Railway security
Matrix Comsec, a pioneer in Security and Telecom solutions, distinguished itself as a standout participant at the 5th Rail Analysis Innovation and Excellence Summit held in New Delhi. The event, hosted at Hotel Le Meridien, New Delhi, on January 30, 2024, provided an invaluable platform for Matrix to showcase its extensive portfolio of advanced security products and bespoke solutions engineered for the dynamic landscape of the Indian Railways sector. Robust data protection Among the highligh...
Matrix is excited to present its array of security products and solutions at Booth No. 2, Hotel Le Méridien, New Delhi, during the 5th Rail Analysis Innovation and Excellence Summit. RDSO 6.0-compliant cameras Matrix is the first Indian company to offer RDSO 6.0-compliant cameras for Indian Railways. Matrix cameras are certified by STQC, Delhi lab for following the OWASP ASVS 4.0 L2 norms mandated by RDSO for cybersecurity. IP Video Surveillance solutions Matri...
From 10 to 13 October, the global airport community will gather for the 24th edition of inter airport Europe at the Munich Trade Fair Centre in Germany. The event returns with an impressive line-up of well over 400 airport suppliers from 37 countries, including seven national pavilions and more than 100 new exhibitors. Live exhibits Visitors can look forward to plenty of live exhibits in the halls and Outdoor Area and a new 600 square metre GSE Experience Area. An exciting event programme in...
ISS (Intelligent Security Systems), a global provider of video intelligence and data awareness solutions, announced that industry veterans Dennis Connor and Jason Lloyd have joined the company as its new Director of Program Management NA and Regional Business Manager for the Midwest respectively. Dennis Connor's responsibilities Connor, who most recently served as Program/Project Manager for CX (customer experience) Initiatives at ADT, will spearhead the development of new end-user and p...
The Security Industry Association (SIA) has launched a new learning management system (LMS) – SIAcademy as part of its efforts to advance industry professionalism through premier education and training. SIAcademy SIAcademy is a living library of on-demand training and professional development programmes designed to enhance security professionals’ industry knowledge, technical skills, and overall job performance. The new LMS offers a modern, simple, and centralised p...
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming...
News
Dahua's latest DSS Pro V8.3 enhancement equips security personnel with advanced tools, enabling them to rapidly identify and monitor suspicious individuals' movements in just seconds. It is a cutting-edge Video Management Software (VMS) security solution designed for efficiency and scalability. It leverages users' video security systems to help them make informed decisions quickly and serves as the backbone of the operation. AcuPick Technology The key upgrades primarily focus on integrating Dahua's advanced algorithm, AcuPick Technology, which helps investigators save time in searching for and identifying people of interest. The feature also supports multiple user logins with specific permissions for up to 200 individuals simultaneously. Remote-control capability The company predicts that this upgrade will foster digital transformation across various sectors Another feature is the remote-control capability, which enables security staff to monitor and track events from anywhere, whether they are on the move or at home. The company predicts that this upgrade will foster digital transformation across various sectors and empower stakeholders from retail, residential, and other sectors to become more digital and efficient. Integrated Search Algorithm Traditional security methods demand frame-by-frame analysis of hours of video footage. With AcuPick, all searchable targets can be scanned instantly. The search algorithm breaks up people and vehicle objects into feature values that are sent to the DSS platform for processing. DSS saves these feature values to its database and finds the target object by comparing the feature values. Streamlines the user experience Even without clear details, security staff can find and track a person or vehicle of interest using a single reference image. Upon selecting a person, individuals will instantly see a history of each appearance on all AcuPick-enabled cameras throughout the premises. DSS Pro 8.3 streamlines the user experience, eliminating the need for lengthy training sessions. The process is as simple as installing AcuPick, selecting the target, viewing the desired thumbnails, and receiving video feedback instantly. Enhanced Workflow This allows users to easily see personal assignments for each door and personnel situation DSS Pro V8.3 also introduces a clearer assignment system, simplifying the entire workflow. The workflow is divided into three groups – staff assignment, safeguarding doors, and the routes connecting the two. This allows users to easily see personal assignments for each door and personnel situation. Visualised and intuitive dashboard The company has improved its user interface to offer a more visualised and intuitive dashboard. This upgraded feature provides a comprehensive overview of peak times, equipment status, and other vital information, making it easier for stakeholders to manage their security systems. Existing stakeholders enjoy these updates free of charge. While clients are required to purchase their servers for data storage, data transfer during a DSS Pro upgrade is an additional cost.
Allegion U.S., a provider of security products and solutions, unveiled the results of a new multifamily living trends survey that provides insight into the preferences and expectations of the current renters. New technologies, amenities The report, “2023 Multifamily Living Trends: A Study on What Multifamily Renters Desire, Expect and Will Pay More For in Their Residences,” analyses input from over 1,000 survey respondents who currently rent or own multifamily residences or plan to in the next two years. Beyond the value of safety, residents’ peace of mind, and the rise of mobile access control, the survey shows how COVID-19 and the influx in Proptech have accelerated the adoption of new technologies and amenities designed to enhance the lifestyles of current renters. The changing multifamily landscape Increased adoption of smart home technology, re-prioritisation of amenities, and new preferences In 2019, Allegion conducted a similar study, providing a benchmark for living trends among millennial renters. Over the last four years, the multifamily landscape has changed in significant ways both for renters and property owners, alike: the increased adoption of smart home technology, re-prioritisation of amenities, and new preferences in leasing and communication are evident. Impact of Proptech adoption, lifestyle changes “Multifamily has always been a dynamic market as a result of changing lifestyle behaviours and introduction of new property technologies,” said Connie Alexander, senior manager for primary research & insights at Allegion. “Our research reveals that we are witnessing the impact of Proptech adoption and lifestyle changes following the pandemic. Property owners need to take note of these shifts to best allocate short- and long-term investments in their properties that will help attract and retain quality residents.” Key trends and challenges The key trends and challenges examined in the report are outlined below: 1) Impact of Proptech on Multifamily Residences - In 2021, $24.3B was invested into Proptech companies globally, with a focus on the multifamily market. Proptech can help attract responsible, high-quality residents and provide enhanced and safer cross-property amenities, lower operating costs and increase revenue. 61% of survey respondents said they are comfortable using Proptech. Smart locks, resident portals, and cameras were included in these preferences. According to the survey results, 51% of renters who make more than $100,000 per year view smart home technology as a need-to-have amenity and 48% of those same renters view Proptech as a must-have. More than one in two respondents would be willing to pay one to 10% more for property technology and nearly three in 10 would pay at least 11% more. 2) The Rise of Mobile Access Control - With most of the population having access to smartphones the rise of mobile access control provides renters with a convenient and secure way to access different parts of their multifamily property. Over 59% of respondents would likely select a future place of residence if it had mobile access control offered as an amenity. Compared to the 2019 study, there was an 82% increase (to 34% from 19%) in the number of respondents who would be willing to pay more for mobile access control that would allow them to remotely monitor entry of their home and give access to guests and others. 