Entrance control requirements With its visionary approach and dedication to customer success, its base in Uruguay is currently home to over 800 staff. To help Sabre meet its entrance control requirements, Gunnebo was invited to work with Abelenda Hermanos as a security system supplier to design and install a comprehensive solution, created to optimise access control whilst maintaining a seamless flow of people. Author's quote By proactively working with Gunnebo Entrance Control we were able to design a system" Says Natalie Sarmiento, Sabre Security & Safety Manager: “Our vision is always to connect people with travel experiences that matter most. And in doing so, our team is the most important part of our business to think differently and make this happen for our customers. We needed to ensure their security on-site in our remodelled office in Uruguay, with the highest standards." She adds, “By proactively working with Gunnebo Entrance Control we were able to design a system that easily blended with its surroundings, while coexisting with the welcoming environment we wanted to create for our employees and our guests. This is something that flows throughout our offices and has been received well by all on site.” Gunnebo's entrance control solutions Gunnebo Entrance Control worked closely with Sabre to create a bespoke entrance control solution, incorporating its latest sleek design SpeedStile FP 1200 EV speed gates, finished in full stainless steel grade 304, to operate six lanes in place. By implementing Gunnebo's entrance control solutions, Sabre has significantly enhanced security measures, reducing the risk of unauthorised access without compromising on speed or aesthetic design. Gunnebo SpeedStile system Real benefit of working with the Gunnebo SpeedStile system is the focus on ease of installation" Says Omar Ferrero, Director at Abelenda Hermanos: “It was an absolute pleasure to work with Sabre and install entrance control for the benefit of its staff and guests. The real benefit of working with the Gunnebo SpeedStile system is the focus on ease of installation, together with its use of advanced technology to balance speed, security and design. The finish is stylish and maintains the highest level of safety for all who work and visit the new facilities.” Gunnebo's SpeedStile FP 1200 EV system enhances security and optimises the flow of people in office environments. The system's high throughput capability ensures efficient traffic management, allowing for swift and smooth access for authorised individuals. Customised security solutions Equipped with intelligent sensors, it provides accurate and reliable entrance control, effectively preventing tailgating. Additionally, the system's customisable design options enable integration with the surrounding architecture, enhancing the aesthetic appeal of the new headquarters. Thomas Axelson, Gunnebo Partner Network Manager – LATAM concluded: “The successful installation of Gunnebo’s entrance control solutions at Sabre’s offices in Uruguay highlights our capability to deliver customised security solutions. We will work with our clients and installers right from the initial design stage to project completion to deliver a solution that presents the highest level of security whilst maintaining a welcoming feel. We are thrilled with the results and proud to support Sabre as they continue their mission to make travel happen across the globe.”
Overview The largest city in the United Arab Emirates, is the epitome of a city where progress meets tradition. Since the inauguration of the 21st century, the city has rapidly grown, with iconic landmarks and business centres populating it. Known befittingly as the Global City, it is the most populous Emirate, and is home to 35,32,000 people as of 2022. As a part of the city’s metamorphosis into one of the prime international destinations, the visionary leaders of the city have developed a progressive transit system with a well-maintained roadway framework, ensuring seamless connectivity within the city’s perimeters. A significant part of ensuring a hassle-free commute in the city is the installation of an RFID-based electronic toll road system, enabling a continuous flow of traffic through toll gates. The challenge Government body had equipped the gantries with a network of cameras with the vision to surveil While the city has a top-notch public transit system, whose efficiency has been magnified with the automated toll system installed at the gantries, the government body of the city is cognizant of the fact that the security of the citizens is paramount. To complement its modern toll system, the city needed a surveillance system to ensure safety. Considering this, almost a decade earlier, the government body had equipped the gantries with a network of cameras with the vision to surveil the traffic conditions and vehicle movement in the area. Video surveillance solution However, the existing surveillance solution, with its limited surveillance and low-resolution video feeds, fell short of the city’s requirements. The inadequate data storage capacity further augmented the issue, often causing slow investigations of critical scenarios. As a result, the city decided to undertake a major security upgrade by demanding a video surveillance solution that is resilient, scalable, and has proven expertise in monitoring the traffic of urban landscapes. Further, with the rapid increase in traffic density, it became pertinent for the city to deploy a surveillance solution that empowers operators located across the city to be able to not only access surveillance data round the clock but also provide them a framework to communicate and collaborate interdepartmentally, adding another layer of security to the schema. The solution Videonetics and Vantage Security collaborated to design an intelligent and surveillance solution In an effort to enhance security measures at toll gantries, decision-makers recognised the opportunity to upgrade the surveillance solution. They sought a system that would not only enable effective communication but also proactively monitor traffic across toll gantries. The industry’s pioneering brands, Videonetics and Vantage Security collaborated to design an intelligent and scalable surveillance solution to keep watchful eyes at toll gantries. The technology partnership between these companies resulted in a bespoke and modular AI-powered unified solution that encompassed an intelligent video management system (VMS) and ultra-high-definition network cameras. Key points of solution Advanced Surveillance Solution for Toll Gantries: The city’s government transport officials required an intelligent surveillance solution that could adapt to future needs and accommodate the city's growing number of vehicles. They prioritised an open platform that