Ramps
Robotic Assistance Devices Residential, Inc. (RAD-R), a subsidiary of Artificial Intelligence Technology Solutions, Inc. announced the purchase of 1 million unique MAC addresses. These addresses will be assigned to RADCam units as the Company ramps up production and deployment of its innovative residential security device. MAC (Media Access Control) address RAD-R’s acquisition of these MAC addresses ensures that each RADCam deployed in the coming months will be equipped with i...
Espria, a pioneering provider of digital workspace solutions, recently hosted the second webinar in their Optimise 2024 series. The webinar covered achieving peace of mind with IT and featured discussions with some of their key solutions partners, Xerox and Mimecast. During an open forum centred around technology's benefits for achieving peace of mind, several industry pioneers identified the key challenges that keep business owners awake at night. They discussed how technology can help a...
From 10 to 13 October, the global airport community will gather for the 24th edition of inter airport Europe at the Munich Trade Fair Centre in Germany. The event returns with an impressive line-up of well over 400 airport suppliers from 37 countries, including seven national pavilions and more than 100 new exhibitors. Live exhibits Visitors can look forward to plenty of live exhibits in the halls and Outdoor Area and a new 600 square metre GSE Experience Area. An exciting event programme in...
ISS (Intelligent Security Systems), a global provider of video intelligence and data awareness solutions, announced that industry veterans Dennis Connor and Jason Lloyd have joined the company as its new Director of Program Management NA and Regional Business Manager for the Midwest respectively. Dennis Connor's responsibilities Connor, who most recently served as Program/Project Manager for CX (customer experience) Initiatives at ADT, will spearhead the development of new end-user and p...
The Security Industry Association (SIA) has launched a new learning management system (LMS) – SIAcademy as part of its efforts to advance industry professionalism through premier education and training. SIAcademy SIAcademy is a living library of on-demand training and professional development programmes designed to enhance security professionals’ industry knowledge, technical skills, and overall job performance. The new LMS offers a modern, simple, and centralised p...
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming...
News
Dahua's latest DSS Pro V8.3 enhancement equips security personnel with advanced tools, enabling them to rapidly identify and monitor suspicious individuals' movements in just seconds. It is a cutting-edge Video Management Software (VMS) security solution designed for efficiency and scalability. It leverages users' video security systems to help them make informed decisions quickly and serves as the backbone of the operation. AcuPick Technology The key upgrades primarily focus on integrating Dahua's advanced algorithm, AcuPick Technology, which helps investigators save time in searching for and identifying people of interest. The feature also supports multiple user logins with specific permissions for up to 200 individuals simultaneously. Remote-control capability The company predicts that this upgrade will foster digital transformation across various sectors Another feature is the remote-control capability, which enables security staff to monitor and track events from anywhere, whether they are on the move or at home. The company predicts that this upgrade will foster digital transformation across various sectors and empower stakeholders from retail, residential, and other sectors to become more digital and efficient. Integrated Search Algorithm Traditional security methods demand frame-by-frame analysis of hours of video footage. With AcuPick, all searchable targets can be scanned instantly. The search algorithm breaks up people and vehicle objects into feature values that are sent to the DSS platform for processing. DSS saves these feature values to its database and finds the target object by comparing the feature values. Streamlines the user experience Even without clear details, security staff can find and track a person or vehicle of interest using a single reference image. Upon selecting a person, individuals will instantly see a history of each appearance on all AcuPick-enabled cameras throughout the premises. DSS Pro 8.3 streamlines the user experience, eliminating the need for lengthy training sessions. The process is as simple as installing AcuPick, selecting the target, viewing the desired thumbnails, and receiving video feedback instantly. Enhanced Workflow This allows users to easily see personal assignments for each door and personnel situation DSS Pro V8.3 also introduces a clearer assignment system, simplifying the entire workflow. The workflow is divided into three groups – staff assignment, safeguarding doors, and the routes connecting the two. This allows users to easily see personal assignments for each door and personnel situation. Visualised and intuitive dashboard The company has improved its user interface to offer a more visualised and intuitive dashboard. This upgraded feature provides a comprehensive overview of peak times, equipment status, and other vital information, making it easier for stakeholders to manage their security systems. Existing stakeholders enjoy these updates free of charge. While clients are required to purchase their servers for data storage, data transfer during a DSS Pro upgrade is an additional cost.
Teledyne FLIR, part of Teledyne Technologies Incorporated announced the release of its new FLIR FC-Series AI, the latest model in its signature fixed camera (FC) series. The FC-Series AI is a thermal security camera with onboard AI analytics that accurately classifies humans and vehicles for early intrusion detection for perimeter protection and remote site monitoring. FC-Series AI With video analytics that combine deep neural network (DNN)- and motion-based analytics, the FC-Series AI offers industry-pioneering intrusion detection, enabling users to expand situational awareness and make better-informed decisions that increase safety and improve coordination and efficiency. Featuring a premium thermal sensor with 640 × 512 full resolution, the FC-Series AI camera creates images based on the heat emitted by humans and objects, rather than relying solely on visible light. Thermal security camera features FC-Series AI enables security operators to see and detect intruders, even in complete darkness, rain, fog, and smoke The thermal imager supports an industry-pioneering thermal sensitivity of <25 milliKelvin (mK), one of the best Noise Equivalent Temperature Difference (NETD) values on the market, enabling the sensor to outperform other thermal cameras whose visibility and detection rates decrease in adverse conditions. Offering eight, high-performance lenses ranging from an 8.6° × 6.6° to a 90° × 69° field of view, the FC-Series AI enables security operators to see and detect intruders, even in complete darkness, rain, fog, and smoke. DNN- and motion-based video analytics The FC-Series AI also combines DNN- and motion-based video analytics for reliable detection, empowering security managers to differentiate between true threats and nuisance alarms. Using FLIR’s curated library of thousands of thermal images, FLIR DNN analytics are trained to classify objects in real-world situations where humans or vehicles may be slightly obscured or challenging to identify or if an intruder attempts to deceive the system. The FC-Series AI also offers target geolocation capabilities and precise handoff to a pan-tilt-zoom device for streamlined target tracking. Perimeter protection, cybersecure solution FC-Series AI camera offers security professionals a high-performing, dependable, and cybersecure solution" “Our new FC-Series AI cameras elevate the possibilities for customers to tighten their perimeter protection strategy,” said Seetha Sasikala, Global Product Solutions Manager at Teledyne FLIR. “Combining DNN- and motion detection-based analytics, industry-pioneering thermal sensitivity, and the widest range of high-performance lenses on the market, the FC-Series AI camera offers security professionals a high-performing, dependable and cybersecure solution for intrusion detection.” NDAA-compliant, IK-10 rated device Designed to maximise the performance of new and existing multilayered physical security systems, the FC-Series AI camera tightly integrates with FLIR UVMS, as well as other third-party video management systems, and is supported by FLIR Nexus software. As an NDAA-compliant device, the FC-Series AI camera offers security professionals extensive cyber protection and peace of mind. With rugged, weatherproof IP66 and IP67 and vandal-proof IK10 ratings, the FC-Series AI provides durable housing.