3) Amenities That Attract Based on New Behaviours - COVID-19 had a profound and lasting effect on consumer behaviour and lifestyles. Multifamily residents are no different. According to Pew Research, 70% of individuals will continue with the at-home habits they adopted during the pandemic. When asked about considerations for a future place of residence, respondents ranked free Wi-Fi as the most important amenity, behind affordability and proximity to work and school. Among those working remotely (15% remote, 20% hybrid work lifestyles among respondents), fast and reliable Wi-Fi is the most important factor when looking for a place of residence. Home security systems, smart home technologies, and upgraded building materials ranked more important overall than fitness centres and pools. 4) Value of Safety and Resident Peace of Mind - According to the 2021 World Risk Poll by the LP Foundation, 37% of people in the U.S. feel less safe than they did just three years ago. Fewer than one in three respondents feel secure in all areas of their home, and about one in five do not feel secure in the basement, living room, and/or patio. Up to 140% from 2019, 22% of respondents currently use electronic door locks that are connected to the internet. And up 91% from 2019, 23% of respondents currently use electronic door locks that are not connected to the internet. More than one in three respondents would be willing to pay more for smart doorbells with video, outdoor cameras, and mobile access control. Six in 10 would pay between one and 10% more per month for these added security features. Only 19% of respondents are comfortable giving their family and friends access codes or keys to their unit. However, 47% are comfortable hiding keys to their apartment around the exterior of their home in the event they get locked out. 5) Leasing Preferences That Convert - A survey released from the National Apartment Association’s Apartmentalise 2022 conference found over 60% of property managers cite creating efficient day-to-day operations as one of their top three challenges. Efficient communication with prospective and current residents can enable a positive ROI and a differentiating experience for renters that results in increased attraction and retention. 16% of respondents noted inattentive property management as a top three dealbreaker when considering a future place of residence. More than three in four respondents are at least somewhat comfortable with all four self-guided tour scenarios below, and less than 10% are either somewhat or very uncomfortable with them. Take a self-guided tour that allows users to freely explore a community. Take a self-guided tour with detailed instructions on what users can explore. Living in a community that allows potential tenants to explore the area on a self-guided tour. Taking a self-guided tour and having the ability to immediately sign a lease before leaving. According to the survey, residents with incomes of over $100,000 per year are statistically more comfortable navigating self-guided tours and signing a lease directly following. When asked how valuable different amenities were in a future residence, a streamlined resident portal app was ranked number one with 39% of respondents saying it was a must-have and 50% a nice-to-have.
Teledyne FLIR, part of Teledyne Technologies Incorporated announced the release of its new FLIR FC-Series AI, the latest model in its signature fixed camera (FC) series. The FC-Series AI is a thermal security camera with onboard AI analytics that accurately classifies humans and vehicles for early intrusion detection for perimeter protection and remote site monitoring. FC-Series AI With video analytics that combine deep neural network (DNN)- and motion-based analytics, the FC-Series AI offers industry-pioneering intrusion detection, enabling users to expand situational awareness and make better-informed decisions that increase safety and improve coordination and efficiency. Featuring a premium thermal sensor with 640 × 512 full resolution, the FC-Series AI camera creates images based on the heat emitted by humans and objects, rather than relying solely on visible light. Thermal security camera features FC-Series AI enables security operators to see and detect intruders, even in complete darkness, rain, fog, and smoke The thermal imager supports an industry-pioneering thermal sensitivity of <25 milliKelvin (mK), one of the best Noise Equivalent Temperature Difference (NETD) values on the market, enabling the sensor to outperform other thermal cameras whose visibility and detection rates decrease in adverse conditions. Offering eight, high-performance lenses ranging from an 8.6° × 6.6° to a 90° × 69° field of view, the FC-Series AI enables security operators to see and detect intruders, even in complete darkness, rain, fog, and smoke. DNN- and motion-based video analytics The FC-Series AI also combines DNN- and motion-based video analytics for reliable detection, empowering security managers to differentiate between true threats and nuisance alarms. Using FLIR’s curated library of thousands of thermal images, FLIR DNN analytics are trained to classify objects in real-world situations where humans or vehicles may be slightly obscured or challenging to identify or if an intruder attempts to deceive the system. The FC-Series AI also offers target geolocation capabilities and precise handoff to a pan-tilt-zoom device for streamlined target tracking. Perimeter protection, cybersecure solution FC-Series AI camera offers security professionals a high-performing, dependable, and cybersecure solution" “Our new FC-Series AI cameras elevate the possibilities for customers to tighten their perimeter protection strategy,” said Seetha Sasikala, Global Product Solutions Manager at Teledyne FLIR. “Combining DNN- and motion detection-based analytics, industry-pioneering thermal sensitivity, and the widest range of high-performance lenses on the market, the FC-Series AI camera offers security professionals a high-performing, dependable and cybersecure solution for intrusion detection.” NDAA-compliant, IK-10 rated device Designed to maximise the performance of new and existing multilayered physical security systems, the FC-Series AI camera tightly integrates with FLIR UVMS, as well as other third-party video management systems, and is supported by FLIR Nexus software. As an NDAA-compliant device, the FC-Series AI camera offers security professionals extensive cyber protection and peace of mind. With rugged, weatherproof IP66 and IP67 and vandal-proof IK10 ratings, the FC-Series AI provides durable housing.
Integrated Access Control and Security manufacturer TDSi announces it will be showcasing its GARDiS Platform and talking about its new GARDiSVU VMS solution on Stand 2-B28 at Intersec Saudi Arabia 2023, which takes place from 3rd-5th October at the Riyadh International Convention & Exhibition Center. Integrated security systems Managing Director John Davies commented, “We are delighted to announce our forthcoming appearance at Intersec Saudi Arabia at the beginning of October. This will be our first appearance at the show since the pandemic but follows up on several connections and conversations that we started back in June when we held our Security Technology Showcases in both Riyadh and Dammam." "TDSi has been selling products in Saudi Arabia since the 1990s and customers have benefitted from our integrated security systems on many different projects, but this event is the perfect opportunity to see our latest GARDiS products and to learn more about the exciting possibilities they offer.” Vision 2030 projects Vision 2030 projects is an initiative in the Kingdom that is implementing reforms in the public sector A key focus for TDSi at Intersec Saudi Arabia will also be how it can help customers with its Vision 2030 projects, an initiative in the Kingdom that is implementing unprecedented reforms in the public sector, the economy, and society as a whole. In early 2023, TDSi’s International Business Development Director Phil Tennent attended a UK Department of International Trade event focusing on Security Technology and had the opportunity to talk to many companies in Saudi Arabia regarding their Vision 2030 projects. GARDiS and GARDiSVU TDSi’s GARDiS ecosystem of access control software and hardware systems delivers a highly scalable cloud-based solution that utilises wireless technology for ease of installation and use. It is perfect for any secure access control application, including Access Control as a Service. (ACaaS). The recently launched GARDiSVU video management solution, TDSi’s first hybrid-cloud-based CCTV offering, synchronises directly with and complements the GARDiS range, providing customers with a complete solution. Vision 2030 projects John added, “The GARDiS range is the ideal solution for the exciting Vision 2030 projects that are driving the Saudi Arabia security market." "Intersec Saudi Arabia is a great opportunity to see the GARDiS range in person and to meet our expert team who will be available to discuss specific projects as well as broader security requirements. If you are attending the event, be sure to visit TDSi on Stand 2-B28.”