could support additional capabilities and applications over time. After a rigorous evaluation process, Videonetics and Vantage Security were chosen for the project. Sixteen toll gantries in the city are equipped with Vantage Ultra high-definition cameras, managed by Videonetics IVMS 3.0. This integrated solution provides 24/7 monitoring through a user-friendly interface and ensures easy accessibility to video data for operators and senior authorities. Enhanced Traffic Monitoring and Incident Recording: The implemented solution empowers control centre operators to monitor traffic activity, maintain traffic flow, and capture any adverse events occurring at toll gantries. The adaptive interface allows dynamic monitoring with swift navigation through the system using a map-based interface. Operators can simultaneously view live and recorded videos on a single display panel, ensuring no critical event is missed and investigations are expedited. The platform's data recovery framework with failover and redundancy features ensures uninterrupted access to critical information, even during unforeseen calamities. Streamlined Collaboration and Rapid Investigations: The unified surveillance solution offers significant advantages in investigations, streamlining the process and accelerating outcomes. Previously, investigators had to sift through extensive video data in separate systems to identify relevant information and suspects. With the platform's unified view, investigators can expedite their work by easily accessing all required data in one place. Additionally, the built-in chat engine facilitates seamless communication among active operators, allowing them to share camera views, events, and screen layouts. This feature enables effective collaboration and enhances the speed and efficiency of investigations. By implementing this advanced surveillance solution, the city’s toll gantries have significantly improved security measures while ensuring scalability and adaptability for future needs. The collaborative efforts of Videonetics and Vantage Security have resulted in an integrated system that enhances traffic monitoring, incident recording, and investigative capabilities, setting a new standard for toll gantry surveillance. The impact This case study examines the remarkable outcomes achieved through this technology The implementation of Videonetics and Vantage Security's unified solution has had a transformative impact on traffic monitoring at toll gantries. This case study examines the remarkable outcomes achieved through this technology, including real-time information for authorities, enhanced security levels, expedited investigations, improved response efficiency, and a more secure and efficient driving experience for residents and commuters. "Partnering with Videonetics to develop a unified solution for the city has been an enlightening and rich experience. With their dedication to continuous innovation and improvement, they have curated an Intelligent Video Management Solution, that, in combination with our powerful cameras, is primed to transform traffic management and surveillance in the one of the wealthiest cities of UAE," Prateek Verma, Sales Director-MEA Region, Vantage Integrated Security Solutions. Key points of impact Real-Time Traffic Monitoring and Enhanced Security: The unified solution provides authorities with real-time information on the traffic situation near toll gantries, enabling easy monitoring and management. By leveraging ultra-HD cameras with wider coverage and sharp details, the overall security level of toll gantries has significantly improved. Round-the-clock monitoring ensures prompt detection and response to potential security threats or incidents. The solution empowers authorities to take proactive measures and ensures a safer environment for all road users. Expedited Investigations and Improved Response Efficiency: The implementation of the unified solution has expedited investigations into incidents, leading to heightened situational awareness and improved response efficiency. Investigators can now access a unified view of all video data, eliminating the need to retrieve information from separate systems. This streamlined process enables quicker analysis of incidents, allowing authorities to take necessary actions promptly. The solution enhances the accuracy and efficiency of investigations, resulting in improved safety and security outcomes. Secure and Efficient Driving Experience: With live visualisation capabilities, operators can identify potential threats or emergencies and respond promptly. The advanced surveillance technology provides a more secure and efficient driving experience for residents and commuters. The presence of the unified solution reassures road users that their safety is prioritised, instilling confidence in the overall transportation infrastructure. The solution's capabilities contribute to smoother traffic flow, reducing congestion, and enhancing the overall driving experience. Future-proof Investment through Flexibility and Scalability: The open and modular architecture of the solution enables seamless integration of additional sub-systems and applications, making traffic management even more robust. Its flexibility and scalability ensure that the surveillance system can adapt to future requirements and technological advancements, making it a future-proof investment for the authorities. The solution can evolve alongside the city's growth and changing traffic patterns, providing long-term value and sustainability. The implementation of the unified surveillance solution has revolutionised traffic monitoring at toll gantries of the city. The outcomes include real-time information for authorities, enhanced security levels, expedited investigations, improved response efficiency, and an overall secure and efficient driving experience. With its future-proof design, the solution ensures that the city’s toll gantries are equipped with advanced technology to meet evolving needs and ensure the safety of road users.
Round table discussion
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
In the United States, they are called licence plate recognition (LPR) systems. In Europe, the more common term is automated licence number-plate recognition (ANPR). In either case, the systems provide capabilities that can benefit a range of applications from schools to municipalities to parking lots. Newer technologies can even identify vehicle colour, type, make and model. We asked this week’s Expert Panel Roundtable: What's new with licence plate recognition (LPR) and/or automated number-plate recognition (ANPR) systems?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Products
Videos
Office surveillance: Manufacturers & Suppliers
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download