Research & Testing
Milestone Systems’ data-driven video technology took another leap in 2024: Financially, by outpacing the market with 18.7 percent growth in net revenue, reaching the DKK 2 billion mark - and technologically, with the strategic acquisition of BriefCam analytics and Arcules cloud. Milestone is now ready to expand and push technology boundaries. 2024 saw a remarkable transformation and success for Milestone. Breaking new ground through the strategic acquisitions of BriefCam analytics and Arc...
IDEMIA Public Security, the pioneering provider of secure and trusted biometric-based solutions, and Tahakom, the Saudi Technology and Security Comprehensive Control Company, are expanding their strategic partnership through the signing of an extensive agreement to develop and implement local sourcing and foster continued innovation to ensure safer roads in the Kingdom. Expertise and capabilities within AI IDEMIA and Tahakom’s expanded alliance aims to develop and execute local initiativ...
In a decision that highlights the value of customer-centric innovation they hold here at TOA Canada, they're overjoyed to announce that they are bringing the technical support specialist Vitaliy Dedyukh on board as the newest member of the product development team, effective Jan 1st, 2025. A seasoned technical support specialist, they look forward to what the future of product development looks like with Vitaliy joining! Design-centric R&D innovations With a master’s degree in Elec...
Bugcrowd, the pioneer in crowdsourced security announced an alliance with Least Authority, a Berlin-based pioneer in secure use of advanced cryptographic techniques. Least Authority provides customised services to support FinTech and Web3 products through design and development, including code audits, specification reviews, and system architecture assessments. Research and development The company specialises in the research and development of distributed systems, blockchain protocols, AI/ML a...
Hikvision has hosted its 2024 HikTech Star Tour in Hangzhou, China. Over 100 tech talents from around the globe have gathered for a three-day immersive experience aimed at exploring cutting-edge innovations, sharing insights, and building a vibrant global tech community under the theme "Connecting Stars for Brilliance." In the months pioneering up to the event, Hikvision sparked a wave of creativity on global social media through the HikTech Star Show, encouraging tech enthusiasts worldwide to...
AV-Comparatives, a globally recognised independent organisation specialising in cybersecurity testing, is pleased to announce the results of its 2024 Advanced Threat Protection (ATP) Test for enterprise cybersecurity solutions. This comprehensive evaluation provides Chief Information Security Officers (CISOs) with critical insights into the efficacy of leading endpoint protection products against sophisticated, targeted cyber threats. ATP Test The ATP Test rigorously assesses each product's a...
News
HID, a worldwide pioneer in trusted identity solutions, announces that its Signo™ Readers seamlessly integrate with the UK government’s GovPass standard, built on open standards for enhanced security and flexibility. GovPass GovPass, the most secure government pass to date according to the UK government’s website, leverages open standards to ensure interoperability across different suppliers. Leveraging the UK government’s standard for card encryption and HID’s pioneering expertise in Open Supervised Device Protocols, Signo Readers underwent rigorous evaluation, testing, and certification to deliver enhanced security and compliance for government facilities. As more government departments adopt the GovPass standard, HID Signo readers offer a reliable and efficient path to compliance. Identity management “HID is committed to providing innovative solutions that support the UK government’s open standards approach to secure identity management,” said Spencer Marshal, Head of Europe at HID. “Our Signo Readers offer a compelling option for organisations seeking to achieve GovPass compliance while enhancing overall security.” Key offerings HID Signo Readers with GovPass compliance offer: Security by design: The readers were designed with the UK government's standard for card encryption and HID’s Secure Access Module for storing keys, providing the best-in-class security for government premises. Certified reliability: HID Signo readers have undergone rigorous evaluation, testing, and certification to meet all required GovPass standards. Agnostic protocol: Seamless integration with existing infrastructure, regardless of Wiegand or OSDP communications. Migration path: Users can smoothly transition to HID’s multi-technology Signo Readers, supporting custom profiles that meet GovPass Standards.
Innodisk, a pioneering global AI solution provider, has officially inaugurated Phase II of its R&D and production centre in Yilan, Taiwan. In response to the massive market demand driven by the edge AI wave, Innodisk has transformed the manufacturing plant into the group's AI core base. With the increased production capacity, Innodisk is ready to collaborate with global clients to deploy edge AI solutions. At the same time, Innodisk is also inviting global tech talent to join its teams around the world. Innodisk's innovative development Gearing Up Production to Drive AI Business Growth The year 2024 marks a period of innovative energy for Innodisk, with the simultaneous launch of new products and technologies. The latest manufacturing plant will begin production on various edge AI products, focusing on three core technologies: "AI Acceleration,” “Vision-Driven,” and “Custom Integration.” For "AI Acceleration," Innodisk's subsidiary Aetina recently launched the NVIDIA MGX Server, the group's first edge AI server. Innodisk also introduced industrial-grade CXL 2.0 memory and E1.S/E3.S edge server SSDs for AI and high-speed edge computing. "Custom Integration" displays group's core spirit of small-volume, diverse, and highly customised keys "Vision-Driven" showcases Innodisk's innovative development in edge AI machine vision, including the pioneering MIPI over Type-C extension patent technology for embedded cameras. "Custom Integration" embodies the group's core spirit of small-volume, diverse, and highly customised solutions. With the accelerated development of global edge AI and the increased production capacity of the manufacturing plant, Innodisk expects to speed up the realisation of innovative technologies and enable the effective deployment of products and AI solutions in practical scenarios. Demonstrating edge AI solutions in practice Innodisk set an AOI AI secondary inspection key for smart manufacturing to enhance production While promoting smart transformation for clients, Innodisk is also implementing these practices by transforming its production centre into a model for smart manufacturing and management. Collaborating with Aetina, NVIDIA, and through the Metropolis for Factories framework, Innodisk developed an AOI AI secondary inspection solution for smart manufacturing to enhance production line efficiency. Additionally, Innodisk's subsidiary Millitronic, in collaboration with Schneider Electric and ASPEED Technology, developed a panoramic smart visualisation remote management solution for the plant's data centre. This solution transforms traditional on-site inspections into real-time remote management, displaying data and enabling remote monitoring. Furthermore, the iCAP Air solution, announced this year, will connect multiple sensors to measure temperature, CO2, and other air indicators, providing real-time alerts for abnormal values and facilitating prompt facility management. This comprehensive application will ensure employee health and product quality. Creating a base for training AI talent With the inauguration of the Phase II manufacturing plant, Innodisk is focusing on recruiting AI-related talent. The company, which has locations in the USA, Europe, Japan, China, and more, invites global tech professionals to join its team. This expansion supports Innodisk's goal of promoting innovation and advancing edge AI solutions worldwide.