Allied Universal®, the renowned global security and facility services company, has achieved ISO 27001 certification for its HELIAUS® artificial intelligence (AI) solution, Allied Universal Technology Services (AUTS) and the Allied Universal Monitoring and Response Center (MARC). Receiving ISO 27001 certification helps organisations become more risk-aware and proactively identify and address weaknesses, while working to improve information management security systems. Allied Universal’s HELIAUS® Allied Universal’s HELIAUS® is an advanced AI solution for risk management that offers comprehensive workforce management with risk-reducing recommendations. AUTS safeguards people, assets and reputation by leveraging the right combination of trained security professionals, data and cutting-edge technology. MARC offers end-to-end security solutions with video monitoring, access control, alarms and real-time event-based monitoring by security intervention specialists to enhance security and deter criminal activity. ISO 27001 certification ISO 27001 certification is a standard for data security management systems and assists organisations ISO 27001 certification is a global standard for information security management systems and assists organisations in addressing the rise in cybercrime and new emerging threats. ISO 27001 advocates a comprehensive strategy for information security encompassing assessment of individuals, policies and technology. Implementing an information security management system aligned with this standard serves as a resource for risk mitigation, bolstering cyber resilience and achieving operational excellence. Significant milestone “Achieving the ISO 27001 certification is a significant milestone for our organisation and a testament to the dedication and hard work of the HELIAUS®, AUTS and MARC teams,” said Ed Turek, Director of Security at Allied Universal. He adds, “This achievement not only bolsters our reputation but also provides us with a competitive edge in the marketplace. Our team’s commitment to excellence and dedication to our organisational goals has been instrumental in achieving this certification.”
Yet another significant milestone for Ajax Systems. Since August 31, the following Ajax devices are officially Grade 3 certified: Hub Hybrid (2G) MultiTransmitter Fibra StreetSiren Fibra StreetSiren DoubleDeck Fibra HomeSiren Fibra KeyPad Fibra Grade 3 systems Grade 3 systems are used in large enterprises and high-risk facilities where enhanced security is demanded. Ajax systems can cover jewellery and arms stores, banks and financial institutions, ATMs, and other facilities requiring a Grade 3 security level. All devices are already available to order. Stock-keeping units (SKU) Ajax is set to introduce more Grade 3 devices at the Ajax Special Event online on October 20 The stock-keeping units (SKU) remain the same for all devices that receive a Grade 3 certificate. To avoid misunderstanding, packages, and stickers will have a Grade 3 mark to distinguish certified devices. And that’s not all. Several more Ajax devices are in the process of certification. Ajax is set to introduce more Grade 3 devices at the Ajax Special Event online on October 20. Secure a spot and register to hear a thorny yet exciting journey to Grade 3. It’s all about new opportunities Opportunities mean entering new markets and giving the partners a great way to scale. The installers and security companies can cover new objects and build cutting-edge, comprehensive Grade 3 security systems based on the available Ajax devices plus third-party new wired equipment or devices already installed at the facility. MultiTransmitter Fibra The module supports NC, NO, EOL, 2EOL, and 3EOL connections, which makes updating the security system more flexible MultiTransmitter Fibra can integrate any wired dry contact detector into the system. The module supports NC, NO, EOL, 2EOL, and 3EOL connections, which makes updating the security system more flexible. With EOL’s resistance measuring, a unique tool for wired security systems, all values can be assigned automatically to make installation quicker and more comfortable. Saving time and costs A professional set of tools will help save time and costs on installation and make setup and maintenance an easy remote task: Automatic line scanning: The feature finds physically connected Fibra devices not yet assigned to the hub and allows adding them to the system in a few taps. Thus, an installer could scan 100 machines in 10 minutes. Power consumption stress test: It helps to ensure that the system has enough power in any situation. In PRO apps, an installer launches the simulation of maximum power consumption to check the system’s response. Automatic sync with CMS: After the installation and setup, all system settings are automatically downloaded from the cloud server to PRO Desktop. The CMS engineer does not waste time transferring the devices manually. Fibra power supply calculator Professionals have access to free training at Ajax Academy and a dedicated Technical Support team which is available Moreover, professionals have access to various tools and information resources created by Ajax. Use the Fibra power supply calculator to check the security system project. Also, professionals have access to free training at Ajax Academy and a dedicated Technical Support team which is available round the clock, 365 days a year. Intuitive Ajax apps Owners of outdated wired alarm systems receive all signature Ajax technologies to experience a truly smart and reliable way of security. Intuitive Ajax apps provide remote control and all detector information in real-time from anywhere the Internet is available, on a smartphone or PC. With instant notifications, there is no chance of missing an alarm, and automation scenarios enhance security and comfort to the fullest. Availability All announced devices are already available to order. More Grade 3 devices will be disclosed soon at the Ajax Special Event on October 20.
