Remote security
In recent years, remote working has become the norm for many professionals operating in a wide range of different sectors. To take full advantage of the convenience and flexibility this brings, secure and convenient remote access to the systems they need to do their jobs has become mission-critical. That’s where workplace solutions pioneer - WEYTEC comes in. The Swiss-based IT company has developed a new software receiver, smartREMOTE, aimed at offering secure and flexible remote access t...
Eagle Eye Networks, the global pioneer in cloud video surveillance, launched the latest in a suite of cabinet systems that empower businesses to put high-performance AI-powered security cameras wherever they’re needed outdoors, including remote locations without power or internet. Cabinet systems can be standalone or an extension of an existing video surveillance system. They come equipped with Eagle Eye’s signature cybersecurity protections and AI-capabilities—such as AI...
Altronix, the pioneer in power and data transmission for the professional security industry, offers a new solution for remote security installations, highlighted with the new NetWaySP4TCW53. This 4-port outdoor hardened 802.3bt PoE switch provides a reliable and flexible means of powering the latest IP devices in remote locations – from industrial sites and city surveillance to critical infrastructure and transportation hubs. NetWaySP4TCW53 An integrated rapid battery charger provides e...
DNAKE, a global pioneer in IP video intercom and smart home solutions, is excited to introduce its latest innovation: the DK360 Wireless Doorbell Kit. This all-in-one security solution, featuring the stylish DC300 wireless doorbell and the upgraded DM60 indoor monitor, is designed to offer effortless installation, enhanced connectivity, and user-friendly features for modern homes. Smart, durable, stylish 1. Innovative Design Meets Functionality The DC300 combines cutt...
The solar system has fascinated mankind for thousands of years. Astronomical research is looking for answers to the big questions of human existence. How big is the universe? How did it come into being? Astronomers all over the world are casting their gaze into space. However, it is not only huge space telescopes that provide spectacular images, smaller telescopes equipped with standard industrial cameras also allow backyard astronomers to look far and gain new insights. Image sensors&nb...
Morphean, Europe’s secure direct-to-cloud video solutions company, has announced a strategic partnership with Hanwha Vision, the global vision solution provider. This collaboration will deliver cutting-edge security solutions tailored to meet the evolving needs of businesses, including across retail, smart cities and banking, amid an increasingly complex threat environment. Direct-to-cloud This partnership will benefit multi-site organisations and streamline their surv...
News
Gunnebo Entrance Control has launched an innovative enhancement to its preventative maintenance offering, as a connected service to maximise equipment uptime, extend asset value, and support more sustainable operations. EntraServe Connect from the global pioneer in entrance control security solutions, enables organisations across high-demand environments, such as offices, stadia, and critical infrastructure sites, to keep their systems performing smoothly with minimal interruption. Gunnebo’s specialist teams The proactive approach maintains uptime and extends the value of each entrance control solutions Through real-time remote monitoring, Gunnebo’s specialist teams can detect potential issues early, allowing quick corrective action before issues arise. This proactive approach maintains uptime and extends the value of each entrance control solutions by reducing the need for extensive on-site maintenance and costly unexpected repairs. "Our clients rely on Gunnebo Entrance Control to ensure secure, efficient access. The launch of EntraServe Connect takes us to the next level of service offering," said Emilia Taskinen - VP of Customer Service and Recurring Revenue of Gunnebo Entrance Control. Repair requirements Taskinen added: "This connected service allows us to deliver smarter, faster maintenance and effectively prevent downtime, providing an elevated level of reliability, sustainability, scalability and peace of mind to grow with our customers." Longer-lasting equipment and reduced repair requirements contribute to lower lifecycle costs and a smaller environmental footprint, aligning with sustainable operational goals. Advanced analytics Gunnebo Entrance Control provides serial visibility into the health of each client's tools With EntraServe Connect, Gunnebo Entrance Control provides continuous visibility into the health of each customer’s equipment. Advanced analytics deliver actionable insights that enable predictive maintenance, further extending equipment longevity and reducing the frequency of in-person service visits. This responsive service not only ensures seamless people flow but also supports environmental sustainability by reducing energy usage and prolonging equipment life cycles. Gunnebo’s preventative maintenance Emilia concludes: “As businesses across the globe face increasing legislative demands for efficiency and data management, EntraServe Connect offers the proactive tools required to keep operations running smoothly and compliantly. And by combining remote monitoring with advanced diagnostics, we’re empowering our customers to take control of their equipment health, reduce operational disruptions, and extend the lifespan of their assets – all while contributing to a greener future.” EntraServe Connect is available across Gunnebo’s preventative maintenance tiers to integrate seamlessly into its full-service portfolio. The additional option of the EntraLinq app enables the management and monitoring of systems, whether on-site or remotely, at all times.
Elite Interactive Solutions is well known as a remote video guarding pioneer that uses proprietary intelligence and integration to achieve proven crime prevention, but a recent incident underscores how the company also swiftly intervenes when catastrophic or safety issues arise. Recently, Elite Security Operations Command Center (SOCC) operators took fast action after observing an unconscious individual at a client’s site. Fast action with SOCC Operators executed a voice-down and placed a call to the Phoenix Police Department (PPD) The incident took place overnight in the parking area of a Phoenix-area apartment complex. SOCC operators observed two visibly concerned people attempting to draw the attention of a nonresponsive person inside a silver-coloured Ford Focus. Operators executed a voice-down and placed a call to the Phoenix Police Department (PPD) for an emergency medical response, as the individual inside the vehicle showed no sign of consciousness. The vehicle description and location were relayed to PPD dispatch. Soon after, officers arrived on the scene and further assisted the individual in question. Real-time body movement assessment “Our operators are not only trained in crime/catastrophe prevention but also to assess body language as an indicator of what’s occurring in real-time to help emergency personnel get to the location and aid with their investigations in a safe manner,” says Elite Security Director Noel Delgado. “By assessing body movement, our operators can not only help stop crime but also help in providing medical assistance to individuals in need. Subjects tripping, falling, holding their chest/head are just some of the movements we look for when assessing medical emergencies.” 7-second live voice-down Elite leads the remote guarding and security industry with an average 7-second live voice-down to protected sites and due to its proven ability to eliminate noise and false alarms, as well as strong nationwide relationships, SOCC calls receive priority response. Whether it’s preventing crime, catastrophe, or other bad things from happening, Elite is there for its client sites, and anyone present during monitored hours to stop harm and save lives. Emergency response events Another common situation has been the observance of smoke or fires, often with arsonists caught in the act This latest incident is far from an anomaly. A scan of SOCC incidents in the past two years shows nearly 50 such emergency response events. Many are variations of the above example, in which Emergency Medical Services (EMS) were dispatched to sites to help unconscious or injured individuals, including auto accidents. Another common situation has been the observance of smoke or fires, often with arsonists caught in the act. The threat of water incidents such as burst pipes or floods are further examples of how Elite monitors the full range of potential threats to people and assets. Proactive crime prevention “Although proactive crime prevention is Elite’s primary mission and what it has become most renowned for accomplishing, the technologies and practices involved in that solution are also ideal for mitigating any potentially harmful occurrence, be it human, buildings, grounds or assets,” says Elite Founder and CEO Aria Kozak, who earlier this year was inducted into the Industry Hall of Fame. “We take all of it as seriously as serious can be and are very proud of our thousands of successes preventing manmade disasters as well as crime.”
