Refinery security
The long-awaited trade fair for security and fire safety will open its doors from 1 to 3 November at the Bangkok International Trade & Exhibition Centre (BITEC), shining a spotlight on cutting-edge solutions for various sectors including manufacturing, smart cities, the commercial sector, transportation, and hospitality. Spanning 7,500 square metres of exhibition space, the show features over 200 exhibitors from Canada, China, India, Israel, Singapore, South Korea, Taiwan, Thailand, the Uni...
From 10 to 13 October, the global airport community will gather for the 24th edition of inter airport Europe at the Munich Trade Fair Centre in Germany. The event returns with an impressive line-up of well over 400 airport suppliers from 37 countries, including seven national pavilions and more than 100 new exhibitors. Live exhibits Visitors can look forward to plenty of live exhibits in the halls and Outdoor Area and a new 600 square metre GSE Experience Area. An exciting event programme in...
ISS (Intelligent Security Systems), a global provider of video intelligence and data awareness solutions, announced that industry veterans Dennis Connor and Jason Lloyd have joined the company as its new Director of Program Management NA and Regional Business Manager for the Midwest respectively. Dennis Connor's responsibilities Connor, who most recently served as Program/Project Manager for CX (customer experience) Initiatives at ADT, will spearhead the development of new end-user and p...
The Security Industry Association (SIA) has launched a new learning management system (LMS) – SIAcademy as part of its efforts to advance industry professionalism through premier education and training. SIAcademy SIAcademy is a living library of on-demand training and professional development programmes designed to enhance security professionals’ industry knowledge, technical skills, and overall job performance. The new LMS offers a modern, simple, and centralised p...
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming...
Dahua's latest DSS Pro V8.3 enhancement equips security personnel with advanced tools, enabling them to rapidly identify and monitor suspicious individuals' movements in just seconds. It is a cutting-edge Video Management Software (VMS) security solution designed for efficiency and scalability. It leverages users' video security systems to help them make informed decisions quickly and serves as the backbone of the operation. AcuPick Technology The key upgrades primarily focus...
News
Yubico, the globally renowned provider of hardware authentication security keys, announced that it is now publicly traded under the ticker symbol YUBICO on the Nasdaq First North Growth Market in Stockholm. Yubico announced its intent to go public on 19th April 2023, through a merger with Swedish holding company, ACQ Bure. The merger increases Yubico’s resources and ensures more organisations and consumers can be protected against a fast-growing array of cyber threats including AI-powered phishing schemes and ransomware attacks. These attacks not only result in billions of dollars in yearly losses for businesses, but threaten the safe operation of critical infrastructure and services, from government agencies to financial institutions, factories, healthcare and human rights organisations. Cybersecurity standards Today marks an exciting milestone for Yubico and our global customers and partners “Today marks an exciting milestone for Yubico and our global customers and partners,” said Mattias Danielsson, CEO, Yubico, adding “We have been a pioneer of modern, hardware-based authentication, pioneering and setting cybersecurity standards over the past 16 years." He continues, "As a publicly traded company, we look forward to building upon this in the next stage of growth, creating even more value for our customers and shareholders, and inviting others to join our journey.” Yubico Enterprise Services Yubico’s unique solutions enable organisations to address the source of 90% of cyberattacks: phishing and stolen login credentials. Its flagship YubiKey series provides phishing-resistant multi-factor authentication (MFA), based on modern authentication protocols, including FIDO2 passwordless (passkeys) and smart card PIV support. The physical security keys work seamlessly with an organisation's legacy and/or modern infrastructure. Yubico Enterprise Services deliver lower cost and value to entry, flexibility, faster rollout and seamless distribution of security keys, designed to meet an organisation wherever they are on their authentication journey. “We are proud and humbled to have built and established a global gold standard for strong authentication, and being publicly traded ensures our technology will be able to better protect millions of individuals around the world,” said Stina Ehrensvärd, Co-Founder and Chief Evangelist, Yubico, adding “This path allows Yubico to continue innovating and investing in our technology in order to meet the growing demand for strong and frictionless authentication.”
Allegion U.S., a provider of security products and solutions, unveiled the results of a new multifamily living trends survey that provides insight into the preferences and expectations of the current renters. New technologies, amenities The report, “2023 Multifamily Living Trends: A Study on What Multifamily Renters Desire, Expect and Will Pay More For in Their Residences,” analyses input from over 1,000 survey respondents who currently rent or own multifamily residences or plan to in the next two years. Beyond the value of safety, residents’ peace of mind, and the rise of mobile access control, the survey shows how COVID-19 and the influx in Proptech have accelerated the adoption of new technologies and amenities designed to enhance the lifestyles of current renters. The changing multifamily landscape Increased adoption of smart home technology, re-prioritisation of amenities, and new preferences In 2019, Allegion conducted a similar study, providing a benchmark for living trends among millennial renters. Over the last four years, the multifamily landscape has changed in significant ways both for renters and property owners, alike: the increased adoption of smart home technology, re-prioritisation of amenities, and new preferences in leasing and communication are evident. Impact of Proptech adoption, lifestyle changes “Multifamily has always been a dynamic market as a result of changing lifestyle behaviours and introduction of new property technologies,” said Connie Alexander, senior manager for primary research & insights at Allegion. “Our research reveals that we are witnessing the impact of Proptech adoption and lifestyle changes following the pandemic. Property owners need to take note of these shifts to best allocate short- and long-term investments in their properties that will help attract and retain quality residents.” Key trends and challenges The key trends and challenges examined in the report are outlined below: 1) Impact of Proptech on Multifamily Residences - In 2021, $24.3B was invested into Proptech companies globally, with a focus on the multifamily market. Proptech can help attract responsible, high-quality residents and provide enhanced and safer cross-property amenities, lower operating costs and increase revenue. 