“For a couple of bucks, I know where everything is. I can't speak glowingly enough about how well this works for us. We are in the middle of nowhere; there's no Wi-Fi connectivity here, and it (RFID) still works,” said Tom Hebert, Founder and Director of Earth Sciences Foundation. Leveraging technology from HID’s RFID tags, InfraMarker's RFID system and Esri’s field mapping software, Herbert and Earth Sciences Foundation, a fossil excavation non-profit, are excavating dinosaur fossils in remote South Dakota and are experiencing an 80% improvement in workflows, reduced burden of manual data entry and administrative tasks. This frees up valuable time for the field technicians to focus on core activities like research and fossil conservation. Type of tracking system RFID ID tags are a type of tracking system that uses RF to search, identify, track, and communicate In brief, RFID ID tags are a type of tracking system that uses radio frequency to search, identify, track, and communicate with items and people. “RFID is radio frequency identification and an easy way to think about RFID tags is that they are a wireless barcode attached to an object that you can change and update. The big benefit here is that Tom and his team can update the RFID tags on fly,” explained David Chose, HID Global Sales Manager, Americas, Identification Technologies Division. “So as these bones go through the whole process of being excavated to being displayed at a museum, each step of the process can be easily updated and documented,” concluded Chose. Innovative approach's rapid adoption “Using HID’s RFID tag technology, GIS mapping, and geospatial curation, we can see the life of this fossil from the time we found it in the ground, to the time we put it in storage, to the time we prep it, clean it, restore it and display it in the museum. This allows people to follow the adventure of this bone from beginning to end. It also allows us and other scientists to do better research, collaborate easier and exchange ideas faster,” stated Hebert. The solution proved to be a resounding success. Within just five days, the excavation team had seamlessly catalogued 347 fossils, demonstrating this innovative approach's rapid adoption and efficiency gains. “This project is the proof that any organisation that needs to track and manage assets across space and time will benefit from incorporating RFID with the GIS,” said Mike Klonsinski, President of Berntsen.
Matrix, a pioneering force in the Security and Telecom industry, successfully concluded its participation at the MSP India Summit 2024 in New Delhi. With over three decades of experience, Matrix engaged with industry pioneers, gained valuable insights, and explored fresh collaboration opportunities. Technology-driven solutions Matrix remains steadfast in its commitment to delivering innovative, technology-driven solutions with a strong emphasis on customer satisfaction. This dedication is evident in the in-house research and design efforts, which drive the development of cutting-edge products. With 40% of the workforce focused on continuous innovation in R&D, they’ve built a diverse portfolio of over 60 advanced products spanning four key domains. The global presence is powered by an extensive network of 4,000+ partners, supporting a user base of more than one million worldwide. Safety and security sector Matrix gains deeper insights into emerging trends and client preferences within the safety and security sector Matrix operates exclusively through this partner ecosystem, underscoring the commitment to exceptional solutions and lasting partnerships in the technology industry. During the summit, Matrix engaged in discussions and networking sessions with experts and professionals from various IT services, including cybersecurity, cloud computing, artificial intelligence, and machine learning. These interactions helped Matrix gain deeper insights into emerging trends and customer preferences within the safety and security sector. Opportunities for innovation and growth The event provided a valuable platform for exchanging ideas, building partnerships, and identifying new opportunities for innovation and growth. Reflecting on the insights gathered from the event, Matrix recognises the vital importance of staying attuned to market trends and customer demands. Moving forward, the company plans to expand its participation in similar summits, further emphasising its dedication to innovation, industry collaboration, and delivering outstanding value to its customers. Advancement in the Security and Telecom industry Matrix is committed to ongoing innovation and advancement in the Security and Telecom industry. Through active participation in industry events and leveraging market insights, Matrix strengthens its role as a trusted partner, providing cutting-edge solutions to businesses across the globe. Tarun Sharma, Head of Marketing at Matrix, highlighted the crucial role events like the MSP India Summit play in shaping the company’s strategic direction, particularly in areas related to, but not limited to, IT services. He stressed the value of leveraging market insights gained from such summits to improve product offerings and fine-tune customer engagement strategies.
CovertSwarm, a global ethical hacker, red team, and cybersecurity solution provider, launched its Academy Program last September and is welcoming its second intake at the same time this year. The first iteration of the Academy Program proved to be a huge success, with all three academy members kick-starting successful ethical hacking careers at CovertSwarm. The program aims to make careers in cybersecurity more accessible, providing a clear pathway for individuals from any background to receive specialised training in core areas of cybersecurity, equipping participants with the technical skills and mindset needed to become ethical hackers. Ethical hacking course What do students say about the ethical hacking course from CovertSwarm’s Academy Program? Joao - one of the first three academy members - gained the skills to perform a variety of different attacks Joao - one of the first three academy members - gained the skills to perform a variety of different attacks, including reconnaissance, web application and perimeter attacks, vishing, and successfully socially engineered his way into one of CovertSwarm’s clients’ offices. Reflecting on his six months of the program, Joao said: “It has been a great experience having the time and resources to enhance my skills, along with the opportunity to learn from professionals who guide me in my new cybersecurity career.” John, another academy member, found his passion for hardware hacking, already helping to plan, code and build as part of the Academy’s DEFCON badge project. Jack Smith, a CovertSwarm Hive Leader and owner of the Academy Program, said: “Since joining the Swarm, John’s natural attention to detail has helped hone his OSINT skills, and his background in learning web application hacking has given him a strong platform to start his career." Detailed training platforms John had the following to say about his experience on the program so far: “The CovertSwarm Academy has been an amazing opportunity for me so far. It is refreshing to work in an environment where we are provided with the resources to learn about the cyber security world through detailed training platforms, whilst also being able to collaborate with and learn from the swarm in real-world cases." "We are also able to work around our own schedule which is a massive help if you have any appointments that can’t be at the weekend — you don’t need to take time off to go to them.” This year’s intake see’s another six recruits joining the academy and hive member, Iain Jackson, promoted to Academy Hive Leader, offering closer support to the members and allowing the academy to scale up. Careers in cybersecurity Jack Smith said: “We are thrilled with the success of our Academy Program and the incredible achievements of our first intake. Seeing our members, like Joao and John, develop their skills and kick-start their careers in ethical hacking has been immensely rewarding. Their success has paved the way for us to welcome a second intake and expand our support by promoting Iain Jackson into the newly created Academy Hive Leader role.” “We are excited to continue empowering individuals to begin their careers in cybersecurity, making a real impact on their lives and significantly contributing to the fight against fraud."
Bugcrowd, the pioneer in crowdsourced security, announced the availability of its Continuous Attack Surface Penetration Testing (CASPT) solution on the Bugcrowd Platform. This solution provides customers with a proactive security approach to continuously meet compliance goals and reduce their external risk asset exposure. Continuous Attack Surface Penetration Testing (CASPT) is designed for customers with an evolving attack surface that only does pentesting once or twice a year, leaving “assets in motion” and at risk for new threat exposure, while being unprepared to address it immediately. With CASPT, users can run a baseline test and then share incremental changes about new and updated assets or threats with a curated team for testing as soon as changes are detected. Risk across all digital assets Fewer than 10% of organisations have full visibility into their evolving attack surface, yet nearly 70% have been compromised through an unknown or poorly managed asset – which suggests that adversaries know more about their attack surface than their defenders do. Organisations need to understand ongoing risk across all digital assets “in motion” before attackers can exploit them. CASPT is enabled by Bugcrowd’s recent acquisition of Informer, a pioneering provider of external attack surface management (EASM) and continuous penetration testing. This integration combines detailed asset data acquired through EASM with the massive amount of vulnerability information Bugcrowd has processed in the past twelve years to create new and unique value for customers and hackers alike on the platform. EASM dashboards New pentest or bug bounty engagement for specific assets directly from their EASM dashboards Bugcrowd customers with managed bug bounty engagements will gain the ability to manually or dynamically update scope to account for new and updated assets. They can also kick off a new pentest or bug bounty engagement for specific assets directly from their EASM dashboards. “Our long-term vision for our platform is to continuously give customers proactive, data-driven insights and recommendations so that they have eyes on their attack surface better than their adversaries do,” said Dave Gerry, Chief Executive Officer of Bugcrowd. “At the same time, our goal is to help the brilliant hackers on our platform acquire more skills and earn more rewards by matching them with engagements that precisely reflect their interests and experience. Our ability to bring rich EASM data into the Bugcrowd platform is an important milestone in this journey and we’re excited for what’s to come.” EASM-enriched penetration testing Bugcrowd offers a unified platform for EASM, EASM-enriched penetration testing, and EASM-enriched crowdsourced testing. Standalone EASM providers, crowdsourcing providers, and traditional pen-test providers provide pieces of the solution, but none provide a complete one. “Attack surfaces are not static – they are constantly expanding and shifting due to shadow IT, cloud adoption, multinational organisations, and M&A, making the manual tracking of digital assets an ongoing challenge,” said Julian Brownlow Davies, Vice President of Advanced Services at Bugcrowd. “Continuous Attack Surface Pen Testing provides customers with a uniquely high level of assurance that both compliance and risk reduction goals are being met, continuously. Our mission is to be a trusted partner providing proactive, data-driven insights that will arm them with what they need to defend their organisations.”