Interface Systems, a globally renowned managed service provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analysed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Offering valuable insights to strengthen store security and protect employees, the report provides an overview of the critical challenges faced by retailers. It highlights the peak times for security incidents, the importance of interactive monitoring, and the effectiveness of advanced technologies, such as video verification and voice-down commands. Voice-down interventions "This report underscores the critical role that data-driven security strategies play in safeguarding retail environments. By leveraging interactive monitoring solutions, retail chains can effectively mitigate risks, reduce false alarms, and ensure a safer experience for both employees and customers," said Brent Duncan, CEO of Interface Systems Key findings include: Theft, Disturbances, and Loitering Dominate Security Incidents - The report identifies theft, disturbances, and loitering as the most common security threats in retail locations. Loitering incidents, in particular, led to the highest rate of police dispatches at 65.8%. Critical Times for Store Security - The data reveals that peak security risks occur during store closing times, particularly between 5:00 p.m. and 8:00 p.m. when dispatch rates are the highest. Early morning and late-night hours see minimal incidents, indicating a reduced need for escalation during these times. Highly effective deterrent By providing real-time access to remote security professionals, stores can efficiently manage incidents Effectiveness of Video Verification and Voice-Down Commands - Stores utilising video verification saw a 97% reduction in false alarms, significantly minimising unnecessary dispatches and associated penalties. Voice-down interventions proved to be a highly effective deterrent, resolving over 99.86% of incidents without requiring police involvement, reinforcing the value of real-time audio deterrence. Impact of Interactive Monitoring Solutions - The deployment of interactive monitoring solutions has proven to be effective in enhancing security and employee confidence. By providing real-time access to remote security professionals, stores can efficiently manage incidents, especially during high-risk periods like store closings. Interactive monitoring solutions Tyson Johns, SVP of Security Monitoring Operations at Interface Systems, emphasised, "Our data reveals actionable patterns that retail chains can leverage to deploy more effective loss prevention strategies." Tyson Johns adds, "The significant reduction in police dispatches through our interactive monitoring solutions demonstrates the power of technology in maintaining a secure environment."
Milestone Systems, a global provider of open-platform video management software (VMS), announced the release of the R2 2024 update to its XProtect platform. This release introduces XProtect Remote Manager, a cloud-connected service that enhances the value of Care Plus subscriptions. The update also includes improvements to user experience and expanded language support. Enhancing the Value of Care Plus As organisations increasingly seek flexible, efficient ways to manage their video security systems, Milestone is expanding the value of its Care Plus subscription. The company is introducing XProtect Remote Manager, a cloud-connected service that allows XProtect administrators to monitor the health and status of distributed XProtect installations in one view from anywhere through a browser. XProtect Remote Manager View real-time health status of devices and servers across multiple sites. Manage basic camera settings remotely. Grant or revoke reseller access to customer sites. Milestone's cloud strategy While XProtect Remote Manager is still in its early stages, it represents a significant step in Milestone's cloud strategy, laying the groundwork for future enhancements and capabilities. The latest XProtect release also includes updates aimed at improving user experience and expanding global accessibility: A new layout for video grids in Mobile Clients for Tablets, optimising space usage and enhancing visibility. Vietnamese language support added to operator clients, furthering Milestone's commitment to serving diverse markets. Additionally, Milestone has overhauled its XProtect 360 Split View plugin, improving video loading speed, reducing memory consumption, and enhancing overall stability for users working with 360-degree cameras. Responsiveness to customer needs These updates reflect Milestone's ongoing dedication to innovation and its responsiveness to customer needs. By continually refining its offerings and exploring new technologies, Milestone aims to provide video management solutions that not only meet current demands, but are also adaptable to future challenges in the security industry.
Proofpoint Inc., a cybersecurity and compliance company announced it has entered into a definitive agreement to acquire Normalyze, a Data Security Posture Management (DSPM). The acquisition is expected to close in November 2024, subject to customary closing conditions. With this acquisition, Proofpoint will further enhance its human-centric security platform with Normalyze’s AI-powered DSPM technology, allowing organisations to discover, classify and protect data at scale across SaaS, PaaS, public or multi-cloud, on-prem, and hybrid environments while prioritising the reduction of human-centric risks in data security. Addressing human risk As organisations embrace AI and generative technologies to drive innovation, the human element in data security has become increasingly critical. The widespread adoption of AI platforms, Databases as a Service (DBaaS), and Continuous Integration/Continuous Development (CI/CD) practices has created a web of interconnected data environments that security teams can struggle to secure. This rapid technological evolution has led to increased complexity and heightened risks of improper data handling as development teams focus on quick outcomes, often bypassing essential security governance. Gaps in visibility and control By implementing DSPM technology, organisations are enabled to fill the security gaps created by their teams As more access to data is granted to people and machines, gaps in visibility and control can emerge without appropriate governance or controls from security teams. This evolving landscape presents complex challenges in discovering, classifying, and securing data, leading to an increased risk of data breaches due to forgotten and misclassified data, as well as overprivileged access. Recent research from Enterprise Strategy Group reveals that over a quarter of businesses don’t know where their sensitive data is. By implementing DSPM technology, organisations are enabled to fill the security gaps created by their teams’ interactions with complex data environments and reduce the total data attack surface. Data explosion “Today, data is at risk because of human behaviour,” said Mayank Choudhary, executive vice president and general manager, of Data Security & Compliance, at Proofpoint. "Modern applications are rapidly changing, driven by small teams of developers working independently on microservices and various data sources, leading to an explosion of data." Visibility and control “These modern applications are highly interconnected, making it hard for security teams to manage the heterogeneous and ever-growing sprawl of their data." "By combining Proofpoint’s human-centric security platform with Normalyze’s pioneering DPSM technology, we can provide our customers with comprehensive visibility and control of their data posture so they can further mitigate human risk across their organisation.” Data security “With the rapid proliferation of internally developed cloud applications, and use of SaaS applications procured by teams outside of IT, security teams are faced with the daunting challenge of inconsistent visibility and control of their critical data in the cloud,” said Ravi Ithal, cofounder and chief technology officer, Normalyze. “As data has become increasingly difficult to secure, the driving force behind our mission and technology has been to help organisations secure the data they care about, wherever it is. By joining forces with Proofpoint, we can empower organisations to further improve their data security posture, reducing the risk of data breaches caused by human errors and helping them to prioritise data loss threats.” Normalyze DSPM platform It simplifies collaboration between data and security teams, enabling them to create effective security The Normalyze DSPM platform secures even the most complex data landscapes by combining insights into data, access, and risk. It simplifies collaboration between data and security teams, enabling them to create effective security and governance plans tailored to the business’ needs. Platform benefits The platform allows organisations to: Discover and classify data using AI: Normalyze’s agentless One-Pass Scanner™ leverages AI to accurately identify and classify valuable and sensitive data at scale across a wide range of data environments. Scanning is performed in place to keep data under IT control, support compliance with stringent data protection regulations, and enhance operational efficiency. Assess and prioritise risk: Risk is prioritised by impact and likelihood, providing a comprehensive view of risk accurately and at scale. The DataValuator™ assigns a monetary value to data and identifies the data stores with the highest impact of potential data loss. The Data Access Graph visualises access and trust relationships to identify human-centric risk, and the Data Risk Navigator highlights attack paths that can lead to data breaches or loss. Remediate security and compliance issues: Actionable insights and comprehensive recommendations, integrated with alerts into service management platforms, help teams address exposures such as over-permissioned access before they are exploited. The solution also streamlines compliance across 500+ benchmarks, ensuring robust adherence to regulatory standards related to data protection. Scanning and quantified risk analysis Normalyze’s in-place scanning and quantified risk analysis set it apart from other DSPM solutions, providing rapid time-to-value while minimising security and cost challenges for data and security teams. Normalyze also offers comprehensive on-premises to cloud coverage and excels in human-centric risk remediation. Normalyze’s solutions are expected to become part of Proofpoint’s offering upon the closing of the acquisition.