61% of survey respondents said they are comfortable using Proptech. Smart locks, resident portals, and cameras were included in these preferences. According to the survey results, 51% of renters who make more than $100,000 per year view smart home technology as a need-to-have amenity and 48% of those same renters view Proptech as a must-have. More than one in two respondents would be willing to pay one to 10% more for property technology and nearly three in 10 would pay at least 11% more. 2) The Rise of Mobile Access Control - With most of the population having access to smartphones the rise of mobile access control provides renters with a convenient and secure way to access different parts of their multifamily property. Over 59% of respondents would likely select a future place of residence if it had mobile access control offered as an amenity. Compared to the 2019 study, there was an 82% increase (to 34% from 19%) in the number of respondents who would be willing to pay more for mobile access control that would allow them to remotely monitor entry of their home and give access to guests and others. 3) Amenities That Attract Based on New Behaviours - COVID-19 had a profound and lasting effect on consumer behaviour and lifestyles. Multifamily residents are no different. According to Pew Research, 70% of individuals will continue with the at-home habits they adopted during the pandemic. When asked about considerations for a future place of residence, respondents ranked free Wi-Fi as the most important amenity, behind affordability and proximity to work and school. Among those working remotely (15% remote, 20% hybrid work lifestyles among respondents), fast and reliable Wi-Fi is the most important factor when looking for a place of residence. Home security systems, smart home technologies, and upgraded building materials ranked more important overall than fitness centres and pools. 4) Value of Safety and Resident Peace of Mind - According to the 2021 World Risk Poll by the LP Foundation, 37% of people in the U.S. feel less safe than they did just three years ago. Fewer than one in three respondents feel secure in all areas of their home, and about one in five do not feel secure in the basement, living room, and/or patio. Up to 140% from 2019, 22% of respondents currently use electronic door locks that are connected to the internet. And up 91% from 2019, 23% of respondents currently use electronic door locks that are not connected to the internet. More than one in three respondents would be willing to pay more for smart doorbells with video, outdoor cameras, and mobile access control. Six in 10 would pay between one and 10% more per month for these added security features. Only 19% of respondents are comfortable giving their family and friends access codes or keys to their unit. However, 47% are comfortable hiding keys to their apartment around the exterior of their home in the event they get locked out. 5) Leasing Preferences That Convert - A survey released from the National Apartment Association’s Apartmentalise 2022 conference found over 60% of property managers cite creating efficient day-to-day operations as one of their top three challenges. Efficient communication with prospective and current residents can enable a positive ROI and a differentiating experience for renters that results in increased attraction and retention. 16% of respondents noted inattentive property management as a top three dealbreaker when considering a future place of residence. More than three in four respondents are at least somewhat comfortable with all four self-guided tour scenarios below, and less than 10% are either somewhat or very uncomfortable with them. Take a self-guided tour that allows users to freely explore a community. Take a self-guided tour with detailed instructions on what users can explore. Living in a community that allows potential tenants to explore the area on a self-guided tour. Taking a self-guided tour and having the ability to immediately sign a lease before leaving. According to the survey, residents with incomes of over $100,000 per year are statistically more comfortable navigating self-guided tours and signing a lease directly following. When asked how valuable different amenities were in a future residence, a streamlined resident portal app was ranked number one with 39% of respondents saying it was a must-have and 50% a nice-to-have.
Teledyne FLIR, part of Teledyne Technologies Incorporated announced the release of its new FLIR FC-Series AI, the latest model in its signature fixed camera (FC) series. The FC-Series AI is a thermal security camera with onboard AI analytics that accurately classifies humans and vehicles for early intrusion detection for perimeter protection and remote site monitoring. FC-Series AI With video analytics that combine deep neural network (DNN)- and motion-based analytics, the FC-Series AI offers industry-pioneering intrusion detection, enabling users to expand situational awareness and make better-informed decisions that increase safety and improve coordination and efficiency. Featuring a premium thermal sensor with 640 × 512 full resolution, the FC-Series AI camera creates images based on the heat emitted by humans and objects, rather than relying solely on visible light. Thermal security camera features FC-Series AI enables security operators to see and detect intruders, even in complete darkness, rain, fog, and smoke The thermal imager supports an industry-pioneering thermal sensitivity of <25 milliKelvin (mK), one of the best Noise Equivalent Temperature Difference (NETD) values on the market, enabling the sensor to outperform other thermal cameras whose visibility and detection rates decrease in adverse conditions. Offering eight, high-performance lenses ranging from an 8.6° × 6.6° to a 90° × 69° field of view, the FC-Series AI enables security operators to see and detect intruders, even in complete darkness, rain, fog, and smoke. DNN- and motion-based video analytics The FC-Series AI also combines DNN- and motion-based video analytics for reliable detection, empowering security managers to differentiate between true threats and nuisance alarms. Using FLIR’s curated library of thousands of thermal images, FLIR DNN analytics are trained to classify objects in real-world situations where humans or vehicles may be slightly obscured or challenging to identify or if an intruder attempts to deceive the system. The FC-Series AI also offers target geolocation capabilities and precise handoff to a pan-tilt-zoom device for streamlined target tracking. Perimeter protection, cybersecure solution FC-Series AI camera offers security professionals a high-performing, dependable, and cybersecure solution" “Our new FC-Series AI cameras elevate the possibilities for customers to tighten their perimeter protection strategy,” said Seetha Sasikala, Global Product Solutions Manager at Teledyne FLIR. “Combining DNN- and motion detection-based analytics, industry-pioneering thermal sensitivity, and the widest range of high-performance lenses on the market, the FC-Series AI camera offers security professionals a high-performing, dependable and cybersecure solution for intrusion detection.” NDAA-compliant, IK-10 rated device Designed to maximise the performance of new and existing multilayered physical security systems, the FC-Series AI camera tightly integrates with FLIR UVMS, as well as other third-party video management systems, and is supported by FLIR Nexus software. As an NDAA-compliant device, the FC-Series AI camera offers security professionals extensive cyber protection and peace of mind. With rugged, weatherproof IP66 and IP67 and vandal-proof IK10 ratings, the FC-Series AI provides durable housing.