Integrated Access Control and Security manufacturer TDSi announces it will be showcasing its GARDiS Platform and talking about its new GARDiSVU VMS solution on Stand 2-B28 at Intersec Saudi Arabia 2023, which takes place from 3rd-5th October at the Riyadh International Convention & Exhibition Center. Integrated security systems Managing Director John Davies commented, “We are delighted to announce our forthcoming appearance at Intersec Saudi Arabia at the beginning of October. This will be our first appearance at the show since the pandemic but follows up on several connections and conversations that we started back in June when we held our Security Technology Showcases in both Riyadh and Dammam." "TDSi has been selling products in Saudi Arabia since the 1990s and customers have benefitted from our integrated security systems on many different projects, but this event is the perfect opportunity to see our latest GARDiS products and to learn more about the exciting possibilities they offer.” Vision 2030 projects Vision 2030 projects is an initiative in the Kingdom that is implementing reforms in the public sector A key focus for TDSi at Intersec Saudi Arabia will also be how it can help customers with its Vision 2030 projects, an initiative in the Kingdom that is implementing unprecedented reforms in the public sector, the economy, and society as a whole. In early 2023, TDSi’s International Business Development Director Phil Tennent attended a UK Department of International Trade event focusing on Security Technology and had the opportunity to talk to many companies in Saudi Arabia regarding their Vision 2030 projects. GARDiS and GARDiSVU TDSi’s GARDiS ecosystem of access control software and hardware systems delivers a highly scalable cloud-based solution that utilises wireless technology for ease of installation and use. It is perfect for any secure access control application, including Access Control as a Service. (ACaaS). The recently launched GARDiSVU video management solution, TDSi’s first hybrid-cloud-based CCTV offering, synchronises directly with and complements the GARDiS range, providing customers with a complete solution. Vision 2030 projects John added, “The GARDiS range is the ideal solution for the exciting Vision 2030 projects that are driving the Saudi Arabia security market." "Intersec Saudi Arabia is a great opportunity to see the GARDiS range in person and to meet our expert team who will be available to discuss specific projects as well as broader security requirements. If you are attending the event, be sure to visit TDSi on Stand 2-B28.”
Yet another significant milestone for Ajax Systems. Since August 31, the following Ajax devices are officially Grade 3 certified: Hub Hybrid (2G) MultiTransmitter Fibra StreetSiren Fibra StreetSiren DoubleDeck Fibra HomeSiren Fibra KeyPad Fibra Grade 3 systems Grade 3 systems are used in large enterprises and high-risk facilities where enhanced security is demanded. Ajax systems can cover jewellery and arms stores, banks and financial institutions, ATMs, and other facilities requiring a Grade 3 security level. All devices are already available to order. Stock-keeping units (SKU) Ajax is set to introduce more Grade 3 devices at the Ajax Special Event online on October 20 The stock-keeping units (SKU) remain the same for all devices that receive a Grade 3 certificate. To avoid misunderstanding, packages, and stickers will have a Grade 3 mark to distinguish certified devices. And that’s not all. Several more Ajax devices are in the process of certification. Ajax is set to introduce more Grade 3 devices at the Ajax Special Event online on October 20. Secure a spot and register to hear a thorny yet exciting journey to Grade 3. It’s all about new opportunities Opportunities mean entering new markets and giving the partners a great way to scale. The installers and security companies can cover new objects and build cutting-edge, comprehensive Grade 3 security systems based on the available Ajax devices plus third-party new wired equipment or devices already installed at the facility. MultiTransmitter Fibra The module supports NC, NO, EOL, 2EOL, and 3EOL connections, which makes updating the security system more flexible MultiTransmitter Fibra can integrate any wired dry contact detector into the system. The module supports NC, NO, EOL, 2EOL, and 3EOL connections, which makes updating the security system more flexible. With EOL’s resistance measuring, a unique tool for wired security systems, all values can be assigned automatically to make installation quicker and more comfortable. Saving time and costs A professional set of tools will help save time and costs on installation and make setup and maintenance an easy remote task: Automatic line scanning: The feature finds physically connected Fibra devices not yet assigned to the hub and allows adding them to the system in a few taps. Thus, an installer could scan 100 machines in 10 minutes. Power consumption stress test: It helps to ensure that the system has enough power in any situation. In PRO apps, an installer launches the simulation of maximum power consumption to check the system’s response. Automatic sync with CMS: After the installation and setup, all system settings are automatically downloaded from the cloud server to PRO Desktop. The CMS engineer does not waste time transferring the devices manually. Fibra power supply calculator Professionals have access to free training at Ajax Academy and a dedicated Technical Support team which is available Moreover, professionals have access to various tools and information resources created by Ajax. Use the Fibra power supply calculator to check the security system project. Also, professionals have access to free training at Ajax Academy and a dedicated Technical Support team which is available round the clock, 365 days a year. Intuitive Ajax apps Owners of outdated wired alarm systems receive all signature Ajax technologies to experience a truly smart and reliable way of security. Intuitive Ajax apps provide remote control and all detector information in real-time from anywhere the Internet is available, on a smartphone or PC. With instant notifications, there is no chance of missing an alarm, and automation scenarios enhance security and comfort to the fullest. Availability All announced devices are already available to order. More Grade 3 devices will be disclosed soon at the Ajax Special Event on October 20.