Securitas Technology, a global pioneer in security solutions integration and alarm monitoring, was recently awarded the 2024 National System Integrator of the Year by Axis Communications at its 19th annual Axis Connect and Converge Conference (ACCC) held in Nashville, TN. The company was recognised for its innovative solutions and dedication to meeting its clients’ needs. Securitas Technology is known for creating client-centric solutions and has successfully integrated cutting-edge technology to deliver tailored and integrated security services. Whether providing video surveillance, access control, or remote monitoring, Securitas Technology's unwavering commitment to excellence and client satisfaction drives its success. Security challenges “We are honoured to receive this recognition from Axis Communications,” said Tony Byerly, Global President and CEO of Securitas Technology. “Our shared values and focus on innovation have allowed us to create exceptional solutions for our clients, helping them navigate complex security challenges while staying at the forefront in today’s dynamic environment." Byerly added: "This award is a testament to our team’s dedication, the strength of our partnerships, and our ongoing commitment to help make your world a safer place.” Securitas Technology’s dedication “Success is built on partnerships and on behalf of Axis, it is my pleasure to congratulate Securitas Technology on being named the 2024 National System Integrator of the Year." "Securitas Technology’s dedication to their clients and the exceptional work they do solving their challenges continues to amaze me,” said Larry Newman, Senior Director of Sales, Axis Communications, Inc. Axis’ partner network Newman added: “We’re grateful for our incredible partners who continuously go above and beyond. Together we are making the world a smarter, safer place.” Axis works with more than 90,000 partners across 179 countries at every stage. Axis’ partner network includes the Channel Partner Program, the Technology Integration Partner Program, the Architecture & Engineering Program, and the Axis Developer Community.
Expert commentary
These days, business is more collaborative, adaptable and connected than ever before. In addition to offering new identities and access privileges, new applications and data also increase the attack surface available to cyber criminals, hacktivists, state actors and disgruntled insiders. These new identities need to be handled carefully. CISOs must develop an identity management strategy that is consistent across on-premises, hybrid and cloud systems. Good security is built on solid identity governance and administration (IGA) principles. From ransomware to supply chain intrusions, high-profile cybersecurity events frequently take advantage of weak identity and access management procedures. The Identity Defined Security Alliance found that 84% of organisations experienced an identity-related breach during its one-year study period. Robust IGA system Consequently, organisations need to find best-of-breed solutions for each section of the fabric Some of the most well-known cyber-attacks have not been made possible by a nation-state exploiting a remote zero-day vulnerability; rather, they have been made possible by something as basic as a hacked orphaned account. This resulted in lateral movement from an insecure platform to a high-value system, illegitimate privilege escalation or unsanctioned access to a computer system. To safeguard against such attacks, organisations must be aware of who has access to their systems and apps, and guarantee that access is revoked when it is no longer required. Here, a robust IGA system is helpful. It is not the whole picture, though; IGA is part of a larger identity fabric. A report by KuppingerCole noted that “Identity Fabrics are not necessarily based on a technology, tool or cloud service, but a paradigm for architecting IAM within enterprises.” The report pointed out that the paradigm is created using several tools and services. That’s because, contrary to marketing claims, no one vendor has a platform that provides all the needed elements. Consequently, organisations need to find best-of-breed solutions for each section of the fabric. Threats to the new corporate landscape Due to their exclusion from the corporate firewall and the security culture that comes with working on-site, remote employees and third parties are desirable targets for hackers. The transition to online office suites is another vulnerability that hackers are taking advantage of–for instance, through bogus authentication login dialogues. Additionally, hackers are using technologies like machine learning and artificial intelligence to circumvent current security tactics. A cyberattack powered by AI will imitate human behaviour and develop over time. Even publicly available information might be used by this "weaponised AI" to learn how to get past a target’s defences. CISO and the business users Attackers will finally find an entryway, but firms can protect the new perimeter–their identities It's no longer possible to secure the traditional perimeter. Attackers will eventually find an entryway, but businesses can protect the new perimeter–their identities. To defeat these threats, organisations must look again at identity and access management tools and how they are weighed against the impact on the organisation. Should you mandate multi-factor authentication (MFA) more often and earlier? Should only company-owned devices have access to networks, or should access be restricted to specific business hours or regions? Should access to sensitive information and critical systems be given just temporarily or should it be offered on a task-by-task basis? Both the CISO and the business users they assist should be asking these questions. Staying ahead of threats with identity Access control limits decrease dangers but can come with a cost. If you give your users too much access, your organisation becomes susceptible; if you give them too little, productivity suffers. But there are ways to strike a balance with security, compliance and productivity. More CISOs are turning to Zero Trust–which is based on the principle of maintaining strict access controls and not trusting anyone by default–to protect their systems from new attack types. However, Zero Trust is reliant upon having a thorough and baked-in strategy that underpins it. Other actions that companies can take include implementing automation for identity management, such as automating workflows for approval. This would significantly lessen the administrative burden and friction that security solutions like multifactor authentication (MFA) or time-restricted access to critical systems have on business users. This might include restricting access to particular devices, capping access hours during the day or enforcing MFA based on user behaviour. Identity fabric: Putting it all together Make sure your identity architecture is scalable, secure, and provides a seamless user experience These are just two elements of the identity fabric approach. Most organisations today have implemented pieces of an identity fabric, which is basically an organisation’s identity and access management (IAM) infrastructure and typically includes a mix of modular IAM solutions for multi-cloud and/or hybrid environments. Now, organisations need to define, enhance and develop this infrastructure. They must also institute guiding principles for how it should operate, meet current and future business requirements as well as identity-related cybersecurity challenges. In doing so, businesses can move past identity platforms and adopt an identity fabric perspective. The key is to make identity governance the starting point of your identity fabric strategy, ensuring seamless interoperability within your identity ecosystem. Make sure your identity architecture is scalable, secure, and provides a seamless user experience. Aligning security with business Due to the increase in knowledge workers using the cloud and working remotely, attackers are focusing on this group. These employees are easier to compromise, give access to valuable data and offer more attack targets. Knowledge workers also lack an administrator’s level of security expertise. Therefore, as part of their security fabric strategy, enterprises require a scalable IGA system. It is easier to comply with security and access regulations and takes less time for IT teams to do normal administrative activities when they invest in IGA, a crucial tenet of identity security. CISOs and boards, though, are currently looking at more than identity management. IGA is at the centre of the debate about security and governance. Taking an identity fabric-based approach, with a foundation built on modern, cloud-based IGA, will safeguard identities, increase productivity, and make staff adherence to organisational procedures easier.