Integrated Access Control and Security manufacturer TDSi announces it will be showcasing its GARDiS Platform and talking about its new GARDiSVU VMS solution on Stand 2-B28 at Intersec Saudi Arabia 2023, which takes place from 3rd-5th October at the Riyadh International Convention & Exhibition Center. Integrated security systems Managing Director John Davies commented, “We are delighted to announce our forthcoming appearance at Intersec Saudi Arabia at the beginning of October. This will be our first appearance at the show since the pandemic but follows up on several connections and conversations that we started back in June when we held our Security Technology Showcases in both Riyadh and Dammam." "TDSi has been selling products in Saudi Arabia since the 1990s and customers have benefitted from our integrated security systems on many different projects, but this event is the perfect opportunity to see our latest GARDiS products and to learn more about the exciting possibilities they offer.” Vision 2030 projects Vision 2030 projects is an initiative in the Kingdom that is implementing reforms in the public sector A key focus for TDSi at Intersec Saudi Arabia will also be how it can help customers with its Vision 2030 projects, an initiative in the Kingdom that is implementing unprecedented reforms in the public sector, the economy, and society as a whole. In early 2023, TDSi’s International Business Development Director Phil Tennent attended a UK Department of International Trade event focusing on Security Technology and had the opportunity to talk to many companies in Saudi Arabia regarding their Vision 2030 projects. GARDiS and GARDiSVU TDSi’s GARDiS ecosystem of access control software and hardware systems delivers a highly scalable cloud-based solution that utilises wireless technology for ease of installation and use. It is perfect for any secure access control application, including Access Control as a Service. (ACaaS). The recently launched GARDiSVU video management solution, TDSi’s first hybrid-cloud-based CCTV offering, synchronises directly with and complements the GARDiS range, providing customers with a complete solution. Vision 2030 projects John added, “The GARDiS range is the ideal solution for the exciting Vision 2030 projects that are driving the Saudi Arabia security market." "Intersec Saudi Arabia is a great opportunity to see the GARDiS range in person and to meet our expert team who will be available to discuss specific projects as well as broader security requirements. If you are attending the event, be sure to visit TDSi on Stand 2-B28.”
Yet another significant milestone for Ajax Systems. Since August 31, the following Ajax devices are officially Grade 3 certified: Hub Hybrid (2G) MultiTransmitter Fibra StreetSiren Fibra StreetSiren DoubleDeck Fibra HomeSiren Fibra KeyPad Fibra Grade 3 systems Grade 3 systems are used in large enterprises and high-risk facilities where enhanced security is demanded. Ajax systems can cover jewellery and arms stores, banks and financial institutions, ATMs, and other facilities requiring a Grade 3 security level. All devices are already available to order. Stock-keeping units (SKU) Ajax is set to introduce more Grade 3 devices at the Ajax Special Event online on October 20 The stock-keeping units (SKU) remain the same for all devices that receive a Grade 3 certificate. To avoid misunderstanding, packages, and stickers will have a Grade 3 mark to distinguish certified devices. And that’s not all. Several more Ajax devices are in the process of certification. Ajax is set to introduce more Grade 3 devices at the Ajax Special Event online on October 20. Secure a spot and register to hear a thorny yet exciting journey to Grade 3. It’s all about new opportunities Opportunities mean entering new markets and giving the partners a great way to scale. The installers and security companies can cover new objects and build cutting-edge, comprehensive Grade 3 security systems based on the available Ajax devices plus third-party new wired equipment or devices already installed at the facility. MultiTransmitter Fibra The module supports NC, NO, EOL, 2EOL, and 3EOL connections, which makes updating the security system more flexible MultiTransmitter Fibra can integrate any wired dry contact detector into the system. The module supports NC, NO, EOL, 2EOL, and 3EOL connections, which makes updating the security system more flexible. With EOL’s resistance measuring, a unique tool for wired security systems, all values can be assigned automatically to make installation quicker and more comfortable. Saving time and costs A professional set of tools will help save time and costs on installation and make setup and maintenance an easy remote task: Automatic line scanning: The feature finds physically connected Fibra devices not yet assigned to the hub and allows adding them to the system in a few taps. Thus, an installer could scan 100 machines in 10 minutes. Power consumption stress test: It helps to ensure that the system has enough power in any situation. In PRO apps, an installer launches the simulation of maximum power consumption to check the system’s response. Automatic sync with CMS: After the installation and setup, all system settings are automatically downloaded from the cloud server to PRO Desktop. The CMS engineer does not waste time transferring the devices manually. Fibra power supply calculator Professionals have access to free training at Ajax Academy and a dedicated Technical Support team which is available Moreover, professionals have access to various tools and information resources created by Ajax. Use the Fibra power supply calculator to check the security system project. Also, professionals have access to free training at Ajax Academy and a dedicated Technical Support team which is available round the clock, 365 days a year. Intuitive Ajax apps Owners of outdated wired alarm systems receive all signature Ajax technologies to experience a truly smart and reliable way of security. Intuitive Ajax apps provide remote control and all detector information in real-time from anywhere the Internet is available, on a smartphone or PC. With instant notifications, there is no chance of missing an alarm, and automation scenarios enhance security and comfort to the fullest. Availability All announced devices are already available to order. More Grade 3 devices will be disclosed soon at the Ajax Special Event on October 20.
According to the first-ever World Security Report, large, companies lost a combined $1 trillion in revenue in 2022 due to physical security incidents. Economic unrest is expected to be the greatest security-impacting hazard in the next 12 months, a significant increase from the prior year. The report also found that companies anticipate a surge in threats and hazards like social unrest, climate change, fraud and theft. As a result, physical security budgets are predicted to increase significantly to keep people, property and assets safe. Security providers intend to focus investments on advanced technology and provide security professionals with additional skills and training. World Security Report documents Fraud–deception intended to result in gain–is likely to be the biggest external threat over the coming year. The leaking of sensitive information is predicted to be the biggest internal threat. Dangers posed by hackers, protestors, spies and economic criminals are expected to soar. Commissioned by Allied Universal®, the world’s pioneering security and facility services provider, and its international business, G4S, the World Security Report documents the opinions of 1,775 chief security officers (CSO) or those in equivalent positions from 30 countries. Working for large, companies with a combined annual revenue of more than $20 trillion–a quarter of the world’s gross domestic product, CSO participation was independent and anonymous. Author's quote We commissioned this report for the benefit of the entire industry and the companies we protect" “As the world’s pioneering security company, we commissioned this report for the benefit of the entire industry and the companies we protect. It comes at a time when organisations across the globe are increasingly navigating more complex security hazards and threats." He adds, "The research shows the impact of security threats on organisations is multidimensional–from the disruption of productivity to the loss of customers to the potentially staggering financial impact,” said Steve Jones, Allied Universal’s global chairman and CEO. Impact of security incidents One in four (25%) companies reported a drop in their corporate value following an external or internal security incident during the last 12 months. In addition to CSOs, the report also surveyed 200 global institutional investors to understand the impact of security incidents on the value of publicly traded companies. Investors estimated an average 29% drop in stock price in the wake of a significant internal or external security incident in the last 12 months. Balancing physical and cybersecurity Executive boards are grappling with balancing physical and cybersecurity alongside other priorities “Global businesses are facing increased security threats; a tight labour market globally; and rapidly changing technology that presents new risks and requires different skills. In addition, executive boards are grappling with balancing physical and cybersecurity alongside other priorities." "The World Security Report helps our entire industry and the wider business community better understand and operate in the challenging, global and fast-moving security landscape,” said Ashley Almanza, executive chairman of G4S, Allied Universal’s international business. Key findings Key findings from the World Security Report: Security threat and incident findings Economic unrest was reported by 47% as the greatest security-impacting hazard in the next 12 months-up from 39% in the previous year. Climate change events are on the rise and the second most concerning hazard, with 38% saying they may be impacted in the next year. This was followed by social unrest (35%), disruption to energy supplies (33%) and war or political instability (32%). Leaking of sensitive information is expected to be the biggest internal threat in the next 12 months according to 36% of respondents. Misuse of company resources or data was the most common internal incident with 35% of companies having experienced this already over the last 12 months. Fraud is expected to be the biggest external threat in the next year, predicted by 25% of CSOs. Fraud and phishing and social engineering were the most common external security incidents experienced in the last 12 months (23%). The threat from two groups, subversives, hackers, protestors, or spies and economic criminals, are likely to soar, with 50% and 49% of respondents predicting they will be impacted by these groups, both up from 39% in the last year. Security budgets Security budgets represented approximately $660 billion (3.3%) of global revenue at respondent companies in 2022. Physical security budgets at 46% of respondent companies are set to significantly increase in the next 12 months. Artificial intelligence (AI) is top of the agenda for future physical security technology investment, with 42% intending to invest in AI and AI-powered surveillance over the next five years. The future of security insights Cyber threats that threaten physical security systems are challenging to operations according to nine out of 10 respondents. CSOs reported a disconnect between physical security incidents and the importance placed on them at the board level; nine in 10 CSOs said company providers are more concerned about cyber than physical security. Eight in 10 (84%) said recruitment of security professionals will be challenging over the next five years. Nine in 10 (92%) said people skills are more important than physical attributes of strength in front-line security professionals.