Expert commentary
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Security systems represent a significant investment, yet many organisations still only use a small percentage of their physical security systems’ capabilities. That’s before we even begin to consider the different ways that the likes of video, access control and ANPR can add additional value beyond security by serving the needs of other business functions. Whether that be to obtain additional insight, streamline compliance or drive operational efficiencies. Consumption gap When users aren’t tapping into the full power of the solution they bought, they aren’t realising their full return on investment. This creates a consumption gap. It’s a situation that has the potential to go in one of two very different directions. A misreading of a system, its capabilities and functionality can fast result in user discontent Left unchecked a consumption gap can create frustration for system integrators, manufacturers and end users alike. A misunderstanding of a system, its capabilities and functionality can quickly result in user dissatisfaction. Leading to a greater likelihood that they’ll look to change or focus investment into overlapping and likely competing solutions. Customers’ security goals Addressed appropriately it can help manufacturers, system integrators and end users to build trusted partnerships in which everybody wins. Understandably, systems integrators are primarily focused on installation—delivering reliable solutions that meet customers’ security goals to ensure their long-term success. However, engagement can go beyond deployment. Closing the consumption gap can be a strategic way to differentiate yourself from competitors. The deeper you understand your customer’s business, the better advice you’re able to offer—and the stronger the partnership you form. Why do consumption gaps exist? For customers, finding the time to learn multiple capabilities of a security system can be time-consuming. Often, taking advantage of new tools and solutions takes a backseat to the urgency of daily tasks. Often, taking use of new tools and keys takes a backseat to the speed of daily tasks There are many reasons why customers may not be taking full advantage of the features available to them in their security platform. They may feel overwhelmed by a steep learning curve after deployment and might delay diving into the additional system features. Sometimes, there might be a lack of awareness of the technology’s full capabilities, and despite a willingness to learn, there are few options for training. Often, it can simply be they are not aware of the benefits of their system or are too busy with day-to-day and urgent tasks to learn other features. Bridging the consumption gap Systems are built to deal with a wide variety of use cases and broaden market appeal, but the goal isn’t to get everyone to use all the features of every product. You want to guide your customers towards the features and functionality that best meet their needs. This could entail reducing the friction they experience in their day-to-day operations, solving unique issues related to their business, or addressing their most important challenges. Having these conversations with your customers deepens your relationship and can organically open up new revenue streams. Continuous engagement allows you to recommend other relevant products or services that they may find helpful. Customised training plan Customers can learn at their own pace and gradually expand their understanding of their system Furthermore, customers are often not able to implement all features at once. You can help by proposing a plan to gradually evolve systems and processes over time. This could include a customised training plan to get the most value from their investment. Some manufacturers are also now providing learning management tools that system integrators can pass on to their customers. Customers can learn at their own pace and gradually expand their understanding of their system in accordance with their bandwidth. This allows them to get more out of their system. Simplifying deployment With the right software partners, systems integrators can focus on solving customer problems, not reactively troubleshooting issues. Look for manufacturers who offer good support systems for integrators. This includes not only quality technical support but also configuration and training services you can build on. Look for partners that offer tools and consultation services you can use to complement your value-added services, either to spend less time on the basics or for specialised expertise on complex projects. Beyond support and services, one telling sign is the configuration interface and tools that you as an integrator will primarily interact with. Ask yourself whether the manufacturer invests in their back-end tools and their primary user interface. Is there a noticeable difference between these two interfaces in terms of look and feel? Does one feel more dated? Widening consumption gap The harder it is to implement upgrades, the more reticent customers are to make the changes If the end user interface is easy to use but changes on the back end are difficult, the resulting friction can contribute to the widening consumption gap. It can become too time-consuming or difficult to upgrade or make changes to the system. The harder it is to implement upgrades, the more reticent customers are to make the changes. Configuration should be painless. If the system has a solid graphical user interface, you’ll be able to interact with the software in a fluid and intuitive way. When the system is intuitive for both you and your customers, you spend less time on setup and training. You can invest more attention in value-added activities. Conclusion A consumption gap could be a sign that technological innovation is outpacing people's ability to implement them in their day-to-day lives. You can work with your customers to simplify the adoption of the innovations so they can more easily implement them and realise the full value of their investment. By reviewing opportunities to bridge the consumption gap for your customers, you increase the likelihood of growing and renewing your system and service contracts. You also build relationships as a trusted partner. Customers will turn to you when looking to expand their security system and proactively solve new and incipient problems.
For decades, cable theft has caused disruption to infrastructure across South Africa, and an issue that permeates the whole supply chain. Here, Ian Loudon, international sales and marketing manager at remote monitoring specialist Omniflex, explains how new cable-alarm technology is making life difficult for criminals and giving hope to businesses. In November 2020, Nasdaq reported that, “When South Africa shut large parts of its economy and transport network during its COVID-19 lockdown, organised, sometimes armed, gangs moved into its crumbling stations to steal the valuable copper from the lines. Now, more than two months after that lockdown ended, the commuter rail system, relied on by millions of commuters, is barely operational.” Private security firm Despite this most recent incident, cable theft is not a new phenomenon to sweep South Africa Despite this most recent incident, cable theft is not a new phenomenon to sweep South Africa. In 2001, SABC TV broadcast a story following two members of a private security firm working for Telkom, a major telecoms provider. In the segment, the two guards, working in Amanzimtoti on the south coast of KwaZulu-Natal, head out to investigate a nearby alarm that has been triggered. They reach a telecoms cabinet and discover that it has been compromised, with the copper cable cut and telephone handsets strewn across the ground. In the dark, they continue to search the area when one of the guards discovers the problem: 500 metres of copper wire has been ripped out. In their haste, the thieves have dropped their loot and fled. Widespread cable theft Had they managed to get away, they would have melted the cable to remove the plastic insulation and sold the copper to a local scrap dealer for around 900 Rand, about $50 US dollars. For the company whose infrastructure has been compromised, it may cost ten times that amount to replace and repair the critical infrastructure. The disappointing takeaway from this story is that two decades on from this incident the country still faces widespread cable theft, whether it’s copper cables from mines, pipelines, railways, telecoms or electrical utilities. In fact, the South African Chamber of Commerce and Industry estimates that cable theft costs the economy between R5–7 billion a year. The answer to the problem must go further than the existing measures used by companies. Detect power failure Most businesses already invest in CCTV, fences, barriers and even patrol guards, but this is not enough. Take the mining sector, for example. These sites can be vast, spanning dozens of kilometres - it’s simply not cost effective to install enough fences or employ enough guards or camera operators. As monitoring technology gets better, the company has seen site managers increasingly use cable alarms in recent years that detect when a power failure occurs. The idea is that, if one can detect a power failure, they can detect whether the cable has been cut The idea is that, if one can detect a power failure, they can detect whether the cable has been cut. The problem is though: how does one distinguish the difference between a situation where a cable has been cut intentionally and a genuine power outage? Power outages in South Africa are an ongoing problem, with the country contending with an energy deficit since late 2005, leading to around 6,000 MW of power cuts in 2019. Remote terminal units Eskom Holdings SOC Ltd., the company that generates around 95 per cent of South Africa’s power has already warned of further blackouts as the company works to carry out repairs to its power plants. According to a statement on the company’s website, “Eskom spends in the region of R2 billion a year replacing stolen copper cables." The result is that criminals take advantage of the gaps in power to steal cable, timing their robberies to coincide with the published load shedding schedules. The basic alarms used to detect power outage won’t recognise the theft because they register a false-positive during a power cut. By the time the power comes back on, the deed has been done and the criminals have gotten away with the cable. The good news is that recent breakthroughs in cable monitoring technology are helping tackle just this problem. New alarms on the market now combine sophisticated GSM-based monitoring systems that use battery powered remote terminal units. Legitimate supply chain Unlike the basic alarms that look for the presence or absence of power, these new systems monitor whether the cable circuit is in an open or closed state. In the event of a power outage, the unit continues to run on battery power and can detect if a cable has been cut, sending a priority SMS alert to the site manager immediately, giving them a fighting chance to prevent a robbery in progress. Beyond the opportunistic theft carried out by petty criminals, the theft of copper cables forms a wider problem Beyond the opportunistic theft carried out by petty criminals, the theft of copper cables forms a wider problem across the supply chain in South Africa. In recent years, the combination of unscrupulous scrap dealers, the alleged involvement of large scrap processing companies and lax penalties meant that much of the stolen copper ended up back in the legitimate supply chain. However, recent changes in the law have sought to take a tougher stance on copper theft. Alarm monitoring technology According to the Western Cape Government, “The Criminal Matters Amendment Act, regulates bail and imposes minimum offences for essential infrastructure-related offences." The act, which came into effect in 2018, recommends sentencing for cable theft, with the minimum sentence for first-time offenders being three years and for those who are involved in instigating or causing damage to infrastructure, the maximum sentence is thirty years. It seems to be working too. In January 2021, the South African reported that a Johannesburg man was sentenced to eight years behind bars for cable theft in Turffontein. While the longer-term outlook is a positive one for industry, the best advice for businesses seeking to alleviate the problem of cable theft in the immediate future is to invest in the latest cable-theft alarm monitoring technology to tackle the problem and make life difficult for criminals.