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town centre stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behaviour also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorised access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimise this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorised entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
Security beat
Security applications for drones have evolved to provide benefits such as bird's-eye views of large areas, easy access to remote locations, and rapid deployment. However, to date, most drone applications have been outdoors. Not for long. Today, indoor drones are also finding unique opportunities for enhanced surveillance, security, and operational efficiency in indoor environments such as offices, warehouses, self-storage facilities, and malls. Indoor drones can navigate complex indoor spaces, providing real-time data and monitoring without the limitations of fixed cameras. New era of autonomous robotics A significant advantage of using drones indoors, as opposed to outdoors, is their ability to operate fully autonomously, circumventing U.S. Federal Aviation Administration (FAA) regulations that restrict such autonomy in outdoor environments. A new era of autonomous robotics enables drones to work seamlessly for users without the need for specialised flight training. A single security manager can oversee multiple indoor drones simultaneously with simple map clicks or prompts. A new era of autonomous robotics enables drones to work seamlessly for users Indoor monitoring and inspection Indoor Robotics is a company seeking to revolutionise indoor monitoring and inspection through its Control Bridge platform guiding indoor drones. Since its founding in 2018, Indoor Robotics has evolved through years of market engagement and product development. After initially recognising a demand for autonomous indoor monitoring, the company found that existing hardware fell short. “However, we understood the challenges of full autonomy and knew we would solve it using drones,” says Bar Biton, Marketing Manager of Indoor Robotics. Indoor Robotics has evolved through years of market engagement and product development Hardware challenges Seven years later, with the hardware challenges addressed, the company is shifting focus to continually increasing value for security managers, especially with generative AI (artificial intelligence). In 2018, the problem was charging methods, which has been solved with ceiling docking stations and five patents. “Today it’s about making indoor environments safer and even saving lives by identifying blocked emergency exits, missing safety gear, leaks, fire hazards and more,” says Biton. While indoor navigation presents challenges—such as the unreliability of GPS and the need for precision — Indoor Robotics has dedicated significant resources to achieve centimeter-level accuracy and ensure the utmost safety, maintaining a record of zero safety incidents to date, says Biton. Indoor navigation presents challenges—such as the unreliability of GPS and the need for precision Advanced AI-driven navigation systems Navigation challenges for indoor drones include manoeuvering through confined spaces, avoiding obstacles, and maintaining stable flight in varied lighting conditions. To address these, Indoor Robotics employs advanced AI-driven navigation systems, real-time 3D mapping, and robust obstacle avoidance technologies. These solutions enable drones to adapt to dynamic environments, ensuring precise and safe navigation. Additionally, the Control Bridge platform provides real-time data and monitoring, allowing drones to adjust their routes and respond to changing conditions effectively, thus enhancing their operational reliability. Highly versatile indoor drones find applications across numerous vertical markets such as retail, logistics, healthcare, and corporate settings. Key use cases encompass security surveillance, where drones monitor premises continuously; maintenance checks, especially in hard-to-reach areas; safety inspections to comply with regulations and company policies; and emergency response to provide real-time data during incidents. In warehouses, drones efficiently inspect high shelves. Healthcare facilities and data centres use them to oversee restricted zones. Additionally, corporate offices employ drones to automate after-hours security, safety and maintenance routines. Indoor Robotics employs advanced AI-driven navigation systems, real-time 3D mapping, and robust obstacle-avoidance technologies Alerts to the remote management team One Indoor Robotics client, a global tech company, deploys drones to enhance site surveillance and operational efficiency across six offices in three countries. The drones conduct regular security patrols after-hours, monitor facility activities, and ensure compliance with safety standards. This deployment has significantly improved the overall safety and security of their offices. The drones provide real-time alerts to the remote management team, enabling prompt responses to any anomalies, such as maintenance issues or unauthorised access. “The key advantage is the unified security standard provided by our Control Bridge operating system, allowing them to oversee all their sites from one centralised platform, ensuring consistent security management across all locations,” says Biton. When indoor drones co-exist with human workers, primary challenges include ensuring safety and preventing disruptions. Drones are equipped with advanced sensors and AI-driven obstacle avoidance systems to detect and navigate effectively around people. Strict operational protocols and designated flight paths are implemented to minimise interactions. Additionally, many drone operations are scheduled for after-hours to further reduce potential disruptions. “Safety is our top priority, and we invest significant resources to ensure it,” says Biton. “We are proud to report zero safety issues to date, reflecting our commitment to maintaining a secure environment for both drones and human workers.” Deploys drones to enhance site surveillance and operational efficiency across six offices in three countries Implementation of indoor drones Indoor drones are significantly more cost-effective and affordable when compared to traditional security methods like additional cameras, sensors, manpower, and even ground robots, says Biton. They cover larger areas and provide dynamic surveillance in less time, offering real-time data collection and enhanced flexibility. Unlike cameras or ground robots, drones eliminate blind spots and adapt to environmental changes autonomously. They also offer substantial indirect savings by optimising maintenance routines, according to Indoor Robotics. For instance, a drone can instantly identify issues in hard-to-reach areas, allowing for immediate, targeted responses, instead of requiring an inspector first and then a technician, thus streamlining maintenance processes. “The biggest obstacle to greater implementation of indoor drones is education and awareness,” says Biton. “Many people are not yet exposed to the concept of autonomous indoor drones and may find it hard to believe they really work.” To overcome this, Indoor Robotics focuses on creating awareness and educating customers about the reliability and benefits of the technology. Demonstrations, case studies, and clear communication about the capabilities and safety of drones are key. By showcasing successful implementations and providing hands-on experiences, Indoor Robotics seeks to build trust and drive wider adoption of indoor drone technology in security applications. Control Bridge operating system Drones are designed with strict privacy controls and advanced AI to ensure they respect privacy norms A common misconception is that indoor drones are intrusive and pose significant privacy risks. However, drones are designed with strict privacy controls and advanced AI to ensure they respect privacy norms. They operate primarily during off-hours and are programmed to avoid sensitive areas, focusing solely on enhancing security and operational efficiency. The solution also includes rigorous data protection measures to safeguard any collected information, ensuring compliance with privacy regulations and addressing concerns effectively. Soon, automation will become integral to tasks across all facility types, from manufacturing and logistics to retail and office spaces. Using Indoor Robotics’ Control Bridge operating system, facility managers will deploy fleets of robots to identify issues, collect data, and gain insights to enhance operations, maintenance, and safety. Facilities will benefit from 24/7 AI-driven monitoring, eliminating the need for occasional surveys. Managers will receive immediate alerts for any anomalies, with preventive maintenance tasks seamlessly integrated into building management platforms, ensuring optimal performance and safety. New standards in the industry The Indoor Robotics platform-agnostic approach provides flexibility and scalability. “As we continue to evolve, we support more and more platforms, enabling our clients to tailor their indoor monitoring solutions to their specific needs,” says Biton. “We believe that the future of security lies in intelligent, automated systems that can adapt to dynamic environments and provide real-time insights,” says Biton. Indoor Robotics seeks to be at the forefront of this transformation, setting new standards in the industry and paving the way for a safer, more efficient future.