CIAS Security, a global manufacturer of physical perimeter security systems based in Italy, announced the company's extended expansion into North America and Latin America to provide a full-time on-the-ground presence in priority geographic and vertical markets. Full-time presence in USA “While we have been exporting our systems into the United States for the past 14 years, we felt the need for a full-time presence in these very important markets,” said Raffaele De Astis, Executive Managing Director, of CIAS Security, adding “It will allow us to more effectively penetrate the Americas by expanding our reach and connecting daily with strategic partners and customers here.” With US Headquarters and a warehousing facility in Miami, Florida, USA, the expansion plan will include an additional location in Montreal, Canada, with full-time staff on the ground. High-security outdoor intrusion sensors The company is also expanding its network of integrators, installers, and distributors in North America CIAS specialises in the manufacture of high-security outdoor intrusion sensors (microwave barriers and fence detection systems) which are installed in prisons, utilities, nuclear power plants, and industrial sites in the U.S.A. The company is also expanding its network of integrators, installers, and distributors in North America and will more aggressively pursue the vertical markets of energy, corrections, and transportation, with a particular focus on airport sites. Perimeter and outdoor security systems “This expansion into the Americas will strengthen CIAS 's position as an industry pioneer in perimeter and outdoor security systems worldwide,” said Mr. De Astis, adding “It will further increase our market share in the USA, Canada, and the Americas.” He added that technical support to integrators (and end users) is a priority in this strategic move. The expanded entry into North America will take place over the next few months. High quality of service “Our existing customers will continue to receive the same high quality of service that they have come to expect," said Mr. De Astis, adding “We look forward to growing our customer base and serving this market with even greater efficiency and responsiveness.” CIAS will be attending GSX/ASIS in Dallas, Texas, in September and encourages people to visit them at Booth 1518.
Magos Systems, the pioneer in advanced AI-powered radar for perimeter protection, is proud to introduce its ground-breaking drone detection radar system, revolutionising the drone detection and protection market with a cost-effective and highly accurate AI-powered drone detection solution. Debuting at the 2023 Global Security Exchange (GSX) in Dallas, Sep 11-13, at booth 4273, the AR-300 Drone Detection Radar from Magos Systems provides a 24/7 holistic approach to countering the threat of drones by encompassing detection, classification, locating, tracking, and instant alerting. MASS+AI technology Magos’ cutting-edge MASS+AI technology not only identifies the presence of drones but can also classify birds, reducing nuisance alarms and enabling security teams to differentiate between true threats and irrelevant targets. Furthermore, the system’s ability to locate and track drones in real-time ensures precise threat assessment. Alerts are issued via the clients’ VMS, empowering security personnel to respond swiftly and effectively to potential security breaches. AR-300 Drone Detection Radar Magos radars work in conjunction with PTZ cameras and the Magos MASS+AI software that uses AI algorithms The Magos AR-300 Drone Detection Radar provides complete close-range aerial protection of >300m for miniature drones (e.g., DJI Mavic) or larger, and 360-degree airspace area coverage with a radius of 300m using four AR-300 radars and one PTZ camera. Known for their accuracy and reliability, Magos radars work in conjunction with PTZ cameras and the Magos MASS+AI software that uses purpose-built AI algorithms to classify targets as drones, birds, vehicles, or others with a high level of accuracy. Drone detection solution Designed for optimal performance under all weather and lighting conditions, Magos radar technology also significantly reduces false and nuisance alarms generated by poor environmental conditions or misidentification of detected objects. Magos’ drone detection solution offers a cost-effective alternative that is well-suited for a wide range of verticals, including stadiums, correctional facilities, critical infrastructure sites, and more. Its low power, low bandwidth communications, and small size allow for minimal site requirements and cost-effective pricing. Minimal infrastructure and installation costs Unlike traditional drone detection technologies that can be prohibitively expensive due to complex system requirements, Magos’ solution boasts minimal infrastructure and installation costs. Moreover, Magos has also implemented a unique calibration procedure for the initial setup. This process ensures precise placement of the radars relative to the surveillance cameras. Cost-effective, and adaptable solution Organisations of all types are beginning to understand the unique benefits of ground-based radar drone detection" It’s executed with minimal airtime required from a test-target drone, which not only minimises installation time and expenses but also upholds quality and performance standards. All of these factors combine to deliver an attractive, cost-effective, and adaptable solution suitable for sites of any size. “As the threats from drones and other sources continue to grow, organisations of all types are beginning to understand the unique benefits of ground-based radar drone detection,” said Yaron Zussman, General Manager, of Magos Americas. Seamless integration Relying on the experience and flexibility of the Magos’ solutions, the AR-300 Drone Detection Radar is easily integrated into any significant video management, pan-tilt-zoom cameras, and other security systems, for a complete picture of an organisation’s perimeter, both on the ground and in the air. The AR-300 Drone Detection Radar seamlessly integrates into sites equipped with Magos’ systems, with minimal additional infrastructure needed. This enhancement significantly fortifies perimeter security for sites already employing Magos’ comprehensive perimeter protection solutions and introduces an additional layer of security to address the specific threats posed by drones.