Security beat
Several recent terrorist and mass violence attacks have been directed at soft targets, or relatively unprotected locations where people gather such as outside a music venue or in the unscreened passenger areas at airports. Attacks in public areas have led to the development of new security technologies aimed at protecting soft targets. One company addressing the challenges is Evolv Technology and its Edge automated high-speed personnel screening solution. The system integrates walkthrough firearm and explosive detection for high-throughput protection of events and soft targets.The Edge system has multiple detection sensitivity settings to respond to various threat scenarios Enhanced visitor experience The system seeks to increase security without compromising the ‘customer experience’. People simply walk through single-file – between two 5-foot-tall stanchions. One lane can screen up to 800 people per hour, and the system detects explosives or metallic objects without the need for pat-downs or wands or other invasive procedures. Any personal belongings can remain in visitors’ pockets. A single security guard is needed for each lane to verify any detected threats. “The system combines an improved security posture with a better visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. “We need to fly and have been trained to be screened at the airport, but we don’t expect to be screened going to see a ball game or a Mozart concert. Evolv recognised a need for a new way to inspect people before they enter these types of facilities. It’s a seamless system that pulls various technologies together. We want to feel safe but without having to sacrifice the quality of the experience.”Screening analytics provide data on the numbers of people screened by time of day and by result The system combines millimetre wave and magnetic field sensors, along with artificial intelligence (AI)/ machine learning and can incorporate additional data such as biometrics. Known bad actors can be identified using facial recognition. The system has multiple detection sensitivity settings to respond to various threat scenarios. Expanding perimeter protection A security guard provides the human touch by verifying any threats detected by the system. The locations of concealed items are displayed on a photo of the individual using a color-coded box overlay. Screening analytics provide data on the numbers of people screened by time of day and by result. Ellenbogen says the company is working to have the system adopted at entertainment venues, performing arts centres, sports centres, for air and rail transportation, and to protect high-profile government buildings. The Edge system can expand the protected perimeter to a wider area that was previously unprotected. The Edge system can expand the protected perimeter to a wider area that was previously unprotected For example, concert-goers exited the arena of an Ariana Grande concert May 22, 2017, in Manchester, U.K., and entered the surrounding area that was unscreened and unsecured. Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack.Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack Threat mitigation with soft target approach Likewise, a 2016 bombing at the Brussels Airport occurred in the departure hall outside the passenger screening areas. Securing a wider perimeter – for example, screening customers discreetly as they enter the airport building from a parking area – could have provided additional security against such an attack. Ellenbogen confirms Evolv has sold a number of systems to major European airports to screen visitors and passengers as they enter the front door. “Addressing the threat to an airport or train system is different than screening passengers; we are looking for different types of objects and different types of materials. The idea is to be able to detect threats to a venue before they get into the venue.” The soft target approach can also be applied to public buildings, such as courthouses, and used in lieu of more invasive metal detectors and x-ray machines. The portability of the Edge system enables a ‘pop-up’ approach to security – i.e., to relocate the system to address specific or changing security threats easily. The self-contained system only requires a wall plug. Labour reduction (because of faster throughput) can help offset the system costs but it’s difficult to quantify the improvement in the visitor experienceImproving security posture at event venues “It’s surprising the level of importance [venue owners] put on the visitor experience,” says Ellenbogen. “They see that their brand starts at the front door. They are eager to find alternative security solutions that come across as more inviting, less imposing, less closed down, less invasive than the solutions they have been using,” he says. “They are driven by a desire to improve the visitor experience as they improve the security posture.” He says current events, including terrorist attacks and mass shootings, drive awareness among venue owners to improve the security of soft targets. “The level of interest is high, and it spikes somewhat when there is a big headline,” Ellenbogen says. He notes that the system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labour reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” Ellenbogen says.