ISC West 2024 mirrored a vibrant industry on the precipice of accelerated change. Factors such as the cloud, artificial intelligence (AI), edge computing, and biometrics are shaping the future of the security marketplace, and they were front-and-centre at the industry’s biggest U.S. show in Las Vegas. Foot traffic was steady and impressive, including more than 29,000 security industry professionals viewing 750 exhibitors. A torrent of eager attendees crowded the lobby on the first day and could not wait for the doors to open. When they were admitted, the wealth of technological innovation and business opportunity did not disappoint. Focus on cloud systems Cloud systems were high-profile at ISC West. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference. Meanwhile, Genetec officially launched their Security Centre SaaS platform, which aims at eliminating points of friction to enable integrators to easily embrace cloud systems from quoting and ordering to provisioning and installing. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference Cloud provider Eagle Eye Networks promoted their new “Eagle Eye 911 Camera Sharing” technology under which both non-Eagle Eye Cloud VMS customers (via Eagle Eye 911 Public Safety Camera Sharing) and Eagle Eye customers can opt to share their video feeds for use by 911 operators in case of emergency. If users opt-in, 911 operators can have access to live video as an emergency unfolds. Eagle Eye Networks provides the feature by integrating with RapidSOS call centre software. Camera locations are based on geolocation coordinates, and customers can choose if they want to participate and which cameras they want to share. Biometrics in the mainstream Biometrics were well represented at ISC West, including Alcatraz AI, which introduced an outdoor version of their biometric face recognition product. The Rock X works well despite harsh lighting. Alcatraz’s products do not have to be integrated, they communicate just like a card reader using OSDP or Wiegand protocol. “At the show, customers are excited about moving to a frictionless environment and getting rid of existing credentialing,” said Tina D’Agostin, CEO and co-founder of Alcatraz. “We are making access control frictionless, secure and private. The experience can be as passive as possible – people can just walk in.” Multiple types of authentication, and the ability to detect tailgating and stream video SAFR from Real Networks also featured biometric face recognition, emphasising feature sets, convenience, and price/performance. They offer multiple types of authentication, and the ability to detect tailgating and stream video. A new device is a small mullion mount that is “approaching the price of a card reader, factoring in the need to purchase cards,” said Brad Donaldson, Vice President and General Manager. SAFR focuses on convenience: You don’t have to take out your phone to pass through a door. Enrolment is easy by incorporating existing databases, and costs are lower than competitors, said Donaldson. The system analyses multiple points on the face, turns it into data and then encrypts it, providing a “unique signature for each person.” Credentials in Apple Wallet and Google Wallet AMAG Technology announced the compatibility of credentials with the Apple Wallet and Google Wallet. The company is also embracing a new strategic direction under President David Sullivan. They launched a new website in January, are developing dynamic resources and a partner page, and they now integrate with 120 tech partners. AMAG Technology Financial Services now enables their channel partners to offer leasing and financing options to customers. The big new booth at ISC West reflected an effort to “market different and look different,” according to the company. The big new booth at ISC West reflected an effort to “market different and look different" The new Symmetry Control Room, a command-and-control system, is a relaunch of an earlier AMAG product with enhanced features. Suitable for large enterprise customers, the software enables a big video wall to display all the various systems and incorporates all the data into a single “pane of glass.” Operators can “draw a lasso” around cameras they want to display on the video wall and can follow action across multiple camera feeds. Navigating megatrends A breakfast meeting for integrators, sponsored by Assa Abloy Opening Solutions, was built around the theme “Navigating Megatrends for Sustainable Growth." The megatrends are artificial intelligence, sustainability and cybersecurity. Related to cybersecurity, there are 350 common vulnerabilities and exposures (CVE) published per week, reflecting the continuing threat to cybersecurity. Physical security has a “data lake” of information from various physical security systems that can be an attractive target for cybersecurity breaches. Data sets can be exploited and/or poisoned. The security industry needs to apply “defence in depth” to the challenges of protecting data. “The threat landscape is always changing, and security technology is an iterative process,” said Antoinette King, i-PRO’s head of cyber convergence, one of the panellists. Natural language systems Natural language systems are a newer approach making an early appearance at ISC West Natural language systems are a newer approach making an early appearance at ISC West. Brivo, for example, has an early prototype of its “natural language search capabilities” that can answer questions such as “Who is in the office?” or “Where is Bob and what has he done?” Brivo also promoted its all-in-one door station device that combines a card reader and a camera (for facial authentication) and serves as a video intercom, thus eliminating the need for multiple devices at the door. Brivo is also emphasising tailgate prevention, facial authentication, and people counting using AI at the edge. Also promoting natural language systems was Verkada, which unveiled a beta version of its AI Search feature that embraces national language capabilities. With AI Search, users will soon be able to use natural language to search for people or items. For example, a search could be “person climbing over a fence” or “person making phone call” or “person wearing football jersey.” Verkada wants to be thoughtful with the rollout and make sure effective guardrails are implemented to prevent abuse and bias. The release should happen in the coming months. Multi-family applications Allegion is promoting the XE360 hardware lock platform in various formats, including cylindrical lock, mortise lock, deadbolt and exit trim. At the show, Allegion noted an enthusiasm for multi-family applications. “We have been surprised by the people who want to add electronics and to retrofit existing multi-family facilities to compete with newer facilities,” said Henry “Butch” Holland, Allegion’s Regional Director, Channel Sales East Region. Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec Allegion also offers an “indicator” display on its locks, showing at a glance whether a door is locked or unlocked. The “indicator” might also display “occupied” or “vacant.” Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec. Integrator M&A trends Everon looks for acquisitions in areas where they do not currently have support for national accounts A conversation with Everon at ISC West provided insights into the accelerating trend of mergers and acquisitions among the integrator community. Everon, formerly ADT Commercial, has done six acquisitions of local integrators since they changed their name last year. In targeting companies to acquire, they look for a good company with a good reputation, and they consider how the new company’s competencies complement their own. Some M&A strategy is geographic, as Everon looks for acquisitions in areas where they do not currently have support for national accounts. They also consider density, seeking to add new acquisitions in larger markets where they don’t currently have a big market share. “A lot of investment is coming into security because it is seen by investors as recession-proof,” said Michael Kennedy, VP, Mergers and Acquisitions, for Everon. Kennedy met with 95 businesses last year for possible acquisition, and the company only finalised a handful – reflecting that Everon is selective and careful that corporate cultures are aligned. “With an acquisition, the goal is to keep every customer and every employee,” said Kennedy. Voice of the customer ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. “We have every kind of problem come to the booth,” commented Heather Torrey, Honeywell’s General Manager, Commercial Security, Americas. “People are passionate, interested and very specific with their questions and comments,” she said. “We are driving a complete system, but we are flexible, helping our customers to meet their needs and not try to fit every foot into the same shoe. Sometimes meeting customer needs involves working with competitors," Torrey commented. “It truly comes back to listening to the customer, not just ‘this is what we have to offer,’” she adds. ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. Edge applications are everywhere at ISC West, and one company is promoting a new approach to expand functionality at the edge. Camera company i-PRO advocates the use of the “Docker” platform for app development, an option they offer on their cameras. Docker “containers” package deep-learning algorithms to make it easier to embed software into edge devices. Anyone can run Docker apps on i-PRO cameras that use the powerful Ambarella chip. A Docker “swarm” can combine multiple edge devices to work together and share resources. For example, the approach can increase computing power at the edge to increase the capabilities of instant analytics. It’s faster and provides better redundancies. A “distributed computing platform” ensures less latency than communicating analytics to a central server. Unification of capabilities Johnson Controls (JCI) also promotes the trend of combining multiple systems into a single pane of glass. Their “Open Blue” platform, with a security version unveiled at the show, integrates various security systems into one, combining data and monitoring device health. Basically, the system manages all resources holistically. JCI also notes a trend toward “unification of capabilities,” e.g., combining access control and video. “The scope of security is evolving from a focus on protection to a broader focus on operations,” commented Julie M. Brandt, JCI’s President, Building Solutions North America.