Expert commentary
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Security systems represent a significant investment, yet many organisations still only use a small percentage of their physical security systems’ capabilities. That’s before we even begin to consider the different ways that the likes of video, access control and ANPR can add additional value beyond security by serving the needs of other business functions. Whether that be to obtain additional insight, streamline compliance or drive operational efficiencies. Consumption gap When users aren’t tapping into the full power of the solution they bought, they aren’t realising their full return on investment. This creates a consumption gap. It’s a situation that has the potential to go in one of two very different directions. A misreading of a system, its capabilities and functionality can fast result in user discontent Left unchecked a consumption gap can create frustration for system integrators, manufacturers and end users alike. A misunderstanding of a system, its capabilities and functionality can quickly result in user dissatisfaction. Leading to a greater likelihood that they’ll look to change or focus investment into overlapping and likely competing solutions. Customers’ security goals Addressed appropriately it can help manufacturers, system integrators and end users to build trusted partnerships in which everybody wins. Understandably, systems integrators are primarily focused on installation—delivering reliable solutions that meet customers’ security goals to ensure their long-term success. However, engagement can go beyond deployment. Closing the consumption gap can be a strategic way to differentiate yourself from competitors. The deeper you understand your customer’s business, the better advice you’re able to offer—and the stronger the partnership you form. Why do consumption gaps exist? For customers, finding the time to learn multiple capabilities of a security system can be time-consuming. Often, taking advantage of new tools and solutions takes a backseat to the urgency of daily tasks. Often, taking use of new tools and keys takes a backseat to the speed of daily tasks There are many reasons why customers may not be taking full advantage of the features available to them in their security platform. They may feel overwhelmed by a steep learning curve after deployment and might delay diving into the additional system features. Sometimes, there might be a lack of awareness of the technology’s full capabilities, and despite a willingness to learn, there are few options for training. Often, it can simply be they are not aware of the benefits of their system or are too busy with day-to-day and urgent tasks to learn other features. Bridging the consumption gap Systems are built to deal with a wide variety of use cases and broaden market appeal, but the goal isn’t to get everyone to use all the features of every product. You want to guide your customers towards the features and functionality that best meet their needs. This could entail reducing the friction they experience in their day-to-day operations, solving unique issues related to their business, or addressing their most important challenges. Having these conversations with your customers deepens your relationship and can organically open up new revenue streams. Continuous engagement allows you to recommend other relevant products or services that they may find helpful. Customised training plan Customers can learn at their own pace and gradually expand their understanding of their system Furthermore, customers are often not able to implement all features at once. You can help by proposing a plan to gradually evolve systems and processes over time. This could include a customised training plan to get the most value from their investment. Some manufacturers are also now providing learning management tools that system integrators can pass on to their customers. Customers can learn at their own pace and gradually expand their understanding of their system in accordance with their bandwidth. This allows them to get more out of their system. Simplifying deployment With the right software partners, systems integrators can focus on solving customer problems, not reactively troubleshooting issues. Look for manufacturers who offer good support systems for integrators. This includes not only quality technical support but also configuration and training services you can build on. Look for partners that offer tools and consultation services you can use to complement your value-added services, either to spend less time on the basics or for specialised expertise on complex projects. Beyond support and services, one telling sign is the configuration interface and tools that you as an integrator will primarily interact with. Ask yourself whether the manufacturer invests in their back-end tools and their primary user interface. Is there a noticeable difference between these two interfaces in terms of look and feel? Does one feel more dated? Widening consumption gap The harder it is to implement upgrades, the more reticent customers are to make the changes If the end user interface is easy to use but changes on the back end are difficult, the resulting friction can contribute to the widening consumption gap. It can become too time-consuming or difficult to upgrade or make changes to the system. The harder it is to implement upgrades, the more reticent customers are to make the changes. Configuration should be painless. If the system has a solid graphical user interface, you’ll be able to interact with the software in a fluid and intuitive way. When the system is intuitive for both you and your customers, you spend less time on setup and training. You can invest more attention in value-added activities. Conclusion A consumption gap could be a sign that technological innovation is outpacing people's ability to implement them in their day-to-day lives. You can work with your customers to simplify the adoption of the innovations so they can more easily implement them and realise the full value of their investment. By reviewing opportunities to bridge the consumption gap for your customers, you increase the likelihood of growing and renewing your system and service contracts. You also build relationships as a trusted partner. Customers will turn to you when looking to expand their security system and proactively solve new and incipient problems.