HID, a worldwide pioneer in trusted identity solutions, announces that its Signo™ Readers seamlessly integrate with the UK government’s GovPass standard, built on open standards for enhanced security and flexibility. GovPass GovPass, the most secure government pass to date according to the UK government’s website, leverages open standards to ensure interoperability across different suppliers. Leveraging the UK government’s standard for card encryption and HID’s pioneering expertise in Open Supervised Device Protocols, Signo Readers underwent rigorous evaluation, testing, and certification to deliver enhanced security and compliance for government facilities. As more government departments adopt the GovPass standard, HID Signo readers offer a reliable and efficient path to compliance. Identity management “HID is committed to providing innovative solutions that support the UK government’s open standards approach to secure identity management,” said Spencer Marshal, Head of Europe at HID. “Our Signo Readers offer a compelling option for organisations seeking to achieve GovPass compliance while enhancing overall security.” Key offerings HID Signo Readers with GovPass compliance offer: Security by design: The readers were designed with the UK government's standard for card encryption and HID’s Secure Access Module for storing keys, providing the best-in-class security for government premises. Certified reliability: HID Signo readers have undergone rigorous evaluation, testing, and certification to meet all required GovPass standards. Agnostic protocol: Seamless integration with existing infrastructure, regardless of Wiegand or OSDP communications. Migration path: Users can smoothly transition to HID’s multi-technology Signo Readers, supporting custom profiles that meet GovPass Standards.
Innodisk, a pioneering global AI solution provider, has officially inaugurated Phase II of its R&D and production centre in Yilan, Taiwan. In response to the massive market demand driven by the edge AI wave, Innodisk has transformed the manufacturing plant into the group's AI core base. With the increased production capacity, Innodisk is ready to collaborate with global clients to deploy edge AI solutions. At the same time, Innodisk is also inviting global tech talent to join its teams around the world. Innodisk's innovative development Gearing Up Production to Drive AI Business Growth The year 2024 marks a period of innovative energy for Innodisk, with the simultaneous launch of new products and technologies. The latest manufacturing plant will begin production on various edge AI products, focusing on three core technologies: "AI Acceleration,” “Vision-Driven,” and “Custom Integration.” For "AI Acceleration," Innodisk's subsidiary Aetina recently launched the NVIDIA MGX Server, the group's first edge AI server. Innodisk also introduced industrial-grade CXL 2.0 memory and E1.S/E3.S edge server SSDs for AI and high-speed edge computing. "Custom Integration" displays group's core spirit of small-volume, diverse, and highly customised keys "Vision-Driven" showcases Innodisk's innovative development in edge AI machine vision, including the pioneering MIPI over Type-C extension patent technology for embedded cameras. "Custom Integration" embodies the group's core spirit of small-volume, diverse, and highly customised solutions. With the accelerated development of global edge AI and the increased production capacity of the manufacturing plant, Innodisk expects to speed up the realisation of innovative technologies and enable the effective deployment of products and AI solutions in practical scenarios. Demonstrating edge AI solutions in practice Innodisk set an AOI AI secondary inspection key for smart manufacturing to enhance production While promoting smart transformation for clients, Innodisk is also implementing these practices by transforming its production centre into a model for smart manufacturing and management. Collaborating with Aetina, NVIDIA, and through the Metropolis for Factories framework, Innodisk developed an AOI AI secondary inspection solution for smart manufacturing to enhance production line efficiency. Additionally, Innodisk's subsidiary Millitronic, in collaboration with Schneider Electric and ASPEED Technology, developed a panoramic smart visualisation remote management solution for the plant's data centre. This solution transforms traditional on-site inspections into real-time remote management, displaying data and enabling remote monitoring. Furthermore, the iCAP Air solution, announced this year, will connect multiple sensors to measure temperature, CO2, and other air indicators, providing real-time alerts for abnormal values and facilitating prompt facility management. This comprehensive application will ensure employee health and product quality. Creating a base for training AI talent With the inauguration of the Phase II manufacturing plant, Innodisk is focusing on recruiting AI-related talent. The company, which has locations in the USA, Europe, Japan, China, and more, invites global tech professionals to join its team. This expansion supports Innodisk's goal of promoting innovation and advancing edge AI solutions worldwide.
“For a couple of bucks, I know where everything is. I can't speak glowingly enough about how well this works for us. We are in the middle of nowhere; there's no Wi-Fi connectivity here, and it (RFID) still works,” said Tom Hebert, Founder and Director of Earth Sciences Foundation. Leveraging technology from HID’s RFID tags, InfraMarker's RFID system and Esri’s field mapping software, Herbert and Earth Sciences Foundation, a fossil excavation non-profit, are excavating dinosaur fossils in remote South Dakota and are experiencing an 80% improvement in workflows, reduced burden of manual data entry and administrative tasks. This frees up valuable time for the field technicians to focus on core activities like research and fossil conservation. Type of tracking system RFID ID tags are a type of tracking system that uses RF to search, identify, track, and communicate In brief, RFID ID tags are a type of tracking system that uses radio frequency to search, identify, track, and communicate with items and people. “RFID is radio frequency identification and an easy way to think about RFID tags is that they are a wireless barcode attached to an object that you can change and update. The big benefit here is that Tom and his team can update the RFID tags on fly,” explained David Chose, HID Global Sales Manager, Americas, Identification Technologies Division. “So as these bones go through the whole process of being excavated to being displayed at a museum, each step of the process can be easily updated and documented,” concluded Chose. Innovative approach's rapid adoption “Using HID’s RFID tag technology, GIS mapping, and geospatial curation, we can see the life of this fossil from the time we found it in the ground, to the time we put it in storage, to the time we prep it, clean it, restore it and display it in the museum. This allows people to follow the adventure of this bone from beginning to end. It also allows us and other scientists to do better research, collaborate easier and exchange ideas faster,” stated Hebert. The solution proved to be a resounding success. Within just five days, the excavation team had seamlessly catalogued 347 fossils, demonstrating this innovative approach's rapid adoption and efficiency gains. “This project is the proof that any organisation that needs to track and manage assets across space and time will benefit from incorporating RFID with the GIS,” said Mike Klonsinski, President of Berntsen.