There’s a new big player – and familiar household name – coming into the security marketplace with the announcement of Motorola’s intent to acquire Canadian video manufacturer Avigilon Corporation, provider of video surveillance and analytics. Motorola Solutions points to an “avalanche of video in public and private sectors” as a motivation for the acquisition. Motorola Solutions’ dominance in the public safety market – where the Chicago company supplies police technologies, radios and other products – will provide new opportunities for Avigilon in a realm where it previously has not been dominant. Avigilon has millions of cameras deployed across airports, rail, streets, and public and private buildings. Meanwhile, Avigilon will “bring [its] advanced video surveillance and analytics platform to [Motorola’s] rapidly evolving public safety workflow,” according to Motorola, and enhance the larger company’s portfolio of “mission-critical communications technologies.” Avigilon’s end-to-end security and video surveillance platform includes cameras, analytics, video management and video storage. Avigilon has millions of cameras deployed across airports, rail, streets, and public and private buildings The broader solution Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as “a natural extension to global public safety and U.S. federal and military” applications, according to the company. The all-cash deal pays CAD$27.00 per share of Avigilon, and totals approximately $1 billion including Avigilon’s net debt. Not a bad price considering Avigilon’s stock price has traded as low as $13 a share in the last year. Avigilon has 1,200 employees with locations in Vancouver and Richmond, British Columbia, and Dallas and Plano, Texas. Revenue was $354 million in 2016. The transaction is expected to be completed in Q2 of 2018. Deploying pre-engineered solutions As an innovator in the security market, Avigilon has spearheaded an end-to-end solutions approach. Their success has even prompted some component manufacturers to expand their proposition into a broader “solutions” sale. Led largely by Avigilon, the industry pendulum has swung toward the simplicity of deploying pre-engineered end-to-end solutions. Open systems integrated using best-in-breed components from several manufacturers still have their devotees, and are needed in some situations, but Avigilon has made a strong case for the end-to-end alternative. Others have followed. The all-cash deal pays CAD$27.00 per share of Avigilon, and totals approximately $1 billion including Avigilon’s net debt Avigilon has also lately been a leader in implementing artificial intelligence and deep learning, including Appearance Search technology that can locate a vehicle or person from video across a site. Avigilon’s video surveillance platform seeks to transform video from reactive – looking back at what has taken place – to proactive, issuing alerts in real time. Avigilon also recently introduced Avigilon Blue cloud service platform to enable video system users to manage more sites with fewer resources. Investing and building Motorola is not a completely new name to the security market. Old-timers will remember Motorola Indala, a previous presence in the RFID access control market that was sold to HID Corp. in 2001. More recently, Motorola Solutions has invested in Vidsys, a provider of converged security and information management (CSIM) software and has implemented Vidsys CSIM through its Protect Series unified platform that aggregates and analyses information from multiple inputs for military and federal government properties. Motorola is also known as the inventor of the Six Sigma quality improvement process - and commitment to quality plays well among security integrators and end users. Motorola would presumably continue Avigilon’s licensing program, but rules-based video analytics patents’ importance may fade Avigilon owns 750 U.S. and international patents, including some covering basic underlying principles of video analytics, for which several video companies currently pay licence fees. Motorola would presumably continue the licensing program, although the importance of rules-based video analytics patents may fade as new deep learning and artificial intelligence (AI) approaches to video analytics emerge. Channel conflict A possible concern surrounding the acquisition is the issue of channel conflict. When it comes to larger end user customers, Motorola has embraced a direct-to-user approach that could be problematic in the eyes of Avigilon’s 2,000 resellers. Among the benefits Motorola says they bring to the table is the ability to “leverage [their] direct enterprise safes force for large deals.” They also say they “complement Avigilon’s channel with [Motorola’s] channel network.” The security industry has a spotty history of larger companies entering the market to buy existing businesses. Some have been a good fit, while others have not. The entrepreneurial spirit of more than one successful security company has suffered under larger corporate ownership, sometimes withering as new corporate overlords cut costs and stifle R&D. The more successful recent large acquisitions in our market – notably Canon’s acquisition of Milestone Systems and Axis Communications – have worked well because the acquired companies have retained some degree of independence and preserved the existing corporate culture. In the case of Motorola and Avigilon, obviously, time will tell.
Case studies
In a groundbreaking initiative to bolster security measures, Indian Railways has successfully implemented Herta's state-of-the-art facial recognition solutions across its extensive network of train stations in the Eastern region. This transformative project marks a significant step towards ensuring the safety and well-being of passengers and staff throughout the railway system. The project becomes the largest one in the world in the transport sector. Herta has also been awarded two more regions that will be implemented after the Eastern one. Facial recognition technology The deployment of Herta's cutting-edge facial recognition technology is part of IndianRailways' commitment to embracing advanced solutions for enhancing security. By leveraging Herta's expertise, the railway network aims to create a safer environment for passengers, mitigate potential security threats, and streamline operational efficiency. Key features Key features of Herta's facial recognition solutions implemented at 230 train stations using thousands of video surveillance cameras include: Real-time Identification: Herta's technology provides real-time facial identification capabilities, allowing for swift and accurate recognition of individuals within the train station premises. Enhanced Security: The implementation of facial recognition enhances security by automatically identifying and alerting authorities about the presence of individuals with potential security concerns, contributing to the overall safety of passengers and staff. Efficient Monitoring: Herta's system enables efficient monitoring of the train stations, offering a proactive approach to security management. The technology assists in the quick response to incidents and ensures a rapid resolution of security issues. User-Friendly Interface: The intuitive user interface of Herta's solutions facilitates easy integration with existing security systems, providing a seamless experience for railway personnel responsible for monitoring and managing security. Stringent security requirements Mr. Rahat Jain, IDIS INDIA - MD, expressed his enthusiasm about the successful implementation, stating, "We are delighted to announce the successful integration of Herta's facial recognition solutions at Indian Railways." Startologic, the official partner overseeing the deployment of Herta's facial recognition solutions at Indian Railways, is proud to be part of this transformative project. The successful implementation showcases the capability of Herta's technology to meet the stringent security requirements of one of the world's largest railway networks.
Completed in 2023, Thanet Parkway Station, the new high-speed rail hub serving the Thanet area in southeast Kent, has implemented a significant infrastructure enhancement: the installation of high-quality parking barriers to optimise accessibility and safety within its premises. Investment in connectivity Thanet Parkway Station, which opened on 31st July 2023, is a testament to the region's commitment to advancing its transportation infrastructure. With a total investment of £44 million secured through a combination of council financing and various building and growth funds, the station addresses the rising demand for efficient connectivity to London and neighbouring towns. Swift and convenient travel Furthermore, its ample car park, boasting space for 293 vehicles, serves as an indispensable "park and ride" facility Featuring two expansive platforms capable of accommodating 12-car trains and strategically situated on the high-speed line through Ashford International, Thanet Parkway Station offers commuters swift journeys to key destinations. Furthermore, its ample car park, boasting space for 293 vehicles, serves as an indispensable "park and ride" facility, alleviating congestion in central Thanet and providing convenient access to the surrounding areas. Enhancing safety and traffic flow To enhance safety and streamline traffic flow within the station's car park and adjoining pedestrian and cycleway, Jacksons Fencing was specified to implement a comprehensive suite of parking barriers and demarcation measures. Warden Swing Barriers were installed along the pedestrian and cycleway to regulate vehicular access. These galvanised steel barriers offer a robust solution, while ensuring ease of operation for maintenance and emergency vehicles. Safeguarding pedestrian pathways Along the same path, Jacksons Fencing’s timber knee rail fencing served as an unobtrusive demarcation device. This fencing solution, constructed from kiln-dried, pressure-treated timber and galvanised steel straps, safeguards grass verges and delineates pedestrian pathways. Ensuring peace of mind Strategically positioned to enforce height restrictions within designated parking areas, Jacksons’ MaxHite parking height restriction barriers were installed. Crafted from galvanised steel and finished in a highly visible yellow polyester powder coating, the barriers provide durable protection against unauthorised access, while facilitating smooth traffic management. Each installed product comes with the assurance of Jacksons Fencing’s 25-year guarantee, symbolising a commitment to quality and sustainability. High-quality, sustainable products Commenting on the project, Peter Jackson, Managing Director of Jacksons Fencing, underscored the transformative impact of the enhanced security measures at Thanet Parkway Station, said "As a local supplier, we’re thrilled to have been involved in this project, and it’s great to see that the developers have invested in high-quality, sustainable products, showcasing this project’s commitment to providing a lasting transport solution for the community." He adds, "Beyond parking, the upgraded access control and increased security measures not only enhance safety, but also foster a profound sense of reassurance and pride in the area for all station users."