We believe in integrated security solutions, so while a solid gate could prevent sight lines from the house, combining it with other measures such as alarms, motion sensing lighting, and CCTV will allow a good level of surveillance to keep you and your valuables safe. Burglary prevention tips Very few burglars are opportunists; instead, they may be regularly scanning and looking for weaknesses to capitalise on. It is therefore crucial never to give a burglar an opportunity to strike. Of course, the level of security required depends on the house and the area. We've outlined some burglary prevention tips to consider when securing your home. Keep radio and lights on It’s an age-old trick but start by leaving the radio and lights on when you leave the house, to make the property appear occupied. If you have more than one car, park one on your driveway or ask a neighbour if they’d be happy to park their car there for the evening. Check back doors and gates around the perimeter of the home are locked and working effectively. Ideally, hinges and locks should be galvanised to provide added protection against rust. Choose a gate where the hinge and gate sit closely together to deter people from using the hinge as a foothold. Often our gates have the top hinge reversed so they can't be lifted off. Automated gates, motion-activated security lights Move ladders or large bins away from fences and walls, as these can be used as climbing aids Automated gates are a great way to help reduce access to the property, or grounds. As these gates block sightlines from the house, we would recommend also investing in motion-activated security lights, which will automatically illuminate an area if movement is detected. Lighting should be fitted to the front, side, and rear of the home. Move ladders or large bins away from fences and walls, as these can be used as climbing aids. Lock any tools inside your house, as these could be used to cut through security systems. Anti-burglar boundary Keep garden sheds securely locked, especially if there are high-value items in the shed such as bikes or lawnmowers. You should also padlock these to heavy, static objects so they can’t be easily shifted, should someone break in. Let nature lend a helping hand in creating an effective anti-burglar boundary on your side of any fencing, especially around any side access points. Stocking up on ‘defensive’ plants such as Berberis, Hawthorn or roses can help create an impenetrable barrier that the majority of burglars won’t want to entertain. Gravel paths and drives, trellis panel Install gravel paths and drives to make it difficult for anyone to approach the house without being heard Install gravel paths and drives to make it difficult for anyone to approach the house without being heard. Similarly, lay some gravel near any windows or doors. If you choose to add a trellis panel on top of a fence or gate which takes the overall height to over 2m, you will require planning permission. However, growing a thorny plant along the top of a 2m fence provided it does not feature any support structures does not require planning permission unless there are local restrictions in place. Check with your local planning authority first. Robust, secure perimeter fence and gate Check that the property is protected by a robust, secure perimeter fence and gate which is sufficiently sturdy to frustrate any attempts to push it over, remove any panels or parts, kick it through or climb over it. Timber fencing is easily compromised if the posts securing the panels are rotten so always seek out a fence that offers a long lifetime guarantee against rot or boring insects. Security solution We also highly recommend that you do your research before settling on a security solution. It is an extensive market of different products, and too many fall into the trap of prioritising aesthetics, without considering quality and effectiveness. One of the main culprits of poor security design is generic steel palisade fencing, commonly used for houses that back onto public areas. Beware of repeated access While it may look intimidating it does a poor job of resisting penetration. Despite its popularity and the widely held misconception that it offers an adequate perimeter security solution, it has inherent weaknesses that belie its capability. Its wide pales can hamper surveillance, while the bolted construction is a security risk. Simply removing or breaking the lower fixing on one or two pales would allow them to swing aside to give repeated access to the site without leaving any visible sign that the perimeter had been breached.
Security beat
Unmanned aerial vehicles (UAVs), or drones, present a range of threats, from the careless and clueless to the criminal. While many incidents may seem harmless, the threat to any location at any time depends on a range of factors. Drones are inexpensive for criminals to buy or make, and there are continuously improving battery, airspeed, and payload capabilities. UAVs can also fly without an RF signal to jam or hack. Fortunately, sensor technologies including radar are available for security agencies and personnel to protect assets and the public. Radio-wave signals Radar works as a deterrent by sending out a radio-wave signal using a transmitter antenna, and a small portion of that signal reflects off objects in its path and returns to a receiver antenna. The highest performing radars use an antenna technology called Active Electronically Scanning Array (AESA), which enables all-electronic reconfiguration of the antennas. When an AESA radar detects an object, it can ‘focus’ its antennas to track the object, in much the same way as the zoom on a camera does. Multiple objects can be tracked while continuing to scan. Kirkland, Washington-based Echodyne offers a radar product that brings these ESA capabilities to non-military security applications at commercial price points. Combining proprietary hardware with intelligent software, Echodyne produces a compact, solid-state, electronically scanning array Echodyne’s ESA radar Echodyne says they are reinventing radar price-performance for security applications in the ground (people, vehicles) or air (counter-UAS) domains. Combining proprietary hardware with intelligent software, Echodyne produces a compact, solid-state, electronically scanning array (ESA) radar that is affordable for commercial, law enforcement, and governmental customers. The company is backed by high profile investors, including Bill Gates, Madrona Venture Group, Vulcan Capital, NEA, and Lux Capital. “Radar is a sensor,” says Leo McCloskey, Echodyne VP Marketing. “It is most applicable when security professionals can both understand its capabilities and define risk assessment and deployment requirements that call for those capabilities. Our customers are primarily security system integrators and consultancies, which integrate the performance of radar into a sensor array that meets mission requirements.” Radar technology for border surveillance Echodyne was selected by the Science and Technology Directorate of the Department of Homeland Security (DHS) for its Silicon Valley Innovation Program (SVIP) to demonstrate the performance of its radar technology for border surveillance applications. The radar was deployed both in fixed remote surveillance towers and as a lightweight rapid deployment kit for field agents. Able to surveil ground and air domains, the radar combines versatility and commercial price with surveillance capabilities. “We set out to build the world’s best compact, solid-state ESA radar sensor, and we are demonstrating that we’ve reached that objective,” says McCloskey. “We’re excited to introduce these capabilities for other security applications.” Able to surveil ground and air domains, the radar combines versatility and commercial price with surveillance capabilities MESA technology Echodyne’s proprietary technology provides a small true electronically scanning array (ESA) radar. Unlike expensive Active ESA (AESA) phased array radars, MESA requires no physical phase shifters, thus reducing the cost, size, weight, and power by several orders of magnitude while maintaining all the benefits of fast ESA radar. Echodyne combines its MESA technology with an intelligent software suite, Acuity, to produce a configurable, software-defined radar for commercial, law enforcement, and governmental security applications. The capability is also useful for temporary events such as rallies and marathons, and many other market applications “Technology seems to make everything more available to more people over time,” says McCloskey. “What is a retail product today will be a purchased self-assembly kit tomorrow and an improvised self-made drone the following day. The Federal Aviation Administration (FAA) is diligently at work on creating rules for safe UAV operation, though any final rules remain some distance off. As drone volumes increase, delineating friend from foe in the airspace requires clear legal and regulatory frameworks, which are nascent but would help distinguish the threat of nuisance flyers from illegal overflight.” Radar sensor for security applications “Detecting and tracking airspace objects of interest is imperative for airports, chemical plants, oil and gas installations, refineries, water and energy utilities, stadiums and other public spaces”, says McCloskey. The capability is also useful for temporary events such as rallies and marathons, and many other market applications. “As with any product, our applicability will depend on variables like location, terrain, risk assessment, and existing security technologies,” says McCloskey. “Our mission is to deliver the very best radar sensor for security applications.”