Matrix, a pioneering force in the Security and Telecom industry, successfully concluded its participation at the MSP India Summit 2024 in New Delhi. With over three decades of experience, Matrix engaged with industry pioneers, gained valuable insights, and explored fresh collaboration opportunities. Technology-driven solutions Matrix remains steadfast in its commitment to delivering innovative, technology-driven solutions with a strong emphasis on customer satisfaction. This dedication is evident in the in-house research and design efforts, which drive the development of cutting-edge products. With 40% of the workforce focused on continuous innovation in R&D, they’ve built a diverse portfolio of over 60 advanced products spanning four key domains. The global presence is powered by an extensive network of 4,000+ partners, supporting a user base of more than one million worldwide. Safety and security sector Matrix gains deeper insights into emerging trends and client preferences within the safety and security sector Matrix operates exclusively through this partner ecosystem, underscoring the commitment to exceptional solutions and lasting partnerships in the technology industry. During the summit, Matrix engaged in discussions and networking sessions with experts and professionals from various IT services, including cybersecurity, cloud computing, artificial intelligence, and machine learning. These interactions helped Matrix gain deeper insights into emerging trends and customer preferences within the safety and security sector. Opportunities for innovation and growth The event provided a valuable platform for exchanging ideas, building partnerships, and identifying new opportunities for innovation and growth. Reflecting on the insights gathered from the event, Matrix recognises the vital importance of staying attuned to market trends and customer demands. Moving forward, the company plans to expand its participation in similar summits, further emphasising its dedication to innovation, industry collaboration, and delivering outstanding value to its customers. Advancement in the Security and Telecom industry Matrix is committed to ongoing innovation and advancement in the Security and Telecom industry. Through active participation in industry events and leveraging market insights, Matrix strengthens its role as a trusted partner, providing cutting-edge solutions to businesses across the globe. Tarun Sharma, Head of Marketing at Matrix, highlighted the crucial role events like the MSP India Summit play in shaping the company’s strategic direction, particularly in areas related to, but not limited to, IT services. He stressed the value of leveraging market insights gained from such summits to improve product offerings and fine-tune customer engagement strategies.
CovertSwarm, a global ethical hacker, red team, and cybersecurity solution provider, launched its Academy Program last September and is welcoming its second intake at the same time this year. The first iteration of the Academy Program proved to be a huge success, with all three academy members kick-starting successful ethical hacking careers at CovertSwarm. The program aims to make careers in cybersecurity more accessible, providing a clear pathway for individuals from any background to receive specialised training in core areas of cybersecurity, equipping participants with the technical skills and mindset needed to become ethical hackers. Ethical hacking course What do students say about the ethical hacking course from CovertSwarm’s Academy Program? Joao - one of the first three academy members - gained the skills to perform a variety of different attacks Joao - one of the first three academy members - gained the skills to perform a variety of different attacks, including reconnaissance, web application and perimeter attacks, vishing, and successfully socially engineered his way into one of CovertSwarm’s clients’ offices. Reflecting on his six months of the program, Joao said: “It has been a great experience having the time and resources to enhance my skills, along with the opportunity to learn from professionals who guide me in my new cybersecurity career.” John, another academy member, found his passion for hardware hacking, already helping to plan, code and build as part of the Academy’s DEFCON badge project. Jack Smith, a CovertSwarm Hive Leader and owner of the Academy Program, said: “Since joining the Swarm, John’s natural attention to detail has helped hone his OSINT skills, and his background in learning web application hacking has given him a strong platform to start his career." Detailed training platforms John had the following to say about his experience on the program so far: “The CovertSwarm Academy has been an amazing opportunity for me so far. It is refreshing to work in an environment where we are provided with the resources to learn about the cyber security world through detailed training platforms, whilst also being able to collaborate with and learn from the swarm in real-world cases." "We are also able to work around our own schedule which is a massive help if you have any appointments that can’t be at the weekend — you don’t need to take time off to go to them.” This year’s intake see’s another six recruits joining the academy and hive member, Iain Jackson, promoted to Academy Hive Leader, offering closer support to the members and allowing the academy to scale up. Careers in cybersecurity Jack Smith said: “We are thrilled with the success of our Academy Program and the incredible achievements of our first intake. Seeing our members, like Joao and John, develop their skills and kick-start their careers in ethical hacking has been immensely rewarding. Their success has paved the way for us to welcome a second intake and expand our support by promoting Iain Jackson into the newly created Academy Hive Leader role.” “We are excited to continue empowering individuals to begin their careers in cybersecurity, making a real impact on their lives and significantly contributing to the fight against fraud."
Bugcrowd, the pioneer in crowdsourced security, announced the availability of its Continuous Attack Surface Penetration Testing (CASPT) solution on the Bugcrowd Platform. This solution provides customers with a proactive security approach to continuously meet compliance goals and reduce their external risk asset exposure. Continuous Attack Surface Penetration Testing (CASPT) is designed for customers with an evolving attack surface that only does pentesting once or twice a year, leaving “assets in motion” and at risk for new threat exposure, while being unprepared to address it immediately. With CASPT, users can run a baseline test and then share incremental changes about new and updated assets or threats with a curated team for testing as soon as changes are detected. Risk across all digital assets Fewer than 10% of organisations have full visibility into their evolving attack surface, yet nearly 70% have been compromised through an unknown or poorly managed asset – which suggests that adversaries know more about their attack surface than their defenders do. Organisations need to understand ongoing risk across all digital assets “in motion” before attackers can exploit them. CASPT is enabled by Bugcrowd’s recent acquisition of Informer, a pioneering provider of external attack surface management (EASM) and continuous penetration testing. This integration combines detailed asset data acquired through EASM with the massive amount of vulnerability information Bugcrowd has processed in the past twelve years to create new and unique value for customers and hackers alike on the platform. EASM dashboards New pentest or bug bounty engagement for specific assets directly from their EASM dashboards Bugcrowd customers with managed bug bounty engagements will gain the ability to manually or dynamically update scope to account for new and updated assets. They can also kick off a new pentest or bug bounty engagement for specific assets directly from their EASM dashboards. “Our long-term vision for our platform is to continuously give customers proactive, data-driven insights and recommendations so that they have eyes on their attack surface better than their adversaries do,” said Dave Gerry, Chief Executive Officer of Bugcrowd. “At the same time, our goal is to help the brilliant hackers on our platform acquire more skills and earn more rewards by matching them with engagements that precisely reflect their interests and experience. Our ability to bring rich EASM data into the Bugcrowd platform is an important milestone in this journey and we’re excited for what’s to come.” EASM-enriched penetration testing Bugcrowd offers a unified platform for EASM, EASM-enriched penetration testing, and EASM-enriched crowdsourced testing. Standalone EASM providers, crowdsourcing providers, and traditional pen-test providers provide pieces of the solution, but none provide a complete one. “Attack surfaces are not static – they are constantly expanding and shifting due to shadow IT, cloud adoption, multinational organisations, and M&A, making the manual tracking of digital assets an ongoing challenge,” said Julian Brownlow Davies, Vice President of Advanced Services at Bugcrowd. “Continuous Attack Surface Pen Testing provides customers with a uniquely high level of assurance that both compliance and risk reduction goals are being met, continuously. Our mission is to be a trusted partner providing proactive, data-driven insights that will arm them with what they need to defend their organisations.”