Fueled by mounting concerns about the cybersecurity vulnerability of U.S. ports, President Joe Biden has signed an Executive Order aimed at shoring up defences against cyberattacks. Cybersecurity initiative The cybersecurity initiative marks a significant shift in policy, empowering key agencies and outlining concrete actions to bolster defences. By empowering agencies, establishing clear standards, and fostering collaboration, the initiative aims to strengthen U.S. ports against the evolving threat of cyberattacks, safeguarding the nation's maritime economy and national security. Expanded authority for DHS The proactive approach aims to prevent incidents before they occur The Executive Order grants expanded authority to the Department of Homeland Security (DHS) and the Coast Guard to address maritime cyber threats. DHS gains the power to directly tackle these challenges, while the Coast Guard receives specific tools. The Coast Guard can compel vessels and waterfront facilities to address cyber vulnerabilities that endanger safety. The proactive approach aims to prevent incidents before they occur. Real-time information sharing Reporting any cyber threats or incidents targeting ports and harbors becomes mandatory. This real-time information sharing allows for swifter response and mitigation efforts. The Coast Guard also gains the authority to restrict the movement of vessels suspected of posing cyber threats. Inspections can be conducted on vessels and facilities deemed risky. Mandatory cybersecurity standards The standardisation aims to eliminate weak links in the chain and prevent attackers from exploiting Beyond these broad powers, the Executive Order establishes foundational elements for improved cybersecurity. Mandatory cybersecurity standards will be implemented for U.S. ports' networks and systems, ensuring a baseline level of protection across the board. This standardisation aims to eliminate weak links in the chain and prevent attackers from exploiting individual vulnerabilities. Importance of collaboration and transparency Furthermore, the initiative emphasises the importance of collaboration and information sharing. Mandatory reporting of cyber incidents fosters transparency and allows government agencies and private sector partners to work together in mitigating threats. Additionally, the Executive Order encourages increased information sharing among all stakeholders, facilitating a unified response to potential attacks. Maritime Security Directive The Executive Order encourages investment in research and development for innovative cybersecurity solutions To address specific concerns, the Coast Guard will issue a Maritime Security Directive targeting operators of Chinese-manufactured ship-to-shore cranes. This directive outlines risk management strategies to address identified vulnerabilities in these critical pieces of port infrastructure. The long-term success of this initiative hinges on effective implementation. The Executive Order encourages investment in research and development for innovative cybersecurity solutions, recognising the need for continuous improvement and adaptation to evolving threats. Recognising the urgency of cyber threats The initiative has been met with widespread support from port authorities, industry stakeholders, and cybersecurity experts who recognise the urgency of addressing cyber threats. However, some concerns exist regarding the potential burden of complying with new regulations for smaller port operators. Effective communication, resource allocation, and collaboration among all stakeholders will be crucial to ensure the successful implementation of this comprehensive plan. Enhancing cybersecurity The more impactful and noteworthy piece is the associated NPRM from the U.S. Coast Guard (USCG) “This Executive Order is a positive move that will give the U.S. Coast Guard (USCG) additional authority to enhance cybersecurity within the marine transportation system and respond to cyber incidents,” comments Josh Kolleda, practice director, transport at NCC Group, a cybersecurity consulting firm. The more impactful and noteworthy piece is the associated Notice of Proposed Rulemaking (NPRM) from the U.S. Coast Guard (USCG) on “Cybersecurity in the Marine Transportation System,” adds Kolleda. Portions of the notice of proposed rulemaking (NPRM) look similar to the Transportation Security Administration (TSA) Security Directive for the rail industry and the Emergency Amendment for the aviation industry. Coordinating with TSA on lessons learned The USCG should be coordinating with TSA on lessons learned and incorporating them into additional guidance to stakeholders and processes to review plans and overall compliance, says Kolleda. “At first glance, the NPRM provides a great roadmap to increase cybersecurity posture across the various stakeholders, but it underestimates the cost to private companies in meeting the requirements, particularly in areas such as penetration testing,” says Kolleda. Cyber espionage and threats The focus is on PRC because nearly 80% of cranes operated at U.S. ports are manufactured there “It is unclear if or how the federal government will provide support for compliance efforts. As this seems to be an unfunded mandate, many private companies will opt for the bare minimum in compliance.” “Cyber espionage and threats have been reported by the Director of National Intelligence from multiple nation-states including China, Russia, and Iran,” adds Paul Kingsbury, principal security consultant & North America Maritime Lead at NCC Group. The focus here is on the People’s Republic of China (PRC) because nearly 80% of cranes operated at U.S. ports are manufactured there, he says. Destructive malware “The state-sponsored cyber actors’ goal is to disrupt critical functions by deploying destructive malware resulting in disruption to the U.S. supply chain,” says Kingsbury. “These threat actors do not only originate in China or other nation-states but also include advanced persistent threats (APTs) operated by criminal syndicates seeking financial gain from such disruptions." "The threat actors don’t care where the crane was manufactured but rather seek targets with limited protections and defences. The minimum cyber security requirements outlined within the NPRM should be adopted by all crane operators and all cranes, regardless of where they are manufactured.” PRC-manufactured cranes Kingsbury adds, “The pioneering risk outlined in the briefing is that these cranes (PRC manufactured) are controlled, serviced, and programmed from remote locations in China." "While this is a valid concern and should be assessed, there are certainly instances where PRC-manufactured cranes do not have control systems manufactured in PRC. For example, there are situations in maritime transportation system facilities where older cranes have been retrofitted with control systems of European Union or Japanese origin.” Monitoring wireless threats “The Biden Administration’s recent Executive Order is a critical step forward in protecting U.S. ports from cyberattacks and securing America’s supply chains,” says Dr. Brett Walkenhorst, CTO at Bastille, a wireless threat intelligence technology company. “To ensure proper defence against malicious actors accessing port-side networks, attention must also be paid to common wireless vulnerabilities." "Attacks leveraging Wi-Fi, Bluetooth, and IoT protocols may be used to access authorised infrastructure including IT and OT systems. Monitoring such wireless threats is an important element in a comprehensive approach to upgrading the defences of our nation’s critical infrastructure.”
Case studies
About a year and a half ago, Peter de Jong introduced Dahua to Fred Koks, General Manager of KITT Engineering. Since then, Dahua, KITT Engineering, and Ocean Outdoor have completed five joint projects. Follow-up appointments for the next two projects are already scheduled. Looking back "Let's see what happens" was Fred's reaction when introduced to Dahua. ''We evaluate our portfolio with suppliers every year,'' he explained. "We have to. So much is changing and new technology is developing incredibly fast. You have to keep up." He knows better than anyone how mobile the market is. "Among suppliers of LED screens, there is a constant battle for market position and new technology. We all know the big providers and the market pioneers. But it is not necessarily that they are also at the forefront of technology." Working in collaboration Erwin van Domselaar, Operations & Project Manager at Ocean Outdoor, says his company dares to blindly trust the expertise of Koks and his people when choosing a particular type of LED screen. "KITT Engineering is our technical supplier. They are very good at distinguishing good products from bad ones, and we trust them completely. When they have a product they see a future in, they discuss it with us to see if we can take on a project together with it." Shopping centre - Koperwiek In Dahua's case, that first project is a screen in a shopping centre called Koperwiek – an indoor shopping centre with more than a hundred fashion-related shops – located in Capelle aan den Ijssel. "That was a relatively small project," Erwin recalls. "The screen was not too big. But the initial learnings and experience with the screen were very good before we started. And the installation itself went off without a hitch. Exactly what we expected from this product." Shopping centre - Sterrenburg Soon, a second project was launched. This time in a shopping centre called Sterrenburg in Dordrecht. "Here, not everything went smoothly right away. Not regarding the screen, but its coincidence with the shopping centre's renovation. They had just finished." "All the walls had been neatly plastered and at that moment we asked if a new cable could be drawn. Fortunately, all this was eventually dealt with and solved in a very pleasant cooperation with the project developer, but it took some time." Pure craftsmanship The third and fourth projects are true masterpieces. In Hoofddorp, KITT Engineering installed a corner screen. "A unique screen for us," says Erwin. "It is the first screen that goes around a corner. It is half a meter that goes around the corner, fitting in super nicely with the surroundings." "On paper, a huge screen of forty square meters, but when you stand there, you don't notice it because it blends in so well with the surroundings. We are always looking for something new and surprising. And a screen that turns around the corner offers a lot of new possibilities. For example, in terms of 3D content." The screen turns around the corner Fred adds, "The screen doesn't just go around the corner, it goes around the corner seamlessly. KITT is always trying to bring novelties forward so we've had corner screens before. But that was in art projects and things like that where requirements are a lot lower." "In the process, we were able to try out various techniques and we also found out that the products we had at our disposal at that time were not one hundred percent ready." Cold corner "Then Dahua came up with a prototype, we were very pleased with the 'cold corner' as we call it. It is LED on LED, without a seam." To understand how clever this feat of engineering is, it's worth realising that the margin you have to make the image seamless is the space between two LEDs. Millimeter work, on a length of ten by five meters. Zuidplein shopping centre "The fourth project was placing a screen in the atrium of Zuidplein shopping centre in Rotterdam," Peter says. "The screen was placed against a glass elevator." "When you see that, [it is] not normal the way it came together. You don't see a cable or anything. Fantastic." Westfield Mall The fifth project collaboration between Dahua, KITT Engineering, and Ocean Outdoor is an LED display screen in Westfield Mall in the Netherlands. 24/7 remote system monitoring In addition to the regular LED screen and the driving system, a screen control and monitoring system was also developed to monitor the primary system at every point. “We want to see remotely how our assets in the country are doing," Fred explains. From the video player to dysfunctional LEDs, everything can be monitored remotely. For instance, it prevents the light intensity from being too high. Something that can have major consequences in outdoor advertising.