Case studies
Around production environments, the main concern was always the efficiency of the production output. The risks of operational technology (OT) cybersecurity were unknown for many years. However, that all changed as the need for knowing what is connected, where it’s connected, and how it’s connected became imperative. As cybersecurity is a necessity for oil and gas, the integrity of the OT network is very crucial for the safety and operation of the Motor Oil refinery. OT cybersecurity plan Learn how Honeywell engineers and Motor Oil engineers collaborated to build out the most efficient OT cybersecurity plan with two priorities at the forefront: maintaining network security and being able to provide a safe and healthy workplace. “Honeywell was the organisation that had cybersecurity experts who were able to reach our target. With our OT DCS engineers, their mentality, and existing collaboration with Honeywell engineers, we had a solid foundation to build on,” Ioannis Minoyiannis, Head of Automation, Motor Oil.
Alarming increases in vehicle thefts, unsolved traffic collisions, and stolen cargo in the Mexican State of Tlaxcala, motivated the Executive Commission of the State Public Security System (CESESP) to expand and upgrade its video security system. To counter the rise in crime, the CESESP sought a flexible, scalable, open-platform video management system (VMS) that could seamlessly incorporate existing cameras as well as over 800 new cameras and edge devices from a range of hardware and software providers. Tlaxcala Located in East-Central Mexico, Tlaxcala is one of 32 states within the Federal Entities of Mexico. With a population of approximately 1,343,000, based on the 2020 census, Tlaxcala is the smallest yet one of the most densely populated states in Mexico. The CESESP of Tlaxcala is tasked with safeguarding residents across the state's 60 municipalities. C4 centre C4 centre has multiple teams of six security professionals who monitor the system around the clock At the core of all security operations, including the 911 emergency response and 089 confidential tip line, is the CESESP's Control, Command, Communications, and Computing centre (C4). The state’s C4 centre has multiple teams of six security professionals who monitor the system around the clock on a large, 24-screen video wall. The C4 also houses the system’s HP and Lenovo servers. Flexibility, scalability, and budget “Flexibility, scalability, and strictly adhering to the budget were top requirements for this critical, state-wide project,” said Maximino Hernández Pulido, Executive Commissioner of the State Public Security System. “We considered a variety of proposals and providers, but we ultimately followed the advice of our integrator, Digital Information Systems, and selected XProtect Corporate from Milestone Systems.” XProtect Corporate The new system includes cameras from Hanwha Vision, Bosch Security and Safety Systems, Hikvision, and Pelco The new system includes cameras from Hanwha Vision, Bosch Security and Safety Systems, Hikvision, and Pelco, all integrated within the system and managed by XProtect Corporate VMS from Milestone Systems. The system is also fully integrated with the BriefCam Video Analytics Platform, delivering video intelligence for system managers to identify, monitor, investigate, and visualise incidents plus video data to make smarter decisions. Efficient and cost-effective integration “Because state officials rely on their video system 24/7, the update needed to be gradual with no downtime. As new cameras were integrated into the Milestone platform, the previous system slowly disappeared,” said Isaac Sánchez Morales, an engineer at Digital Information Systems (SDI), an integrating company. “The XProtect Corporate open platform VMS allowed us to leverage our existing cameras and servers, integrate new equipment and devices, making the process very efficient and cost-effective, and we never had a gap in service.” Data-driven video for fast response times BriefCam video analytics technology The solution detects, identifies, and classifies video metadata to drive more efficient investigations The BriefCam video analytics technology seamlessly integrates into Milestone’s XProtect Smart Client. The solution detects, identifies, and classifies video metadata to drive more efficient investigations and business decisions, such as finding missing persons, investigating the vandalism, theft, assaults, accidents, injuries, or acts of violence, as well as extracting and analysing through heatmaps, dashboards, and visualisations. The analytics have proven beneficial in accelerating investigations, attaining situational awareness, and optimising operational intelligence for enhanced video search, alerting, and data visualisation. Real-time alerts, situational awareness “We installed the BriefCam Insights and Investigator products, and regularly use the platform’s RESPOND and RESEARCH capabilities. One of the advantages of all these XProtect-integrated analytics is that operators do not have to open additional windows or enter new credentials to access them,” said Sánchez. “With this integration of technologies, operators can trigger real-time alerts based on complex object classifications and filter combinations to increase situational awareness meaning authorities can react to events as they unfold.” Proactive policing with LPR With the BriefCam RESPOND solution, object characteristics and licence plate recognition tools can be used" Sánchez added, "With the BriefCam RESPOND solution, object characteristics such as a vehicle, person, or animal, and licence plate recognition tools can be used to trigger rule-based alerts." "These tools can help overcome the challenges of urban video surveillance and drive proactive policing in Tlaxcala." Video technologies reduce state crime rates Following the comprehensive expansion of the security infrastructure, statistics from the Executive Secretariat of the National Public Security Systems revealed Tlaxcala boasted the lowest crime rate nationwide. With the modernised system in place, officials documented a 93% reduction in pilfered freight from transport companies. Similarly, vehicle theft declined by 22.5%. A cost-efficient and flexible way Milestone Interconnect provides a cost-efficient and flexible way to gain central surveillance According to Sánchez and the SDI team, it is expected that each municipality within the territory will soon have its own locally focused VMS. With the use of Milestone Interconnect, all the municipality subsystems will integrate directly with the state-wide platform. Milestone Interconnect provides a cost-efficient and flexible way to gain central surveillance of multiple sites spread across a region. C4 video surveillance operation “The integrated solution delivered through Milestone is a robust, efficient, and secure system that provides all the necessary tools for the C4 video surveillance operation,” added Executive Commissioner Hernández-Pulido. “In addition, the excellent technical and post-sales support from Milestone and SDI has led us to meet the system and performance goals we set for ourselves.”