Expert commentary
The impact of the COVID-19 pandemic has accentuated our digital dependency, on a global scale. Data centres have become even more critical to modern society. The processing and storage of information underpin the economy, characterised by a consistent increase in the volume of data and applications, and reliance upon the internet and IT services. Data centres classed as CNI As such, they are now classed as Critical National Infrastructure (CNI) and sit under the protection of the National Cyber Security Centre (NCSC), and the Centre for the Protection of National Infrastructure (CPNI). As land continues to surge in value, data centre operators are often limited for choice, on where they place their sites and are increasingly forced to consider developed areas, close to other infrastructures, such as housing or industrial sites. Complex security needs One misconception when it comes to data centres is that physical security is straightforward One misconception when it comes to data centres is that physical security is straightforward. However, in practice, things are far more complex. On top of protecting the external perimeter, thought must also be given to factors, such as access control, hostile vehicle mitigation (HVM), protecting power infrastructure, as well as standby generators and localising security devices to operate independently of the main data centre. Face value How a site looks is more important than you may think. Specify security that appears too hostile risks blatantly advertising that you’re protecting a valuable target, ironically making it more interesting to opportunistic intruders. The heightened security that we recommend to clients for these types of sites, include 4 m high-security fences, coils of razor wire, CCTV, and floodlighting. When used together in an integrated approach, it’s easy to see how they make the site appear hostile against its surroundings. However, it must appear secure enough to give the client peace of mind that the site is adequately protected. Getting the balance right is crucial. So, how do you balance security, acoustics and aesthetics harmoniously? Security comes first These are essential facilities and as a result, they require appropriate security investment. Cutting corners leads to a greater long-term expense and increases the likelihood of highly disruptive attacks. Checkpoints Fortunately, guidance is available through independent accreditations and certifications, such as the Loss Prevention Certification Board’s (LPCB) LPS 1175 ratings, the PAS 68 HVM rating, CPNI approval, and the police initiative - Secured by Design (SBD). Thorough technical evaluation and quality audit These bodies employ thorough technical evaluation work and rigorous quality audit processes to ensure products deliver proven levels of protection. With untested security measures, you will not know whether a product works until an attack occurs. Specifying products accredited by established bodies removes this concern. High maintenance Simply installing security measures and hoping for the best will not guarantee 24/7 protection. Just as you would keep computer software and hardware updated, to provide the best level of protection for the data, physical security also needs to be well-maintained, in order to ensure it is providing optimum performance. Importance of testing physical security parameters Inspecting the fence line may seem obvious and straightforward, but it needs to be done regularly. From our experience, this is something that is frequently overlooked. The research we conducted revealed that 63% of companies never test their physical security. They should check the perimeter on both sides and look for any attempted breaches. Foliage, weather conditions or topography changes can also affect security integrity. Companies should also check all fixtures and fittings, looking for damage and corrosion, and clear any litter and debris away. Accessibility When considering access control, speed gates offer an excellent solution for data centres. How quickly a gate can open and close is essential, especially when access to the site is restricted. The consequences of access control equipment failing can be extremely serious, far over a minor irritation or inconvenience. Vehicle and pedestrian barriers, especially if automated, require special attention to maintain effective security and efficiency. Volume control Data centres don’t generally make the best neighbours. The noise created from their 24-hour operation can be considerable. HVAC systems, event-triggered security and fire alarms, HV substations, and vehicle traffic can quickly become unbearable for residents. Secure and soundproof perimeter As well as having excellent noise-reducing properties, timber is also a robust material for security fencing So, how do you create a secure and soundproof perimeter? Fortunately, through LPS 1175 certification and CPNI approval, it is possible to combine high-security performance and up to 28dB of noise reduction capabilities. As well as having excellent noise-reducing properties, timber is also a robust material for security fencing. Seamlessly locking thick timber boards create a flat face, making climbing difficult and the solid boards prevent lines of sight into the facility. For extra protection, steel mesh can either be added to one side of the fence or sandwiched between the timber boards, making it extremely difficult to break through. A fair façade A high-security timber fence can be both, aesthetically pleasing and disguise its security credentials. Its pleasant natural façade provides a foil to the stern steel bars and mesh, often seen with other high-security solutions. Of course, it’s still important that fencing serves its primary purposes, so make sure you refer to certifications, to establish a product’s security and acoustic performance. Better protected The value of data cannot be overstated. A breach can have severe consequences for public safety and the economy, leading to serious national security implications. Countering varied security threats Data centres are faced with an incredibly diverse range of threats, including activism, sabotage, trespass, and terrorism on a daily basis. It’s no wonder the government has taken an active role in assisting with their protection through the medium of the CPNI and NCSC. By working with government bodies such as the CPNI and certification boards like the LPCB, specifiers can access a vault of useful knowledge and advice. This will guide them to effective and quality products that are appropriate for their specific site in question, ensuring it’s kept safe and secure.
IHS Markit projects that the market for physical electronic access control solutions has grown to over $5.2 billion in 2018. The market has experienced stable and predictable growth rates that have hovered around 6 percent over the past several years. Electronic locks remain both the largest and the fastest growing product type in access control, representing nearly 40% of the global market size for all access control equipment. Impact of technological developments While market growth rates have been consistent, technological developments have dramatically impacted the market in 2018. The most prominent trend involves mobile credentials, which are poised to revolutionise the longstanding business model for access control system sales. The mobile credentials market was still in its infancy in 2018, but many end-users are already anticipating a transition to these credentials by installing compatible readers in their systems. By 2020, over 10 percent of all new readers sold in the market will be compatible with mobile credentials. Access Control as a Service Other trends to watch in 2019 and beyond include Access Control as a Service (ACaaS), which allow end-users to avoid the need to invest in costly on-site IT infrastructures to support their access control equipment. ACaaS solutions will be particularly popular to support small and mid-sized projects that service less than fifty doors. In addition, Bluetooth Low Energy (BLE) beacons will support geopositioning in an increasing number of the world’s most advanced access control systems. Through geopositioning, the exact location of specific personnel can be identified at any site in real-time. The top fifteen access control vendors represent more than half of the total size of the global access control market, but there are pockets of opportunity for new vendors, particularly to accommodate small and mid-sized projects. The mobile credential and ACaaS markets will also be highly competitive in 2019 and should attract an influx of new market entrants.