Expert commentary
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
We work with and buy from “middlemen” all the time, yet the term remains loaded with negative connotations. It’s telling that the term remains gendered, no one has tried very hard to normalise the term “middleperson” in the same way as “chairperson” or “police officer.” Why? It’s easy to see a middleman as an inconvenience, someone who skims profit off the top while offering no real value to the end customer. Think of the second-hand car salesperson or estate agent of the popular imagination. Management of added services Yet we buy from retailers and marketplaces every day without complaint. As long as we see a middleman as providing value and convenience rather than getting in the way, they’re safe. This does mean, however, that resellers and integrators need to carefully manage how they are perceived and how much their added services are valued by their customers. The risk to security integrators Security policies need to be integrated, and the way physical and cybersecurity works needs to reflect these policies Businesses have often relied on security integrators to break down silos between security systems to strengthen both physical and cybersecurity postures. Typically, these have been seen as separate, but the increase in remote working and the adoption of cloud-based physical security has blurred the lines between the physical and the digital. Security policies need to be integrated, and the way physical and cybersecurity works needs to reflect these policies, rather than a siloed approach that will mean one is more secure than the other, and security integrators can help bridge this gap. Macroeconomic headwinds, digital transformation Security integrators have also proved invaluable in filling skill gaps within organisations. Not every business can be expected to have the staff and skills needed to successfully overcome integration challenges, they may have cybersecurity and physical security experts, but perhaps not both. And if they do have experts on staff, they may lack knowledge of the cutting-edge technologies that will protect their businesses best. This unique and esteemed role of security integrators is today at risk of disruption. Macroeconomic headwinds mean that businesses are scrutinising every budget line and asking if each is necessary. Digital transformation means they are questioning old ways of doing things are the providers they worked with five years ago, or longer, the same people who are going to give them the best value today? Research findings on current trends Unfortunately, many security integrators are not keeping up with change. Our research has found that only 26% of customers consider integrators up to date with the latest technologies. Businesses rely on these providers to navigate a new and confusing security landscape and only one in four say they are confident their partners have researched the road ahead. In the past, providers may have relied on having better knowledge than their customers. But 73% of security solutions buyers are doing their research on vendors and technology. Integrators risk being underprepared to serve a market that is more and more educated in the products they are providing a dangerous situation for any middleman. Finding the gap Who needs to outsource in-depth technical knowledge of security when they have that knowledge available in-house? The research suggests a shrinking gap for security integrators. Who needs to outsource in-depth technical knowledge of security when they have that knowledge available in-house? However, the problem may not be as dire as the research first suggests as long as integrators act to address the risks they face. Education Businesses are educating themselves about the market. They want to know what is available to stay safe, both in a physical environment and from online threats. This is understandable given how the news cycle, both of these spaces have seen an increase in potential threats, and the cost of cleaning up after a ransomware or similar attack has spiralled. Any sensible business will review what they have in place and their future options. Advance industry knowledge It has never been more important for the integrator community to advance their industry knowledge. They truly are the experts, and have an in-depth understanding of the latest trends, the advancement in cloud security, and the shifting demands of users. They also need to provide better service and consultancy. As the security world gets smarter and more cloud-based, security integrators who are well-informed and educated will have a clear advantage in the market. After all, most businesses don’t want to spend time researching and upskilling in areas where they can effectively outsource. Security integrators must be able to reassure their customers that they are up to the task. Bring on added value But to thrive, security integrators need to bring more value to the table and also be seen to be providing more value The problem may be perceptions rather than the actual value that integrators can offer. If integrators are more informed than their customers realise, they need to do more to let their customers know. This could be down to being too reactive i.e., not anticipating customer needs and simply waiting for them to ask for particular services or products or not demonstrating knowledge as part of regular customer service. There is still very much of a gap for security integrators in today’s market. They can survive in this gap. But to thrive, security integrators need to bring more value to the table and also be seen to be providing more value, more than a middleman, but a provider that can advise on the right products to meet specific needs and make those products work for their customers in an integrated way. Reinventing via consultancy They need to provide consultancy so their customers understand how best to ensure online and physical security work together to keep a business safe. Most of all, they need to demonstrate their knowledge to their customers and make sure they understand the value they bring. Businesses won’t be safer by relying on their research and knowledge to buy and install security products, but if they don’t understand the benefits of a specialist integrator, they may choose this route. It’s up to security integrators to reinvent themselves as the better kind of middleman if they want to remain relevant.