Ipsotek, an Eviden Business at Atos Group, has announced that it was appointed to provide its AI video analytics technology at the soon-to-be-opened new Midfield Terminal Building at Abu Dhabi International Airport, in Abu Dhabi, UAE. Delivered in partnership with Atlas Security, deployment of Ipsotek’s AI video analytics solutions is anticipated to improve operations, security, and safety across various areas of the Midfield Terminal Building, which is renowned for its iconic architecture and recently gained international attention as a filming location for Mission: Impossible - Dead Reckoning Part One. Advanced surveillance capabilities Ipsotek's AI video analytics technology is well-equipped to address these circumstances Safety and security are clearly paramount in any airport environment, and Ipsotek's AI video analytics technology is well-equipped to address these concerns. The advanced surveillance capabilities of the solution enable operators to detect and identify potential threats across various zones of the airport. By leveraging intelligent algorithms and machine learning, the system can recognise suspicious behaviours, unauthorised access attempts, or other pre-defined security risks in real time, allowing for swift response and mitigation. Ipsotek's AI video analytics By leveraging Ipsotek's cutting-edge video analytics solutions, the airport aims to enhance its security measures by effectively detecting abandoned baggage scenarios. Security teams at the airport will be able to quickly identify and respond to any unattended baggage, reducing potential security risks and ensuring a safe environment for passengers and staff. "The deployment of Ipsotek's AI video analytics solutions at the Midfield Terminal Building signifies a significant leap forward for the aviation industry," said Sophiene Marzouk, Ipsotek’s UAE Country Manager. Sophiene Marzouk adds, "We are proud to collaborate with Atlas Security to deliver state-of-the-art technology that enhances operations, security, and safety in one of the world's most iconic airport buildings." Ipsotek's solutions Ipsotek's solutions also play a crucial role in optimising queue management and crowd control “Atlas Security aspires to implement the best technology for security systems in airports and we therefore look to partner with companies bringing innovation in security applications with Artificial Analytics. One company that brings this cutting-edge technology is Ipsotek and Atlas Security is proud to work in the Midfield Terminal Building with Ipsotek,” said Khizer Rehman, Project and Technical Manager at Atlas Security. Ipsotek's solutions will also play a crucial role in optimising queue management and crowd control throughout the airport. By analysing video feeds, the software can determine queue lengths and alert airport staff to potential bottlenecks. New standards for excellence The intelligent system will empower operators to proactively manage queues, allocate resources effectively, and ensure a smooth flow of passengers. As travellers eagerly anticipate the unveiling of the Midfield Terminal Building, the deployment of Ipsotek's AI video analytics solutions is set to improve the airport experience, from safety to security and operations setting new standards for excellence in the aviation industry and turning an impossible mission into a successful deployment.
Residents at Chapel View can receive and answer door entry requests via mobile while granting temporary access using QR codes, due to Comelit-PAC’s dedicated mobile app and use of the latest security technology. Chapel View Set in the quaint village of Gildersome in Leeds, Chapel View is an exclusive housing development, presenting seven residential homes in a discreet cul-de-sac, all secured with a communal gate. The community featured a legacy door entry system that required an upgrade to ensure the security of residents. Comelit-PAC worked with local installation specialists AC Secure from the initial design process, through the works programme to project completion. Door entry Each house has its licence and users can use the feature-rich Comelit app to control the gate Door entry, via Comelit-PAC’s VIP system, was specified, utilising its stylish Ultra door entry solution, to enable control of the gate to the housing estate. Each house has its licence and users can use the feature-rich Comelit app to control the gate while also creating QR codes to allow temporary access for visitors. Says David of the resident’s association of Chapel View, “With high expectations for our residents to deliver ultimate security, every element of the new door entry system also had to be considered from a convenience perspective, to enable them to answer door entry requests remotely, from their smartphone." Additional benefits “AC Secure worked with us right from the specification process and took the time to understand these requirements, before recommending Comelit-PAC as an ideal solution." "The additional benefits of utilising app technology to present door entry and QR codes for temporary access to visitors immediately appealed. And the system was installed with minimal disruption and a great benefit to our community." Smart home security systems Adam Cousens, Managing Director at AC Secure added, “Chapel View has the look and feel of a quaint village community where security and door entry is a high priority. All the smart home security systems had to be stylish and futureproof to suit the requirements of the community, whilst also ensuring ease of installation and simple use." “Comelit-PAC’s Ultra system with VIP technology, coordinating with its dedicated app was the natural choice for door entry." Ultra digital entrance panel The system enables new residents to grant access through the vehicle gates using Comelit’s dedicated mobile app "Residents love the sleek design and the VIP technology is easy to use and allows them the convenience to receive calls and see visitors from anywhere. The combination has truly elevated the door entry experience.” The entrance to Chapel View has been enhanced with Comelit-PAC’s stylish, flush-mounted Ultra digital entrance panel. The system enables new residents to grant access through the vehicle gates using Comelit’s dedicated mobile app. Mobile-first solution Stephen Wragg, Business Development Manager for Comelit-PAC concluded, "What our work with AC Secure at Chapel View demonstrates is how Comelit-PAC is ‘with you always.” There is no project too big or too small for us to work with our installers and partners to provide smart, yet stylish door entry solutions for residents to benefit from the latest in smart access control." "Ultra, together with VIP presents a powerful mobile-first solution that can ensure the ultimate security for this residential community.”