Brexit will bring sweeping changes to the way the UK not only interacts internationally, but also internally. With the country standing alone with regards to trade and exports, it is vital for us to be fully prepared. However, there is one area that I think needs much greater scrutiny—the UK technical skills gap. Tellingly, there is a palpable shortage of technical training and skills right across the UK economy. With the country’s economic strength relying heavily on cutting-edge technology and knowledge, the UK security industry has particular reason to be anxious of movement restrictions on internationally sourced expertise and resources, as well as a potential ‘brain-drain’ of domestic talent. There is a lack of quantity and quality of home-grown talent in the pipeline, and there is a greater availability of talent from overseas Need for security education There are two distinct aspects that need to be addressed when you look at the requirements of the UK economy with regards to technical expertise. First of all, there is the quantity and quality of home-grown talent in the pipeline, and secondly, there is the availability and desire of talent from overseas wanting to work in the UK. In my own experience, it can be quite a challenge finding the best technical expertise (in the numbers needed) from the UK alone. Currently, alongside our British employees, our business employs a sizable amount of international security talent, ensuring we can fill key roles with exactly the right people. As well as sourcing expertise from abroad, I passionately believe we need to properly support and educate the next generation of UK security professionals too, ensuring we can also find the right talent closer to home in the future. T-Levels provide valuable business experience which can be lacking in traditional academic courses Technology-level training for modern needs It is frustrating to see the current skills gap—particularly as I felt the UK Government began moving in the right direction when it reintroduced the excellent national apprenticeships scheme a few years ago. There is no doubt we will always need excellent academic qualifications and people trained in research and development, but equally a stint in further education is certainly not for everyone! Undoubtedly apprenticeships are an excellent way of encouraging hungry young talent into any industry with on-the-job training. Importantly, this isn’t just academic training either—it also provides valuable business experience too, which can be lacking in more traditional academic courses. There has also been a lot of interest in ‘T-Levels’ in the UK. These are technology level courses that are designed to offer specific training for modern technology needs. It is very encouraging to see the promotion of technology education in this way, designed to appeal to students that are looking for a solid career in the UK technology sector. Apprenticeships are an excellent way of encouraging hungry young talent into any industry with on-the-job training Focus on engineering and vocational education Unfortunately, it seems the UK is still somewhat behind our European cousins when it comes to technology education and training. Germany, for example, is a country that has traditionally excelled in these areas. The education system in Germany has heavily focussed on engineering and vocational-based training programmes, which has seen noticeable benefits for its technology sector. The Germans have continued to focus on this for decades, meaning the country’s economy has an excellent pipeline of well-trained talent available. Taking this approach would greatly enhance training in the UK too, supporting up-and-coming talent and helping the next generation reach its potential. A healthy influx of highly talented individuals from across Europe has helped to fill the UK skills gap over recent decades Meeting business and technology needs A healthy influx of highly talented individuals from across Europe has helped to fill the UK skills gap over recent decades. Undoubtedly, like many British businesses we have significantly benefited from this open and vibrant skills market. With the fine details of Brexit being negotiated at the moment, I hope this valuable source of skilled professionals won’t be denied to UK businesses. Even if there are more stringent controls moving forward, the UK must continue to open its doors to this expertise—certainly until we can reap future generations of home-grown talent. It’s interesting (and somewhat ironic) that when you look at some UK universities’ engineering faculties, they often have half or over half of their students from other countries. The UK has world-renowned education facilities that we should be proud of, and yet paradoxically, we are still not educating enough UK engineers. There is a keen interest in technology from younger generations that needs to be nurtured Skill-based training for economic growth International trading and people movement will change after Brexit, but I hope there will also be a significant evolution in the education system to close the UK skills gap. The UK has some of the best educational establishments in the world and a long history of innovation and entrepreneurial skills to make our technology highly commercial. Frustratingly, there is a keen interest in technology from younger generations—just look how addicted young people are to their screens. This keen interest needs to be nurtured and career choices in technology encouraged. With the right training opportunities in place (university education, apprenticeships and T-Levels), the UK can easily implement the tools to create the right opportunities. However, what is really needed now is an impetus from political leaders to address training needs and ensure the economy continues to develop and grow to meet the challenges ahead.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
As new technologies incorporate artificial intelligence (AI) and overall uses of AI continue to expand, what protections are in place to prevent its misuse? Artificial intelligence, like any technology or security measure, is not inherently bad. It can, however, be used for nefarious purposes and in ways that were never intended or thought of. ‘Responsible AI Policy’ to protect users Prosegur has created a ‘Responsible AI Policy’ to protect users from potential AI threats As an AI company, Prosegur has created a ‘Responsible AI Policy’ to protect users from potential AI threats, and to prevent employee and partner misuse of AI-enabled technology, with guard rails in place to hold them accountable, if artificial intelligence is being used nefariously. “Any security or similar company that utilises AI with its products should monitor for potential misuse and implement a similar policy for protection,” contends Mike Dunn, the Chief Technology Officer (CTO) at Prosegur USA. Requirements of Prosegur’s ‘Responsible AI Policy’ include: Human action and oversight - Prosegur heavily monitors their agents using an integrated international security operations centre (iSOC). Floor and shift supervisors ensure that everything is working properly and that incidents are handled. They also ensure employees are logging into AI-enabled cameras and other technologies for the right reason. Transparency - As with any new company-wide policy, Prosegur wants to ensure that every employee learns about the policy and their duties to uphold it. “In doing this, we are making sure that all processes involving AI development are transparent, so any employee can understand and implement the policy into these processes,” says Mike Dunn. Non-discrimination and equity - Prosegur seeks to make sure employees are using AI-enabled technology to look for known criminals, for example, and not profiling or singling people out. Having a policy in place ensures agents are aware. Accountability - The most important part of the policy is to hold people accountable, if AI-enabled technologies are misused. Violation of the policy will result in disciplinary actions, which can range from HR (Human Resources) intervention to possible suspension. For partners, Prosegur would cease and desist using their products immediately upon finding out about any misuse. Leading the charge for ethical AI practices Prosegur is proud to lead the charge for ethical AI practices, by creating this first policy of its kind" “Prosegur is proud to lead the charge for ethical AI practices, by creating this first policy of its kind, and we hope that other security organisations follow suit,” says Mike Dunn. Technology can do wonderful things. In security, technology can help to stop crimes and even to prevent them from happening with deterrents and alarms. Important to take action to stop ‘bad actors’ However, as with any industry or group of people, there will be ‘bad actors.’ Mike Dunn said “It is important to take actions to stop those people, but it is also important not to condemn all technology or practices when this happens.” Even proven, effective technologies can be used for bad (as well as good). An example is TSA Scanners at the airports. They were designed to provide safer air travel, picking up things that normal metal detectors could miss. Misuse of AI technology can cause lot of harm However, it came to light that a few ‘bad actors’ were using this technology and sharing silhouetted nude pictures of passengers. This has since been patched and fixed, but nonetheless, it’s a great example of how misuse can break people’s trust. As a whole, technology can be dangerous. If not used as intended, it can be used to hurt people. The U.S. government has found that China was using facial recognition and demographic analytics to classify and identify people, based on their ethnicity and that technology singled them out for tracking. Important to ensure analytics and AI used as intended As a society, I think it’s important for us to take that first step and self-police any use of these analytics" “As a society, I think it’s important for us to take that first step and self-police any use of these analytics,” said Mike Dunn, adding “At a minimum, (we should) set policies and procedures to make sure these analytics and AI are being used as intended.” As use of artificial intelligence (AI) continues to increase, an industry standard would ensure companies have protections in place for their employees, clients, and partners. Having a policy is the first proactive step in ensuring AI protections. However, companies need to enforce accountability too. Effectively handle security threats and vulnerabilities Mike Dunn continues, “By heavily monitoring for unethical AI practices and enforcing disciplinary actions when needed, companies will be better prepared to handle security threats and vulnerabilities.” At Prosegur, monitoring agents are heavily trained, taught procedures and then closely supervised by several methods. “This is something that should be common practice in the security industry,” says Mike Dunn, adding “We have employed a compliance officer to help us stay ahead of the curve. Fortunately, we have seen many manufacturers and end users adopt this practice as well.” Compliance officers can act faster than new laws enacted Compliance officers can act faster than new laws being enacted, and often will hold their company to higher standards than a minimum threshold. Mike Dunn concludes, “Putting a responsible AI procedure in place is Prosegur’s way of taking on this problem we see in our everyday work.”