The promise of electric vehicles is closer to reality than ever before. New plans and investments at the federal level designate billions of dollars to move our country toward clean energy, including $2 million to help auto manufacturers retool facilities to increase EV production. Additionally, the Biden Administration has announced a goal to create 100% carbon-free electricity by 2035 and a net-zero carbon economy by 2050. Domestic EV marketplace The domestic EV marketplace has grown from 16,000 to more than 2 million vehicles in the last decade and is poised to expand at lightning speed over the next ten years. S&P Global mobility has predicted that by 2030, electric vehicles (EVs) will make up 40% of the U.S. market share of new vehicles on the road. This dramatic increase in EVs will require a nationwide network of charging stations to meet the demand from the current 140,000 to over 1.1 million. Charging stations It is a necessity that regulators lay the groundwork now for a reliable and secure charging networkThe expansion of charging stations will undoubtedly give zero-emissions drivers more confidence in their ability to refuel more conveniently. Still, it’s critical that confidence in infrastructure security also be prioritised alongside this growth. If not adequately protected and monitored, charging stations could serve as access points for cybercriminals, potentially leading to personal data leaks, attacks on vehicle systems, and even widespread blackouts. As EVs continue to gain momentum as realistic alternatives to CO-2 emitting vehicles, it is a necessity that developers and regulators lay the groundwork now for a reliable and secure charging network for the long term. EV Charging Infrastructure and the electric grid The nation’s electric grid generates and delivers electricity essential to everyday life. It’s made up of power plants and other sources of generated electricity, complete with transmission and distribution lines and infrastructure that delivers essential power. Grid connection An important aspect to remember about EV charging stations is that they connect to their relative electric grid. Simply put, the infrastructure for charging stations is comprised of devices that wait for another device to connect and communicate. However, it lacks a third-party firewall or other devices that can act as protection. Unfortunately, this results in vulnerability and means new doors for cybercriminals to walk through. Cybersecurity risks If the grid became compromised by a large-scale attack, it could lead to destructive and widespread blackouts Even before EV charging stations are factored in, the electric grid faces substantial cybersecurity risks from criminals, terrorists, hackers, and foreign governments every day. If the grid became compromised by a large-scale attack, it could lead to destructive and widespread blackouts that would undoubtedly affect EV charging stations and other essential institutions such as banks, hospitals, and gas stations. With the expansion of EV charging stations, the risks only grow. Now is the time to address threats and strategise before disaster strikes. Risks of connectivity emerge The world we live in has reached a level of being almost entirely connected at all times – security systems, appliances, health monitors, industrial sensors, and now, our vehicles. While the connectivity of vehicles has been incredibly beneficial to consumers and the automotive industry alike, the growth in the internet of things (IoT) has opened countless doorways for cybersecurity threats. Software flaws One young information technology security specialist reported finding flaws within a third-party software that a handful of leading EV manufacturers use. It gave him access to more than 25 EVs in at least 13 countries. The man, who stumbled on the findings in 2022, said he could remotely control some EV functions, including starting vehicles, unlocking windows and doors, disabling security systems, and turning on stereo systems and flashing headlights. The IT specialist said he could also tell if a person was in the vehicle. In a separate and concerning situation, a single compromised password led to a foreign-fronted cyberattack on a U.S.-based pipeline in 2021. It halted the fuel supply process on the east coast and cost the company $4.4 million in ransom money. Cyberattacks Thousands of charging stations are already in danger of being targeted by cybercriminals The point is that even massive and powerful companies can fall victim to cyberattacks. Even though cybersecurity is a critical issue for EV manufacturers, their systems are still vulnerable to hackers. Thousands of charging stations are already in danger of being targeted by cybercriminals, and as the number of stations grows, so too will the risk. The higher the number of entry points, the more opportunities hackers will see. If they can break into and gain access to even the most sophisticated EVs, it could be catastrophic. Ensuring security and reliability through proactivity Because charging stations are connected to the country’s primary grid, the entire infrastructure must be armed with the most aggressive security measures. The risks associated with modernised electric vehicles are not something that traditional automotive safety regulations and security standards properly cover. The complicated and rapid evolution of EVs is putting them at a heightened threat. When charging stations are connected to the electrical grid, it is imperative to ensure strong cybersecurity measures are in place to remain dependable and effective. Embedding cybersecurity technology We often see outside parties utilised to secure tech because of the frequent lack of necessary cyber protection The best way to ensure the electric grid's safety is to build cybersecurity technology directly into the charging stations. We often see outside parties utilised to secure tech because of the frequent lack of necessary cyber protection. Unfortunately, the promising growth EVs and their charging stations bring to our environment also contributes to technology’s vulnerabilities, which can cause key security measures to be overlooked. There’s no getting around it: EV charging stations are highly vulnerable to hackers. Awareness and solutions As the growth continues, there is an acute need for heightened awareness and solutions for the weaknesses associated with these charging stations. These solutions should consider everything from the charging points and devices to operators of the energy distribution networks and infrastructure providers. We must aim to implement advanced cybersecurity measures that will keep safe drivers and all the data that EVs contain.
Case studies
Screencastify, the end-to-end video creation platform announced its partnership with Modern Classrooms Project, a nonprofit organisation that empowers educators to build classrooms that respond to every student’s needs. Student-centered learning Screencastify’s video creation tools will enable MCP educators with fresh resources to improve teaching outcomes and fuel the future of K-12 learning. The partnership provides all educators who are enrolled in Modern Classrooms Project’s Virtual Mentorship programme with unlimited premium access to Screencastify, helping more teachers open new possibilities by creating dynamic, differentiated instruction and student-centered learning. End-to-end platform An end-to-end platform that makes recording, editing, sharing, assessing, and viewing video simple and accessible Screencastify, an original video creation tool via an internet browser, has become an end-to-end platform that makes recording, editing, sharing, assessing, and viewing video simple and accessible, so anyone can become a more effective communicator. Nearly 13 million users worldwide have used Screencastify to make nearly 500 million videos since 2016. Full access to creative tools “Screencastify has always had a singular goal of empowering teachers and students of all kinds to improve learning through the power of video,” said Vishal Shah, CEO of Screencastify. “This next evolution of our partnership with Modern Classrooms Project ensures that teachers and mentors within their programme will have full access to our entire suite of creative tools to create the best video possible for students. We’re excited to continue to build on our partnership with Modern Classrooms Project and do our part in building the modern classroom and helping shape the classroom of the future.” Modern Classrooms Project Modern Classrooms Project has trained and certified over 700 Expert Mentors and Distinguished Educators Modern Classrooms Project is a nonprofit organisation that leads a movement of educators in implementing video to drive blended instruction in a self-paced, mastery-based instructional model that leverages technology to foster human connection, authentic learning, and social-emotional growth. Modern Classrooms Project has trained and certified over 700 Expert Mentors and Distinguished Educators who implement its instructional model effectively in classrooms all around the world. New methods “Anyone who has spent time in the classroom knows that the task at hand perpetually feels unconquerable. But one place to start is in equipping educators with new methods that fundamentally restructure how they use space and time in the classrooms,” said Kareem Farah, CEO and co-founder of Modern Classrooms Project. According to a 2021 survey, the Modern Classrooms Project has helped 85% of teachers enjoy teaching more and feel more optimistic about their future in education and has made 72% more likely to continue teaching as a career. Video creation tools “With our partnership with Screencastify, the Modern Classrooms Project is investing in supporting teachers and unleashing their capacity." The partnership puts simple yet powerful video creation tools into the hands of leading K -12 educators who will implement the classroom of the future. Seamless assignments Each educator chosen was allowed to learn how to use instructional videos to carry on the mission “Screencastify is very intuitive. So, going into the Modern Classrooms Project mentoring programme having already used Screencastify, it just made the assignments flow seamlessly,” said Cecelia Gillam, a teacher at St. Charles Parish School Board and MCP expert mentor. In 2021, Screencastify used $25,000 to recognise and sponsor 50 educators to learn the nonprofit organisation’s innovative and research-backed instructional model. Each educator chosen was allowed to learn how to use instructional videos to carry on the Modern Classrooms Project’s mission to improve learning outcomes for every student and give them more control over their education. Flexibility to pause and rewind “Screencastify does a great job of giving students the flexibility to pause and rewind the video and make notes … and give them a sense of control of their own pace of learning,” said Monte Woodard, Science Teacher at The Field School in Washington, D.C. and MCP expert mentor. Screencastify has remained laser-focused on helping empower K -12 educators with the right tools to implement blended and hybrid classroom environments that are necessary today. Screencastify is used by educators in more than 70% of U.S. school districts.