Qognify, a provider of video and enterprise incident management solutions, has announced that The University of Vermont has transitioned to Qognify VMS. The next-generation enterprise-class video management system (VMS) has been deployed to improve how the university Police Dispatch team manages real-time emergency events, as well as post-incident investigation and daily on-campus surveillance. Challenge Many schools, colleges, and universities rely on their video management systems (VMS) as the hub of their surveillance operations. However, as they look to the future and realise the benefit of taking an integrated approach to managing their campus-wide security plans, the road ahead can be unclear, with a variety of systems and solutions available at a wide range of price points. This was the challenge The University of Vermont had been facing. CCTV monitoring via VMS An extensive and expanding CCTV camera network positioned in and around the buildings by UVM for safety An extensive and expanding CCTV camera network positioned in and around the buildings and grounds owned or controlled by UVM is a cornerstone of its safety and security operations. This infrastructure is relied upon by the Police Dispatch Team, a group of on-site officers who monitor live camera feeds, coordinate the response to an incident, and use the footage to conduct investigations. This operation relies on the performance of the university’s VMS. For many years, UVM has entrusted its VMS requirement to Qognify, a provider of video and enterprise incident management solutions with a wealth of expertise in the education sector. IP video surveillance solution The university initially deployed its open-platform IP video surveillance solution, NiceVision, before migrating to VisionHub in 2017, taking advantage of continuous advances in VMS technology. As a result, its estate of almost 500 cameras (predominantly IP cameras from AXIS) and CBORD CS access control system were integrated, with cameras mapped to entry and exit points around the campus. Qognify VMS When Qognify eventually announced the launch of its next-generation enterprise-class VMS – Qognify VMS in 2022, UVM was excited about its capabilities to improve how its Police Dispatch team managed real-time emergency events, as well as for post-incident investigation and daily on-campus surveillance. This is why UVM was one of the first organisations to make the transition to Qognify VMS. The university opted for an on-premise deployment, transferring UVM’s entire camera estate onto Qognify VMS. Simultaneous working of VisionHub, QVMS The university is required by the police to keep 30 days of recorded camera footage so that they can review it" During the rollout, it was vital that the duties of the Police Dispatch team would be uninterrupted. Harlan Howard, Equipment Technician at the University of Vermont’s CATcard Service centre, states, “The university is required by the police to keep 30 days of recorded camera footage so that they can review it if an incident is reported." Harlan Howard adds, "Together with Qognify, we decided to run VisionHub and QVMS side by during the deployment. The transition took place over 60 days and was very smooth. In fact, throughout the process, the Police Dispatch team was already using Qognify VMS as its sole interface for accessing the video.” Benefit of QVMS Create and conduct ‘virtual’ patrols A major benefit for the Police Dispatch team that Qognify VMS delivers is the ability to quickly create and conduct ‘virtual’ patrols. A route around the campus is designed and the relevant cameras are selected. Live feeds from these cameras are automatically cycled and displayed on one of the monitors. Harlan Howard comments, “The feedback we have from the police is that this is one of their favorite features of Qognify VMS. In essence, this proactive monitoring has given them an extra patrol, which has resulted in them being able to catch more people in the act.” Video footage export, streamlined process Another advantage is the ease with which video footage can be exported for evidence purposes. “It was quick before, but Qognify VMS makes it much easier for officers to share video regardless of their technical skill level,” notes Harlan Howard. In addition to the improvements for the Police Dispatch team, the new system is also making life easier for UVM’s CATcard Service centre to manage its expanding camera network. “It is now a much more streamlined process,” said Harlan Howard. adding “It may take half an hour to physically install a camera, but it is the work of a few minutes to add it to the network via Qognify VMS.” Remote management During the pandemic, the previous VMS enabled administrative staff to monitor live camera feeds remotely This speed of installation and camera management has helped UVM as it grows the number of cameras in use around the campus. A good example of this is the University’s Fleming Museum of Art, housing Vermont’s most comprehensive collection of art and anthropological artifacts. During the pandemic, the previous VMS enabled administrative staff to monitor live camera feeds remotely. CAT card With its doors open to visitors, the number of cameras has been increased to more than 30, and the live monitoring through Qognify VMS helps provide peace of mind to exhibiting artists that their work is being kept safe. Cameras are also being used to monitor transaction points at unattended dining facilities around the campus, where students can purchase food using their CAT card (identification and debit card). Again, connected to the network and managed by Qognify VMS. Result: quick and efficient management Looking to the near future, the university is looking to take advantage of a Homeland Security Grant to increase and improve camera coverage across the campus. Harlan Howard stated, “The positive experience of the Police Dispatch team in using Qognify VMS is driving the initiative to expand our surveillance operations. They recognise that more cameras integrated into the system will lead to them dealing with more incidents quicker and more effectively”. Harlan concludes, “For us in the CATcard Service centre, Qognify VMS means we can provide better support to the police and be far more efficient in how we manage and maintain our core security systems.”
Genetec Inc., a provider of unified security, public safety, operations, and business intelligence solutions, announced that the Carrollton-Farmers Branch Independent School District (CFBISD) in Texas has implemented a unified school security solution with Genetec™ Security Center for video surveillance and access control and Bosch Security Systems for intrusion detection. CFBISD CFBISD provides schooling for 25,000 pre-kindergarten through twelfth grade in the Dallas suburbs. The district comprises 24 elementary schools, six middle schools, five high schools, and three specialty programme centres. The overhaul was the result of a three-year bond project to refurbish older buildings and update all security systems to increase video coverage and door monitoring while implementing a standardised modern intrusion system. Need for a unified security solution There was very little standardisation across our schools and facilities" “There was very little standardisation across our schools and facilities,” Daniel Robertson, Senior Security Systems Engineer at CFBISD. He adds, “We needed a more streamlined approach to security. The upgrade wasn’t only about investing in a new unified security solution. It was a complete change of mindset in how we secured our district.” Genetec-Bosch solution Currently, the Genetec-Bosch solution has been deployed across 42 CFBISD sites, including most schools, administrative buildings, sports stadiums, transportation depots, service centres, and other facilities. At all locations, the team is using Genetec Security Center to manage nearly 2000 cameras, 50 door readers, and 600 Bosch intrusion sensors with Bosch G series intrusion panels. Video intercom setup CFBISD help facilitate responses and keep all parties on the same page in the event of an emergency They also have a video intercom setup at main entrances and are using Security Center to manage more than 7,000 cardholders, streamlining activation/deactivation. CFBISD has even given authorised School Resources Officers and district Police Chief administrative accounts, to help facilitate responses and keep all parties on the same page in the event of an emergency. Security Centre Daniel Robertson adds, “Security Center allows us to quickly investigate any situation across our facilities. All our doors and intrusion points are linked to video, so we can easily retrieve everything from one platform." "And if there’s an alarm triggered, we can click on that event and immediately know what’s going on. All this can be done quickly, so we see what’s happening and address it right away,” said Robertson.
Round table discussion
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Driving the smart homes market is the convenience of simple technology solutions. Almost every home now has a “smart speaker” that makes it easier than ever for homeowners to interface and control their technology. But where does security fit into the new landscape of smart home systems? We asked this week’s Expert Panel Roundtable: What’s new in smart homes and residential security systems?
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download