A damning new report shows theft from construction sites is surging nationwide, detrimentally affecting projects, firms and employees. Key findings Spike in cases: Two-thirds of respondents say the rate of theft increased in 2023, as the resale value of goods reached record levels. Criminals are getting smarter: one in three believe crime, including theft, physical violence, harassment and vandalism, is becoming more sophisticated. It comes as reports of criminals using drones to target sites become more frequent. A hidden productivity drain: A third of projects have been delayed due to crime, with copper and cable topping the tables as the most frequently targeted goods–delaying the development of critical infrastructure, such as railways. Workers bear the brunt of poor security: one in four workers have been left out of pocket, after having to replace stolen tools, and say being robbed is their “biggest fear.” However, security is seen as a “low priority” on sites they work on (30%). Underestimation of the risks BauWatch, examines the senses of building workers, to understand their incidents of theft at work The “Unseen Threats: 2024 Construction Crime Index,” from pioneering site-security provider, BauWatch, examines insights from construction workers, to understand their experience of theft at work. It suggests a “perfect storm” of factors, including goods inflation, increasingly sophisticated criminal tactics, and a general underestimation of the risks, are making sites vulnerable to crime, in turn causing major delays to projects, as well as denting staff morale. It also identifies the types of perpetrators that might pose a threat, including opportunists, professional gangs, and “insiders” (criminals posing as legitimate personnel), and outlines a list of best practice measures that can be immediately employed to minimise the risk of a robbery. BauWatch’s crime index We’ve observed that, since the Government removed the construction industry’s access to red diesel Rico Wojtulewicz, Head of Policy and Market Insight at the National Federation of Builders said: “We’ve observed that, since the Government removed the construction industry’s access to red diesel, fuel theft has risen, as indicated by responses in BauWatch’s crime index. CCTV has therefore become an even more important tool to help tackle site crime, not only because it acts as a deterrent and helps collect video evidence but as it also offers an insight into how and where a site might be better protected.” With criminals seemingly becoming more brazen, BauWatch, which supplies CCTV security to over 5000 active Construction sites across the UK and Europe, and the National Federation of Builders, are calling for firms to take extra preventative action against thieves, rather than taking a “wait and see” approach. Author's quote “Construction sites have always attracted thieves, but with the resale value of goods going through the roof, they’re now prime targets. So, it’s worrying to see that some workers don’t feel confident about on-site security,” said Alexis Potter, BauWatch’s Managing Director. Potter added: “Repeated incidents, even small ones, have huge repercussions if left unchecked as we can see in this report. The best way to minimise the impact of theft is to deter criminals from entering at all, so we are advocating for the adoption of preventative security measures to protect staff, safeguard investments and maintain project schedules.”
SeeTrue, a global AI software solution pioneer for security screening, disclosed its recent entry into the realm of urban security through a strategic partnership with Israel Railways. This collaborative effort has resulted in the seamless integration of SeeTrue's cutting-edge AI solution into security screening checkpoints at railway stations throughout Israel, including the country's largest stations, where more than 1,000 bags require screening every hour. Faster, smoother security process The integration of SeeTrue into train station security processes has proven to be transformative, maintaining a consistently high level of security and operating continuously around the clock. Passengers benefit from a faster, smoother security process minimising stress and ensuring that critical security checks do not result in bottlenecks that can negatively impact the journey. Security screening solution This incident offers concrete proof of SeeTrue's invaluable contribution to ensuring public safety In a recent incident at one of the busiest and most central train stations, SeeTrue's AI security screening solution identified a bag containing a concealed 30-centimetre knife, alerting security personnel in real-time. As a result, the potential threat was swiftly and effectively neutralised, resulting in the arrest of the individual carrying the concealed knife. This incident offers concrete proof of SeeTrue's invaluable contribution to ensuring public safety in high-traffic transportation hubs. AI technology Assaf Frenkel, Co-Founder and CEO of SeeTrue, "We take immense pride in deepening our expertise in AI technology to include urban security, an endeavour that complements our pioneering work in aviation, customs, and other urban security checkpoints." Assaf Frenkel adds, "Partnering with a high-quality, innovative mass-transit organisation like Israel Railways is a testament to our commitment to revolutionising safety and security across multiple domains, making our cities and transportation systems safer and more efficient." Innovation and intelligence in railway security Hagay Rozenfeld, Head of Innovation, Israel Railways, said "Innovation at Israel Railways is a key part of our strategy, and AI plays a pivotal role in strengthening our pledge to passenger safety, seamlessly infusing intelligence into our security strategies and enabling us to provide optimal security for our passengers and our employees." Shaked Bar, Head of Security, Israel Railways, said "Acknowledging our responsibility to top-tier security at Israel Railways, we harness the power of AI to provide the highest security standards, ensuring the best passenger experience and safety."