Alarming increases in vehicle thefts, unsolved traffic collisions, and stolen cargo in the Mexican State of Tlaxcala, motivated the Executive Commission of the State Public Security System (CESESP) to expand and upgrade its video security system. To counter the rise in crime, the CESESP sought a flexible, scalable, open-platform video management system (VMS) that could seamlessly incorporate existing cameras as well as over 800 new cameras and edge devices from a range of hardware and software providers. Tlaxcala Located in East-Central Mexico, Tlaxcala is one of 32 states within the Federal Entities of Mexico. With a population of approximately 1,343,000, based on the 2020 census, Tlaxcala is the smallest yet one of the most densely populated states in Mexico. The CESESP of Tlaxcala is tasked with safeguarding residents across the state's 60 municipalities. C4 centre C4 centre has multiple teams of six security professionals who monitor the system around the clock At the core of all security operations, including the 911 emergency response and 089 confidential tip line, is the CESESP's Control, Command, Communications, and Computing centre (C4). The state’s C4 centre has multiple teams of six security professionals who monitor the system around the clock on a large, 24-screen video wall. The C4 also houses the system’s HP and Lenovo servers. Flexibility, scalability, and budget “Flexibility, scalability, and strictly adhering to the budget were top requirements for this critical, state-wide project,” said Maximino Hernández Pulido, Executive Commissioner of the State Public Security System. “We considered a variety of proposals and providers, but we ultimately followed the advice of our integrator, Digital Information Systems, and selected XProtect Corporate from Milestone Systems.” XProtect Corporate The new system includes cameras from Hanwha Vision, Bosch Security and Safety Systems, Hikvision, and Pelco The new system includes cameras from Hanwha Vision, Bosch Security and Safety Systems, Hikvision, and Pelco, all integrated within the system and managed by XProtect Corporate VMS from Milestone Systems. The system is also fully integrated with the BriefCam Video Analytics Platform, delivering video intelligence for system managers to identify, monitor, investigate, and visualise incidents plus video data to make smarter decisions. Efficient and cost-effective integration “Because state officials rely on their video system 24/7, the update needed to be gradual with no downtime. As new cameras were integrated into the Milestone platform, the previous system slowly disappeared,” said Isaac Sánchez Morales, an engineer at Digital Information Systems (SDI), an integrating company. “The XProtect Corporate open platform VMS allowed us to leverage our existing cameras and servers, integrate new equipment and devices, making the process very efficient and cost-effective, and we never had a gap in service.” Data-driven video for fast response times BriefCam video analytics technology The solution detects, identifies, and classifies video metadata to drive more efficient investigations The BriefCam video analytics technology seamlessly integrates into Milestone’s XProtect Smart Client. The solution detects, identifies, and classifies video metadata to drive more efficient investigations and business decisions, such as finding missing persons, investigating the vandalism, theft, assaults, accidents, injuries, or acts of violence, as well as extracting and analysing through heatmaps, dashboards, and visualisations. The analytics have proven beneficial in accelerating investigations, attaining situational awareness, and optimising operational intelligence for enhanced video search, alerting, and data visualisation. Real-time alerts, situational awareness “We installed the BriefCam Insights and Investigator products, and regularly use the platform’s RESPOND and RESEARCH capabilities. One of the advantages of all these XProtect-integrated analytics is that operators do not have to open additional windows or enter new credentials to access them,” said Sánchez. “With this integration of technologies, operators can trigger real-time alerts based on complex object classifications and filter combinations to increase situational awareness meaning authorities can react to events as they unfold.” Proactive policing with LPR With the BriefCam RESPOND solution, object characteristics and licence plate recognition tools can be used" Sánchez added, "With the BriefCam RESPOND solution, object characteristics such as a vehicle, person, or animal, and licence plate recognition tools can be used to trigger rule-based alerts." "These tools can help overcome the challenges of urban video surveillance and drive proactive policing in Tlaxcala." Video technologies reduce state crime rates Following the comprehensive expansion of the security infrastructure, statistics from the Executive Secretariat of the National Public Security Systems revealed Tlaxcala boasted the lowest crime rate nationwide. With the modernised system in place, officials documented a 93% reduction in pilfered freight from transport companies. Similarly, vehicle theft declined by 22.5%. A cost-efficient and flexible way Milestone Interconnect provides a cost-efficient and flexible way to gain central surveillance According to Sánchez and the SDI team, it is expected that each municipality within the territory will soon have its own locally focused VMS. With the use of Milestone Interconnect, all the municipality subsystems will integrate directly with the state-wide platform. Milestone Interconnect provides a cost-efficient and flexible way to gain central surveillance of multiple sites spread across a region. C4 video surveillance operation “The integrated solution delivered through Milestone is a robust, efficient, and secure system that provides all the necessary tools for the C4 video surveillance operation,” added Executive Commissioner Hernández-Pulido. “In addition, the excellent technical and post-sales support from Milestone and SDI has led us to meet the system and performance goals we set for ourselves.”