Vehicle barriers first rose to the forefront of public attention after 9/11. The focus from 2001 to 2010 was on anti-terrorism, and vehicle barriers appeared at military and government facilities around the world. The U.S. Capitol breach on Jan. 6, 2021, brought heightened attention to the risks in a society that is increasingly fractured and volatile. Various protest events in recent months have made customers more aware of possible threats and prompted many to proactively install vehicle barriers and other systems to protect their premises. Shifting market focus Since 2010, and with the anti-terrorism market mostly saturated, the market focus for vehicle barriers shifted to public safety applications such as stadiums, schools, universities, large tech companies, and data centres. It’s an example of deploying technology developed in “wartime” to the broader public good, says Keith Bobrosky, the new president of vehicle barrier company Delta Scientific Corporation. Withstanding the pandemic The only remaining hurdle for Delta Scientific is to deal with continuing uncertainty going forward Like many in the security market, Delta Scientific has withstood a tumultuous two years during the duration of the novel coronavirus pandemic. They have “come through with flying colours,” says Bobrosky. The company never closed down, and its vaccination rate is high. The only remaining hurdle is to deal with continuing uncertainty going forward. Delta Scientific’s commitment Bobrosky began working in sales at Delta Scientific in 2007. Along the way, he has expanded into management, production, and engineering management. Through it all, he has seen a company that provides employees the autonomy to do their jobs and who have a strong commitment to customers, he says. The privately-owned company is nimble; decisions can be made quickly to respond to market changes, adds Bobrosky. Addressing needs during a pandemic The company was concerned about lower demand when the economy shut down, says Bobrosky, but they did not see an impact. The business was steady as a result of government entities and other organisations taking advantage of being closed to evaluate and address security needs. “We saw a decent flow of government business because of the shutdown,” says Bobrosky. Delta Scientific focuses on the domestic U.S. market but also has a presence selling to partners in the Middle East and Europe, where the equipment is known for its ability to take multiple hits. Even after withstanding an impact according to ASTM standards, their barrier is still operational. Increased steel purchased Delta Scientific ramped up its purchasing power, staving off any shortages and striving to keep lead times short As material shortages have spread through the industry, Delta Scientific has ramped up its purchasing power, staving off any shortages and striving to keep lead times short. Steel is their major component – literally, 98% of the weight of the products is steel, and there are 5,000 pounds of steel per barrier. The price of steel has gone up and there have been shortages. The company has maintained supply by leveraging its reputation and purchasing power. Most of their components are made in the USA, which has helped them dodge the recent challenges of the global supply chain. Application of barriers and bollards Automotive dealerships are another market for Delta Scientific; their bollards and barriers are used as anti-theft devices to keep vehicles from being stolen from a sales lot. Delta Scientific’s products can foil car thieves who might otherwise use a large vehicle to plow through a barrier and then enable a parade of accomplices to drive away in additional vehicles. Auto resellers buy anti-terrorism products to protect their inventories. DSC550 Open Frame vehicle barrier Delta Scientific’s products have evolved from push buttons and relay to touch screens and microprocessors New efficient product designs enable Delta Scientific to use less steel while keeping prices competitive and maintaining crash ratings. The products are more innovative, says Bobrosky. New barriers include the DSC550 Open Frame vehicle barrier, which does not block the view as solid barriers do. During the last decade control systems for Delta Scientific’s products have evolved from push buttons and relays to touch screens and microprocessors, although some customers still prefer the simplicity of the older approach. Portable crash barriers The equipment can also be controlled remotely and integrated with PSIM-type systems. Although the systems are stand-alone, some clients have been toying with the idea of controlling them through the internet, emphasising the importance of appropriate cybersecurity. A separate line of portable crash barriers can be towed into place in 15 minutes by a vehicle or even a golf cart. They are used for events such as the Democratic and Republican National Conventions, the Oscars, music festivals, etc. There are hundreds of units in the field, available as needed for various events and rented out to event management companies and other organisers. Improving customer relations As the president of Delta Scientific, Bobrosky says his biggest opportunity is to continue improving customer relations – a never-ending goal. He will also strive to increase communication. Looking ahead, additional crash tests are scheduled for 2022, and the company will continue to look for ways to “do more with less.”
Case studies
Residents at Chapel View can receive and answer door entry requests via mobile while granting temporary access using QR codes, due to Comelit-PAC’s dedicated mobile app and use of the latest security technology. Chapel View Set in the quaint village of Gildersome in Leeds, Chapel View is an exclusive housing development, presenting seven residential homes in a discreet cul-de-sac, all secured with a communal gate. The community featured a legacy door entry system that required an upgrade to ensure the security of residents. Comelit-PAC worked with local installation specialists AC Secure from the initial design process, through the works programme to project completion. Door entry Each house has its licence and users can use the feature-rich Comelit app to control the gate Door entry, via Comelit-PAC’s VIP system, was specified, utilising its stylish Ultra door entry solution, to enable control of the gate to the housing estate. Each house has its licence and users can use the feature-rich Comelit app to control the gate while also creating QR codes to allow temporary access for visitors. Says David of the resident’s association of Chapel View, “With high expectations for our residents to deliver ultimate security, every element of the new door entry system also had to be considered from a convenience perspective, to enable them to answer door entry requests remotely, from their smartphone." Additional benefits “AC Secure worked with us right from the specification process and took the time to understand these requirements, before recommending Comelit-PAC as an ideal solution." "The additional benefits of utilising app technology to present door entry and QR codes for temporary access to visitors immediately appealed. And the system was installed with minimal disruption and a great benefit to our community." Smart home security systems Adam Cousens, Managing Director at AC Secure added, “Chapel View has the look and feel of a quaint village community where security and door entry is a high priority. All the smart home security systems had to be stylish and futureproof to suit the requirements of the community, whilst also ensuring ease of installation and simple use." “Comelit-PAC’s Ultra system with VIP technology, coordinating with its dedicated app was the natural choice for door entry." Ultra digital entrance panel The system enables new residents to grant access through the vehicle gates using Comelit’s dedicated mobile app "Residents love the sleek design and the VIP technology is easy to use and allows them the convenience to receive calls and see visitors from anywhere. The combination has truly elevated the door entry experience.” The entrance to Chapel View has been enhanced with Comelit-PAC’s stylish, flush-mounted Ultra digital entrance panel. The system enables new residents to grant access through the vehicle gates using Comelit’s dedicated mobile app. Mobile-first solution Stephen Wragg, Business Development Manager for Comelit-PAC concluded, "What our work with AC Secure at Chapel View demonstrates is how Comelit-PAC is ‘with you always.” There is no project too big or too small for us to work with our installers and partners to provide smart, yet stylish door entry solutions for residents to benefit from the latest in smart access control." "Ultra, together with VIP presents a powerful mobile-first solution that can ensure the ultimate security for this residential community.”