The Salvation Army's mission is to meet human needs wherever and whenever necessary. Their presence spans 13 Western states, plus Guam, the Marshall Islands, and Micronesia. This commitment to service is supported by local programmes that are tailored to each community’s specific needs, and technology plays a crucial role in ensuring that these operations run smoothly. Addressing security challenges As part of their long-term goal to modernise security and streamline operations, the Salvation Army Western Territory turned to Verkada to address growing security challenges across more than 700 sites in diverse urban environments. "We're in some of the most colourful neighbourhoods in every major Western city, like Watts, California, and downtown Denver," says Randy Haan, Director of IT Infrastructure. "With these locations come security challenges, and having reliable surveillance and access control is critical." Centralised command for streamlined management Many systems had unreliable access control, outdated NVRs, and scattered surveillance setups Before implementing Verkada in 2017, The Salvation Army managed disparate, localised security systems that required significant maintenance and support. Many systems had unreliable access control, outdated NVRs, and scattered surveillance setups, which resulted in time-consuming troubleshooting and poor visibility in critical moments. Cloud-based approach "When we were looking at different camera systems, Verkada's cloud-based approach stood out. We didn’t need NVRs or complex server setups—it was a no-brainer," Randy explains. "Verkada’s platform centralised everything, allowing us to manage access control and surveillance from anywhere." Simplifying day-to-day operations This centralisation not only enhanced security coverage but also simplified day-to-day operations. Joshua Brown, Endpoint Security Administrator, adds, "We used to need a large team to handle security across all our sites. Now, with Verkada, we’ve reduced the need for staffing by about 50 to 70 percent for IT support, and it’s allowed us to expand security at a much faster rate." Saving over $1.5 million with Verkada’s scalable solutions Randy attributes this significant cost reduction to the elimination of hardware maintenance Since implementing Verkada, The Salvation Army Western Territory has saved over $1.5 million. Randy attributes this significant cost reduction to the elimination of hardware maintenance, reduced staffing requirements, and minimised support needs. "We’ve gone from needing a dedicated technician at each of our 240 locations to just two people managing all 3,000 cameras across these sites," Randy notes. Management from one platform "For a nonprofit like The Salvation Army, where every dollar counts, this shift has been invaluable." Joshua also points out that the ease of managing systems from one platform has been transformative. "With Verkada, I can snapshot configurations, roll them out, and get everything up and running quickly. It’s 10 times easier than before." Expanding capabilities with Verkada's integrated system In addition to security cameras, the Salvation Army has integrated Verkada’s access control solutions across many of its locations. One recent highlight is the TD52 Intercom system, which Randy and his team highly anticipated. "We’ve been waiting for an intercom system that integrates with access control and surveillance for years," Randy says. New alarm panels "Now, with the TD52, we have seamless entry management at critical locations." Joshua is also excited about the new alarm panels being rolled out. "We’ve seen legacy systems fail repeatedly, but now we can replace those with Verkada’s alarms, which offer better value and integration across our facilities." Seamless cloud migration and Azure AD integration Verkada’s cloud-based platform has made this transition easier for its security systems The Salvation Army Western Territory has been migrating to the cloud for nearly a decade, and Verkada’s cloud-based platform has made this transition easier for their security systems. "Verkada’s integration with our Azure AD was a game changer," Randy says. One-stop-shop solution "We no longer need separate systems to manage users. Everything is streamlined, adding or removing access takes seconds, and it’s all automated with our primary directory." Joshua adds, "Before Verkada, we had sites with multiple NVRs, each with different passwords, and nobody knew how to manage them. Now, it’s all in one pane of glass, and it’s much easier to handle security across all our locations." Looking forward while expanding with confidence As The Salvation Army continues to grow and expand its operations, Randy and Joshua are confident that Verkada will remain a critical part of their infrastructure. "Why wait?" Randy advises other organisations to consider a switch to Verkada. "The initial investment may seem high, but the return on investment over time is massive. You reduce staffing needs, streamline operations, and can manage everything with just a few people." Cost-saving measures With a mission as broad and impactful as The Salvation Army's, every cost-saving measure allows them to reinvest in the communities they serve. Randy sums up, "Verkada’s solutions have been invaluable for a nonprofit like us. The cost savings and ease of management allow us to focus more on what matters: helping people."
Type of Site: Apartment Building Location: Chodkiewicza 10, Warszawa, Poland The situation This housing estate, built in 2008, features outdated 2-wire wiring. It consists of two buildings, each with 48 apartments. One entrance to the housing estate and one entrance to each building. The previous intercom system was relatively old and unstable, with frequent component failures. Consequently, there is a strong need for a reliable and future-proof IP intercom solution. Solution highlights Easy Intercom Retrofitting with Existing Cables. Remote Access with App-based Features. Good Scalability for Easy Addition of New Units or Expansion. Installed products S615 4.3” Facial Recognition Android Door Station 290-S8 7” Linux Indoor Monitor (2-wire Version) Solution benefits Future-proofing: With DNAKE 2-wire IP intercom solution, residents can enjoy high-quality audio and video communication, multiple access options including remote access, and integration with surveillance systems, providing a more versatile and secure living experience. Cost Efficiency: By using existing 2-wire cables, the need for new cabling is minimised, reducing both material and labour costs. DNAKE 2-wire IP intercom solution is more budget-friendly compared to systems that require extensive new wiring. Simplified Installation: The use of existing wiring simplifies the installation process, reducing the time and complexity involved. This can lead to faster project completion and less disruption to residents or occupants. Scalability: DNAKE 2-wire IP intercom solutions are scalable, allowing for easy addition of new units or expansion as needed, making it adaptable to changing requirements.
New investment of the highest standard. Three buildings, 69 premises in total. The project wants to ensure consistency in the use of smart home devices for controlling lighting, air conditioning, roller blinds, and more. To achieve this, each apartment is equipped with a Gira G1 smart home panel (KNX system). Additionally, the project is looking for an intercom system that can secure the entrances and integrate seamlessly with Gira G1. The solution Oaza Mokotów is a high-end residential complex offering fully secured and seamless access, thanks to the integration of DNAKE’s intercom system and Gira’s smart home features. This integration allows for centralised management of both intercom and smart home controls through a single panel. Residents can use the Gira G1 to communicate with visitors and remotely unlock doors, significantly simplifying operations and enhancing user convenience. Installed products 902D-B6 10.1” Facial Recognition Android Door Station S615 4.3” Facial Recognition Android Door Station 902C-A Master Station
VIVOTEK successfully partnered with CMS, a pioneering provider of solar radiation measuring and analysis solutions, to implement an innovative Cloud Detection and All Sky Measurement system. The project aimed at delivering accurate and reliable data for applications such as weather and cloud observations, atmospheric and climate research, solar irradiance monitoring, and irradiance nowcasting for photovoltaic plants. Challenge CMS faced the challenge of developing a robust Cloud Detection and All Sky Measurement system with wide temperature and weather range and capabilities for varied harsh environmental conditions. It has to include a high-quality camera, but also a variety of internal and external environment sensors and actors. Solution Focusing on giving precise data for applications ranging from remote sensing to atmospheric study The project, focusing on delivering precise data for applications ranging from remote sensing to atmospheric research, encountered a significant hurdle in the form of the camera's mounting position–facing upward toward the sky. This orientation exposed the system to direct sunlight, snow and ice, demanding unparalleled reliability. The VIVOTEK 360 Fisheye camera, FE9382-EHV-v2, was chosen for its high-quality imaging, reliability, and durability, particularly in extreme conditions. The system All Sky Imager, featuring this VIVOTEK 360 Fisheye camera, emerged as a pivotal component in mitigating the impact of environmental extremes. Automatic Full Sky Imaging: ASI-16 provided a 360° field of sky view, automated and scheduled capturing of high-resolution images, transmission of data and images to one or two SFTP server(s), backup of data to internal memory in case of server/network problems, and video life streams. Environmental Monitoring: Temperature, humidity, and solar irradiance data were captured by high-precision external sensors and are stored in datalogger-like files as well as within the jpg images. Rugged Design: Double shielding, forced ventilation, strong air heating, and a coated quartz glass dome ensured reliable operation in harsh environments. Heating is controlled by external temperature and dew point. Extended Temperature Range: Successfully tested under an extended temperature range of −40°C to +70 °C, with a tolerance of ±3°C. Amongst others, the system is installed on two icebreaker research vessels, one operated by Australia in Antarctic, and one operated by Canada in the Arctic. VADP Integration for Bespoke UI: CMS utilised VIVOTEK Application Development Platform (VADP) to craft a bespoke user interface–a seamless, user-friendly design offering a clean and intuitive experience. References: Solution is embraced by Institutes, Universities, Scientific Research, and the Energy Sector, including maritime and Icebreaker Deployment. Conclusion The collaborative efforts between CMS Ing. Dr. Schreder GmbH and VIVOTEK have resulted in an innovative Cloud Detection and All Sky Measurement system that effectively addresses the challenges of environmental extremes. This enhanced solution not only ensures reliability in demanding conditions but also contributes significantly to scientific research and environmental monitoring. Gerhard Papst, Head of Development at CMS, is highly impressed and deeply satisfied with the performance of VIVOTEK's cameras. The scale of this collaborative project now spans over 300 sites and continues to expand.