Residents at Chapel View can receive and answer door entry requests via mobile while granting temporary access using QR codes, due to Comelit-PAC’s dedicated mobile app and use of the latest security technology. Chapel View Set in the quaint village of Gildersome in Leeds, Chapel View is an exclusive housing development, presenting seven residential homes in a discreet cul-de-sac, all secured with a communal gate. The community featured a legacy door entry system that required an upgrade to ensure the security of residents. Comelit-PAC worked with local installation specialists AC Secure from the initial design process, through the works programme to project completion. Door entry Each house has its licence and users can use the feature-rich Comelit app to control the gate Door entry, via Comelit-PAC’s VIP system, was specified, utilising its stylish Ultra door entry solution, to enable control of the gate to the housing estate. Each house has its licence and users can use the feature-rich Comelit app to control the gate while also creating QR codes to allow temporary access for visitors. Says David of the resident’s association of Chapel View, “With high expectations for our residents to deliver ultimate security, every element of the new door entry system also had to be considered from a convenience perspective, to enable them to answer door entry requests remotely, from their smartphone." Additional benefits “AC Secure worked with us right from the specification process and took the time to understand these requirements, before recommending Comelit-PAC as an ideal solution." "The additional benefits of utilising app technology to present door entry and QR codes for temporary access to visitors immediately appealed. And the system was installed with minimal disruption and a great benefit to our community." Smart home security systems Adam Cousens, Managing Director at AC Secure added, “Chapel View has the look and feel of a quaint village community where security and door entry is a high priority. All the smart home security systems had to be stylish and futureproof to suit the requirements of the community, whilst also ensuring ease of installation and simple use." “Comelit-PAC’s Ultra system with VIP technology, coordinating with its dedicated app was the natural choice for door entry." Ultra digital entrance panel The system enables new residents to grant access through the vehicle gates using Comelit’s dedicated mobile app "Residents love the sleek design and the VIP technology is easy to use and allows them the convenience to receive calls and see visitors from anywhere. The combination has truly elevated the door entry experience.” The entrance to Chapel View has been enhanced with Comelit-PAC’s stylish, flush-mounted Ultra digital entrance panel. The system enables new residents to grant access through the vehicle gates using Comelit’s dedicated mobile app. Mobile-first solution Stephen Wragg, Business Development Manager for Comelit-PAC concluded, "What our work with AC Secure at Chapel View demonstrates is how Comelit-PAC is ‘with you always.” There is no project too big or too small for us to work with our installers and partners to provide smart, yet stylish door entry solutions for residents to benefit from the latest in smart access control." "Ultra, together with VIP presents a powerful mobile-first solution that can ensure the ultimate security for this residential community.”
When talking about baseball in the United States, it’s hard not to think of the Chicago Cubs and Wrigley Field. With a history spanning more than 100 years, the Chicago Cubs are one of the most recognised teams in professional sports. Every season, millions of loyal fans flock to home games at iconic Wrigley Field. Built-in 1914, it’s the second oldest ballpark in the majors. Living up to its nickname, ‘The Friendly Confines,’ it warmly welcomes all to experience an all-American baseball game. The challenge After the completion of the 1060 Project at Wrigley Field, the Chicago Cubs sought to enhance its security technology. Following a review, the team found multiple security systems which had been installed over the years affected the safety and security team’s investigation processes. The organisation also sought a solution that would enable it to remain compliant with video retention requirements well into the future. They needed a scalable platform that would also help them become more proactive in their approach to security. Products used Genetec Security Centre: Comprehensive unified security. Security Centre Omnicast: Scalable video management. Streamvault: Streamvault security infrastructure solutions. The solution Unified ballpark security Genetec™ Security Centre allows operators to see what’s happening and respond faster By unifying all video and sensor information, Genetec™ Security Centre allows operators to see what’s happening and respond faster. They also use a map layout to easily find cameras, doors, and alarms. “We’re seeing a higher level of efficiency across our team,” said Lindsay. Scalable and reliable infrastructure Deploying Omnicast™ onboard the Streamvault™ infrastructure solution was a critical piece of the puzzle for the Chicago Cubs. Following implementation, the team ramped up processing power and storage capacity. They have space left for expansions beyond the required minimum retention requirements. Set up for future growth Plans include deploying Genetec solutions at Sloan Park in Mesa, Arizona, and the Chicago Cubs Academy in the Dominican Republic. They’re also looking at taking advantage of various analytics within the platform to enhance the guest experience. Visual and intuitive enhancements “We’re excited to use the many features of the platform, including the visual and intuitive enhancements it provides for our operators. The integration between video surveillance and access control has been a significant upgrade. Genetec has expanded our ability to have real-time visibility of our facility," said Doug Lindsay, Vice President of Security, Chicago Cubs. Results Chicago Cubs security team manages high-definition and multi-lens cameras all across the Wrigley Field campus The Chicago Cubs security team manages high-definition and multi-lens cameras all across the Wrigley Field campus from their Joint Operations Centre (JOC) through Genetec Omnicast. They also integrated an existing access control system within Security Centre and deployed multiple Genetec Streamvault appliances with built-in failover and redundancy. Scalable, feature-rich platform “Genetec is a leader in the physical security industry and delivers a platform that’s scalable, feature-rich, and progressive. To top it off, Security Centre is an open platform with hundreds of compatible integrations and had API capabilities that no other solution could match." "When we chose Genetec Security Centre, we were thinking about our objectives 10+ years down the line. That flexibility opens us up to so many other possibilities in the future,” said Steve Inman, Vice President of Technology for the Chicago Cubs.