Alarming increases in vehicle thefts, unsolved traffic collisions, and stolen cargo in the Mexican State of Tlaxcala, motivated the Executive Commission of the State Public Security System (CESESP) to expand and upgrade its video security system. To counter the rise in crime, the CESESP sought a flexible, scalable, open-platform video management system (VMS) that could seamlessly incorporate existing cameras as well as over 800 new cameras and edge devices from a range of hardware and software providers. Tlaxcala Located in East-Central Mexico, Tlaxcala is one of 32 states within the Federal Entities of Mexico. With a population of approximately 1,343,000, based on the 2020 census, Tlaxcala is the smallest yet one of the most densely populated states in Mexico. The CESESP of Tlaxcala is tasked with safeguarding residents across the state's 60 municipalities. C4 centre C4 centre has multiple teams of six security professionals who monitor the system around the clock At the core of all security operations, including the 911 emergency response and 089 confidential tip line, is the CESESP's Control, Command, Communications, and Computing centre (C4). The state’s C4 centre has multiple teams of six security professionals who monitor the system around the clock on a large, 24-screen video wall. The C4 also houses the system’s HP and Lenovo servers. Flexibility, scalability, and budget “Flexibility, scalability, and strictly adhering to the budget were top requirements for this critical, state-wide project,” said Maximino Hernández Pulido, Executive Commissioner of the State Public Security System. “We considered a variety of proposals and providers, but we ultimately followed the advice of our integrator, Digital Information Systems, and selected XProtect Corporate from Milestone Systems.” XProtect Corporate The new system includes cameras from Hanwha Vision, Bosch Security and Safety Systems, Hikvision, and Pelco The new system includes cameras from Hanwha Vision, Bosch Security and Safety Systems, Hikvision, and Pelco, all integrated within the system and managed by XProtect Corporate VMS from Milestone Systems. The system is also fully integrated with the BriefCam Video Analytics Platform, delivering video intelligence for system managers to identify, monitor, investigate, and visualise incidents plus video data to make smarter decisions. Efficient and cost-effective integration “Because state officials rely on their video system 24/7, the update needed to be gradual with no downtime. As new cameras were integrated into the Milestone platform, the previous system slowly disappeared,” said Isaac Sánchez Morales, an engineer at Digital Information Systems (SDI), an integrating company. “The XProtect Corporate open platform VMS allowed us to leverage our existing cameras and servers, integrate new equipment and devices, making the process very efficient and cost-effective, and we never had a gap in service.” Data-driven video for fast response times BriefCam video analytics technology The solution detects, identifies, and classifies video metadata to drive more efficient investigations The BriefCam video analytics technology seamlessly integrates into Milestone’s XProtect Smart Client. The solution detects, identifies, and classifies video metadata to drive more efficient investigations and business decisions, such as finding missing persons, investigating the vandalism, theft, assaults, accidents, injuries, or acts of violence, as well as extracting and analysing through heatmaps, dashboards, and visualisations. The analytics have proven beneficial in accelerating investigations, attaining situational awareness, and optimising operational intelligence for enhanced video search, alerting, and data visualisation. Real-time alerts, situational awareness “We installed the BriefCam Insights and Investigator products, and regularly use the platform’s RESPOND and RESEARCH capabilities. One of the advantages of all these XProtect-integrated analytics is that operators do not have to open additional windows or enter new credentials to access them,” said Sánchez. “With this integration of technologies, operators can trigger real-time alerts based on complex object classifications and filter combinations to increase situational awareness meaning authorities can react to events as they unfold.” Proactive policing with LPR With the BriefCam RESPOND solution, object characteristics and licence plate recognition tools can be used" Sánchez added, "With the BriefCam RESPOND solution, object characteristics such as a vehicle, person, or animal, and licence plate recognition tools can be used to trigger rule-based alerts." "These tools can help overcome the challenges of urban video surveillance and drive proactive policing in Tlaxcala." Video technologies reduce state crime rates Following the comprehensive expansion of the security infrastructure, statistics from the Executive Secretariat of the National Public Security Systems revealed Tlaxcala boasted the lowest crime rate nationwide. With the modernised system in place, officials documented a 93% reduction in pilfered freight from transport companies. Similarly, vehicle theft declined by 22.5%. A cost-efficient and flexible way Milestone Interconnect provides a cost-efficient and flexible way to gain central surveillance According to Sánchez and the SDI team, it is expected that each municipality within the territory will soon have its own locally focused VMS. With the use of Milestone Interconnect, all the municipality subsystems will integrate directly with the state-wide platform. Milestone Interconnect provides a cost-efficient and flexible way to gain central surveillance of multiple sites spread across a region. C4 video surveillance operation “The integrated solution delivered through Milestone is a robust, efficient, and secure system that provides all the necessary tools for the C4 video surveillance operation,” added Executive Commissioner Hernández-Pulido. “In addition, the excellent technical and post-sales support from Milestone and SDI has led us to meet the system and performance goals we set for ourselves.”
Istanbul, as the economic, cultural, and transportation centre of Turkey, is a world-famous tourist destination spanning Europe and Asia, attracting countless tourists from all over the world every year. As a highly developed metropolis, Istanbul has a well-developed transportation system that covers major tourist attractions and commercial areas. Challenges with transportation However, the enormous scale of transportation also brings its own set of challenges. For instance, the small size of electric vehicles presents more demanding requirements for equipment, and with increased driving speeds, monitoring and regulating drivers' dangerous behaviours becomes crucial. Additionally, ensuring passenger safety and satisfaction during their journeys is also important. To address these issues, Istanbul has implemented intelligent upgrades to its public transportation system, aiming to reduce traffic congestion, prevent accidents, and ensure the safety of its citizens. Upgrading the city's public transit system This system, while ensuring safety, can also provide real-time passenger count, allowing efficient vehicle dispatch Dahua's intelligent transportation solution, utilising advanced technologies like DSM and AI-based passenger flow counting, has facilitated an intelligent system upgrade for nearly 6,400 minibusses and electric buses in Istanbul. This system, while ensuring safety, can also provide real-time passenger count, allowing efficient vehicle dispatch during peak times. DSM cameras Dahua's DSM cameras, which are applied to electric buses, help regulate drivers' behaviours, effectively reducing accident rates and ensuring passenger safety. When drivers engage in behaviours such as smoking, making phone calls, or not wearing seat belts, intelligent devices can accurately and promptly identify these actions and issue alerts to both the driver and the transit centre. It effectively helps avoid accidents caused by unsafe driving. Real-time GPS information Precisely understanding the dynamics of passenger flow, enhances passengers' travel experience The advanced passenger flow statistics technology can dynamically assess the bus’s crowding level and assist operational scheduling decisions. Precisely understanding the dynamics of passenger flow, enhances passengers' travel experience. Furthermore, Real-time GPS information is provided by the devices and integrated with the mobile app of the transit company. This enables passengers to easily access the location of the next bus, helping them plan their journeys and improving their overall travel experience. Improving the city's sea taxi operations Sea taxis, which have been specially designed so that they can be easily used by disabled persons, families with strollers, and cyclists, are available at 50 stations and terminals. In addition to the 46 piers on the city lines, Istanbul's Galata Port, Harbiye Convention Centre, Istinye Cruise Park, and Tarabya Cruise Park docking points also cater to passengers. Given the strait's unique environment, sea taxis demand high standards in equipment airtightness, waterproof capability, and salt spray resistance. Smart onboard solution Dahua provides industry-grade dash cams for electric tourist cars on the Prince Islands Dahua's smart on-board solution ensures stable operation while minimising the impact of significant vibrations on the image quality. In addition, Dahua provides industry-grade dash cams for electric tourist cars on Prince Islands. These compact and easy-to-install products integrate seamlessly with vehicles and allow full monitoring of the entire travel process. Two-way intercom module The dashcams are also equipped with a two-way intercom module for real-time communication between vehicles and the control centre. In addition to "sea taxis", the Dahua Intelligent Transportation Solution is also suitable for subways, trams, railways, airports, and many other transportation scenarios, ensuring city order and safe travel.
Round table discussion
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Driving the smart homes market is the convenience of simple technology solutions. Almost every home now has a “smart speaker” that makes it easier than ever for homeowners to interface and control their technology. But where does security fit into the new landscape of smart home systems? We asked this week’s Expert Panel Roundtable: What’s new in smart homes and residential security systems?
Products
Videos
Railway security: Manufacturers & Suppliers
Access control system planning phase 2
DownloadHoneywell GARD USB threat report 2024
DownloadThe role of artificial intelligence to transform video imaging
DownloadSIA Identity and Biometrics Symposium
DownloadArtificial intelligence
Download