Wire bonding is a key process in semiconductor production. Extremely fine wires with diametres of 15 to 75 micrometres create tiny electrical connections between a semiconductor chip and other components. The distances between the bond wires are often less than 100 micrometres. Wire bonding Any deviation, however small, can lead to connection errors. Wire bonding therefore requires the highest precision and forms the basis for producing high-performance electronics, which are used in many different applications. F&S BONDTEC Semiconductor GmbH from Braunau, Austria, relies on image processing technology with industrial cameras from IDS Imaging Development Systems GmbH to precisely determine wire positions and for quality assurance. Application The operator only has to change the wire or tool on the bonder occasionally and take care of loading and unloading Wire bonders are available with various degrees of automation. With manual devices, each bond position must be approached manually before the corresponding connections can be made. Semi-automatic machines automatically position the wire after the first bond to create a wire bridge. Fully automatic machines use a structure recognition system to determine the position of the chips. Here, the production of all wire bridges is completely automatic. The operator only has to change the wire or tool on the bonder occasionally and take care of loading and unloading. Image processing F&S Bondtec uses image processing with IDS industrial cameras for various tasks in the production process, especially in the semi-automatic machines of the 56i series and the automatic wire bonders of the 86 series. "Our wire bonds connect previously placed microchips or other components with different contact points on printed circuit boards and breathe life into the chips," explains Johann Enthammer, Managing Director and CTO at F&S Bondtec. Bonding parametres Ultrasonic amplitude, force, time, or the movement sequence for setting up the bonding bridges must be programmed "However, positional inaccuracies of the components can occur during the upstream processes. Our machines have to determine these positional inaccuracies using the IDS camera image and our image recognition software and update the wire bond positions accordingly." For each bonding process, parametres such as ultrasonic amplitude, force, time, or the movement sequence for setting up the bonding bridges must also be programmed in advance. The camera's image feed is also used when creating these programmes. Image recognition library For example, you can drag a wire in the live image and change its position. The axes can also be adjusted by clicking on the image. On the software side, the Austrian company relies on a specially developed image recognition library that works with position/pixel mapping, greyscale recognition, and edge detection, for example. Visual assessments of bond connections Once the bonding process is complete, the camera is used again, as Johann Enthammer explains, "After welding, the wire bonds are visually checked by the operator via the camera image." "Among other things, the position and shape of the bond bridges are assessed. The camera image therefore has more than just one function during the bonding process." uEye XCP models At just 29 x 29 x 17 millimetres, they are the smallest housed IDS cameras with C-mount Between one and seven industrial cameras are used per system. Depending on the type, these can be particularly compact and cost-effective uEye XCP models. At just 29 x 29 x 17 millimetres, they are the smallest housed IDS cameras with C-mount and have a completely enclosed die-cast zinc housing. Their screw-type USB micro-B connection and compatibility with the Vision Standard (U3V / GenICam) simplify integration. uEye CP cameras F&S Bondtec also uses uEye CP cameras. These tiny powerhouses offer maximum functionality with extensive pixel pre-processing and are also perfect for multi-camera systems thanks to the internal 120 MB image memory for buffering image sequences. Users can choose from a large number of modern CMOS sensors. They also score points with a compact housing measuring just 29 x 29 x 29 millimetres. Camera selection The small design of the models and the large number of different sensors were important criteria when selecting the camera, as was the low thermal expansion. However, the free IDS peak software development kit with all the programming interfaces and software tools required for operating and programming the cameras was also crucial. Easy-to-understand convenience functions ensure an intuitive programming experience and quick and simple commissioning of the industrial cameras. Plug-and-play functions Johann Enthammer confirmed, "The driver shows very stable runtime behaviour. The easy-to-programme API and the plug-and-play functions with running software convinced us." "This is because there are many different use cases for our systems that can be implemented with the API without any problems. Our machines can be equipped with up to seven different bond heads. A different IDS camera can be integrated into each one." Outlook In addition to standard products, the company develops special machines and customised software solutions The wire bonders from F&S Bondtec ensure stable connections in semiconductor production. With the help of integrated image processing, the manufacturing quality and productivity of the systems can be further increased and rejects avoided. At the same time, the cameras make work easier for the operators. In addition to standard products, the company develops special machines and customised software solutions that also use AI models. Efficiency, precision, and quality "We see a lot of potential for the use of artificial intelligence in our applications in the future," says Johann Enthammer. Image processing opens up completely new potential, especially in conjunction with AI, particularly in terms of efficiency, precision, and quality. And thanks to IDS's broad portfolio, the right "eye" can be found for every application - for micrometre-precise results. Camera F&S Bondtec uses various uEye industrial cameras, for example: uEye XCP - the industry's smallest housing camera with C-mount Model used: U3-3680XCP Rev.1.2 Camera family: uEye XCP uEye CP - incredibly fast, powerful, future-proof Modell used: U3-3040CP Rev.2.2 Camera family: uEye CP Customer F&S Bondtec covers the desktop bonder and tester segment worldwide and offers a wide range of production and test equipment. It extends to the desktop micro-factory, which combines all wire bonding processes and all test methods in one machine base. Since the company was founded in 1994, several thousand wire bonders and bond testers have left the factory and are in use in many laboratories, development departments, pilot production lines, and production facilities around the world.
Round table discussion
The Internet of Things (IoT) has revolutionised many industries, including physical security. By connecting physical devices to the internet, IoT technology offers significant enhancements to security systems. Benefits include real-time monitoring, remote access, and the utility of new devices such as temperature and humidity sensors. At the same time, IoT devices come with challenges, including greater cybersecurity vulnerability. We asked this week's Expert Panel Roundtable: How is the Internet of Things (IoT) impacting the physical security marketplace?
With the new year well underway, 2023 seems almost like a distant memory. However, a bit of distance might be just the thing to enable us to examine the impact of the year 2023 on the physical security marketplace. We asked this week’s Expert Panel Roundtable: What factors had the biggest impact on the security marketplace in 2023?
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
Products
White papers
Physical access control
DownloadIntegrating control access and security
DownloadThe benefits of Edge AI + Cloud for security systems
DownloadIntegrated access control: reap the benefits of connected security
DownloadFour areas to consider in frictionless access control
DownloadSecurity investments retailers should consider for their 2021 budget
DownloadOptimise your business with analytics and AI
DownloadThe healthy market for video surveillance at medical facilities
DownloadVideos
Remote security: Manufacturers & Suppliers
- ADPRO Remote security
- Climax Technology Remote security
- Software House Remote security
- Video Storage Solutions Remote security
- Verkada Remote security
- Bosch Remote security
- AMAG Remote security
- Senstar Remote security
- March Networks Remote security
- Hikvision Remote security
- CLIQ - ASSA ABLOY Remote security
- Vanderbilt Remote security
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download