Genetec Inc., a provider of unified security, public safety, operations, and business intelligence solutions, announced that the Carrollton-Farmers Branch Independent School District (CFBISD) in Texas has implemented a unified school security solution with Genetec™ Security Center for video surveillance and access control and Bosch Security Systems for intrusion detection. CFBISD CFBISD provides schooling for 25,000 pre-kindergarten through twelfth grade in the Dallas suburbs. The district comprises 24 elementary schools, six middle schools, five high schools, and three specialty programme centres. The overhaul was the result of a three-year bond project to refurbish older buildings and update all security systems to increase video coverage and door monitoring while implementing a standardised modern intrusion system. Need for a unified security solution There was very little standardisation across our schools and facilities" “There was very little standardisation across our schools and facilities,” Daniel Robertson, Senior Security Systems Engineer at CFBISD. He adds, “We needed a more streamlined approach to security. The upgrade wasn’t only about investing in a new unified security solution. It was a complete change of mindset in how we secured our district.” Genetec-Bosch solution Currently, the Genetec-Bosch solution has been deployed across 42 CFBISD sites, including most schools, administrative buildings, sports stadiums, transportation depots, service centres, and other facilities. At all locations, the team is using Genetec Security Center to manage nearly 2000 cameras, 50 door readers, and 600 Bosch intrusion sensors with Bosch G series intrusion panels. Video intercom setup CFBISD help facilitate responses and keep all parties on the same page in the event of an emergency They also have a video intercom setup at main entrances and are using Security Center to manage more than 7,000 cardholders, streamlining activation/deactivation. CFBISD has even given authorised School Resources Officers and district Police Chief administrative accounts, to help facilitate responses and keep all parties on the same page in the event of an emergency. Security Centre Daniel Robertson adds, “Security Center allows us to quickly investigate any situation across our facilities. All our doors and intrusion points are linked to video, so we can easily retrieve everything from one platform." "And if there’s an alarm triggered, we can click on that event and immediately know what’s going on. All this can be done quickly, so we see what’s happening and address it right away,” said Robertson.
Amthal is working with the global media production company, Gravity Media to secure all of its sites across the UK, ensuring dedicated security, fire safety, and ultimate site protection for its team and high-profile visitors. Gravity Media is a provider of cutting-edge, live creative and media services. Home to state-of-the-art equipment and world-class production facilities, with a 30-year pedigree, it leads the way in global sports and entertainment content creation. Creating an integrated system Servicing international clients from five Production Centres in White City (London), Soho (London), Chiswick, Farnborough, and Watford, Amthal was sourced to review on-site fire safety and security. The security specialist made recommendations to create an integrated system where monitoring of each site could be carried out remotely. Warren Symonds, Gravity Media Operations Director says, “Editing space to our capability needs to be practical, flexible, and efficient, but also it needs to feel like a home. Within this, we have a duty of care to ensure our team as well as our prestigious clients, feel safe and secure, using our Gravity Media Production Centres at any time of day or night, to capture live coverage from across the globe.” A full risk assessment The expensive equipment housed at each location needed controlled access alongside visual verification “Amthal was quick to understand our requirements and carried out detailed site surveys at each Gravity Media location. The team worked closely with us and offered professional advice throughout, from initial design to the organisation of a smooth installation of the bespoke CCTV, intruder, door entry, and access control. They also now ensure we achieve the requirements for fire safety and continue to maintain security on our behalf.” Amthal worked with Gravity Media, completing a full risk assessment of all sites, to establish system requirements, taking in details including the need for 24 / 7 access by authorised personnel. The expensive equipment housed at each production centre location also needed controlled access alongside visual verification to optimise security. Layered security system installation Utilising a specialist Paxton solution, Amthal designed and installed a layered security system, integrating CCTV, door entry, and intruder alarms to maintain an active presence for the safety of all staff and visitors. From a fire safety perspective, Amthal actively services its fire extinguishers for each site, including all necessary inspections to remain compliant with the latest standards. David Williamson, Sales Manager Amthal added, “Gravity Media required a unique innovative security set up, which had to be replicated between each site and also have the mechanism to integrate and communicate. It is for this reason, we work in true partnership style, right from being assigned to a dedicated risk assessment of each premise.” Traffic monitoring Our aim is always to fully meet expectations, and install discreet security to work with everyday activity" “Our aim is always to fully meet expectations, and here, to install discreet security to work with everyday activity and blend with its surroundings. This includes ensuring there is the sufficient capability to monitor the traffic across each site, at all times." "We continue to work closely with the operations team and quickly respond to any issues, with the capability to scale security and fire safety arrangements as required for the benefit of staff and clients.” Electronic fire and security solutions Independently owned, Amthal Fire & Security is dedicated to satisfying end-user needs for security safety and convenience offering design, installation, service, and remote monitoring of advanced electronic fire and security solutions, including intruder, Fire, Access, and CCTV systems. Amthal Fire & Security is accredited by the Security Systems and Alarm Inspection Board (SSAIB) United Kingdom Accreditation Services (UKAS) and British Approvals for Fire Equipment (BAFE.)
Round table discussion
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Driving the smart homes market is the convenience of simple technology solutions. Almost every home now has a “smart speaker” that makes it easier than ever for homeowners to interface and control their technology. But where does security fit into the new landscape of smart home systems? We asked this week’s Expert Panel Roundtable: What’s new in smart homes and residential security systems?
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download