DTiQ, the provider of intelligent video surveillance, analytics, and loss prevention services for restaurants, retail, and convenience store locations announced a strategic contract with Church's Texas Chicken®. The agreement recognises DTiQ as an approved supplier of managed video and loss prevention solutions in support of Church’s company-owned restaurant operations. AI and machine learning For over 20 years, DTiQ has provided next-generation business intelligence solutions and services to over 45,000 customers worldwide. DTiQ’s technology continuously gets smarter in real-time through AI machine learning to better identify suspicious transactions, including refunds, discounts, and voids. Using its advanced AI technology, DTiQ’s certified auditors assess suspicious transactions through video footage to provide organisations with an unbiased compliance review, allowing restaurant teams to deliver operational excellence at each location. Video and loss prevention solution DTiQ’s loss prevention solutions will help us remain focused on our mission of serving the bold taste of Texas" Following a successful pilot rollout in 15 Church’s company restaurants, DTiQ’s intelligent video and loss prevention solution will further expand across company-owned restaurants, and the company is a preferred provider for the franchise system. “DTiQ’s loss prevention solutions will help us remain focused on our mission of serving the bold taste of Texas to our guests at an affordable cost,” said Bill Mitchell, Church’s Texas Chicken’s Vice President of Company Restaurant Operations. Easy service Bill Mitchell adds, “From the pilot launch, we measured locations against comparable business periods and recognised a proven reduction in both cash and product theft, resulting in noticeable improvements in food-related costs. These results made our decision to expand DTiQ’s services easy, and we look forward to our continued vendor relationship.” DTiQ’s video-as-a-service provider solution Programmable into any remote video system, DTiQ’s proactive solution maps and marries point-of-sale data with advanced video to identify fraudulent transactions. The video-as-a-service provider’s solutions provide customers with an average of 1% to 2% in cost savings to their bottom lines. Economic value We’re excited to continue to roll their cutting-edge technology and services into additional company restaurants" “The clear delineation from the tailored insights and services provided by DTiQ revealed compelling economic value,” said Danton Nolan, Church’s Texas Chicken’s Executive Vice President and Chief Financial Officer. Danton Nolan adds, “We’re excited to continue to roll their cutting-edge technology and services into additional company restaurants.” Video and managed services “Our video and managed services aim to support Church’s Texas Chicken’s operational, guest experience, and brand goals and is uniquely positioned for a verifiable return on investment for both company and franchisee restaurants,” said John Donnelly III, DTiQ’s Chief Revenue Officer. John Donnelly III adds, “Church’s Texas Chicken is an excellent addition to our growing network of QSR vendors, and we appreciate the opportunity to help them deliver efficient, cost-effective compliance for their guests.”
The legendary Wave Pool in the “Valley of Waves” is the undisputed main attraction in Sun City’s famous water park. Here, visitors find their place in the sun, with two-metre-high waves shooting into the air every 90 seconds. But where there is a lot of light, there is also plenty of shadow which comes in the form of pickpocketing and occasionally swimming accidents. With a video technology solution from Regensburg-based manufacturer Dallmeier, the Sun City Resort has been able to significantly improve its “customer experience”. Panomera® multifocal sensor cameras and SeMSy® video management software Due to the size of the resort, it's a daunting task to monitor the movements of all residents and day visitors in the “Valley of Waves” and therefore, as in any amusement park, it's unfortunately unavoidable to be accountable for the actions of “Valley” users. With Dallmeier, the operators have succeeded in effectively managing their liability for the safety of all visitors By using Dallmeier's patented Panomera® multifocal sensor cameras and SeMSy® video management software, the operators have succeeded in effectively managing their liability for the safety of all visitors to the Valley. In the event of an accident, the company also has access to easy-to-use video documentation. This makes it possible to accurately reconstruct the causes of accidents and take appropriate action. No sunbathing under cameras The challenge was to reconcile the security interests of the visitors and the desire to improve customer service with the expectation of a carefree stay at the beach. Of course, signs are pointing out the video security technology in place, but it is unlikely that guests want to be constantly confronted with the sight of cameras. Video security “This was also the classic paradox of many security solutions: How can you secure an entire beach area in such a way that visitors are protected in the best possible way, but do not feel harassed?” says Hendrik Strauss, Resort Security Manager at Sun City. “It quickly became clear to us that the right choice of technology would play a central role in this initial situation.” Only three systems for more than 16,000 square metres These cameras solve the dilemma of decreasing resolution in depth or distance by combining multiple sensors" In these conditions, and after extensive testing, conventional camera technology was ruled out: The images were simply not accurate enough or the operator would have had to “spike” the site with many cameras. In the end, the surveillance department opted for the patented Panomera® multifocal sensor technology from Regensburg, Germany. “These cameras solve the optical dilemma of decreasing resolution in depth or distance by combining multiple sensors with lenses of different focal lengths,” says Johnathan Rieder, CCTV Technician at Sun International, explaining the patented technology. Panomera® S8 Ultraline camera “In this way, the systems provide a consistently high-resolution image of the entire object space, including the rear image areas and for the entire area of just over 16,000 square metres, the operator only needs three Panomera® S8 Ultraline camera systems." "At the end of the day, the operators are looking at a single overall image; with standard 4K cameras, this would quickly be 20–24 individual images.” Maximum overview for the operators The images from these “individual cameras” are then “stitched” together by software to form an overall image, eight individual images are combined to form one overall image. This means that the operator always has a complete overview during live observation, as the entire terrain is displayed on just three monitors. If required, any section of the overall image can be selected with the mouse and opened in a separate window. Records all details The special feature is that any number of these detailed views can be opened at the same time Operators can zoom into these detailed views as required, enabling them to identify and track details with precision. The special feature is that any number of these detailed views can be opened at the same time and that this function is available in live operation, but also in the recording. This provides Sun City's security experts with an extremely powerful tool for investigating crimes or determining the exact cause of an accident. Bright beach, dark forest Another advantage of the technology used is that, with eight individual sensors available for each image, the problem of large differences in brightness can be solved very well. After all, each of the sensors only must adjust to the differences in brightness in exactly the image area for which it is “responsible”. And in the Valley of Waves, the contrasts could not be greater: The terrain includes both bright sandy beaches and the adjacent tropical rainforest, a huge challenge for any imaging system. “Customer experience” improved to the maximum “We have been using Dallmeier's ‘standard’ camera technology and the company's SeMSy® video and alarm management system ‘indoors’ in the casino for years. We have a total of around 1,200 cameras and are still convinced of the quality of the systems,” says Hendrik Strauss, Resort Security Manager at Sun City. “So, it made sense for us to also use Dallmeier in the outdoor area as well. Especially as there is simply no camera technology on the market that meets our key requirements. Maximum improvement of the customer experience with minimum visibility.”
IDEMIA National Security Solutions (NSS), a subsidiary of IDEMIA, the world’s pioneering biometric and identity solutions provider, provided a demonstration of its innovative biometric access control technology, ID2Access, to key U.S. Army and U.S. Department of Defence stakeholders on November 15 at Redstone Arsenal. The system is deployed at Redstone Arsenal, a massive 38,400-acre site Huntsville, Alabama that serves as the primary training and testing centre for the U.S. Army’s missile and rocket programmes. The U.S. Army Corps of Engineers (USACE) Engineer Research and Development Centre (ERDC) selected IDEMIA to deliver frictionless next-generation access control, increase force protection, promote security, and improve the quality of life for Redstone Arsenal personnel, visitors, and Huntsville residents. Application of biometric technologies The pilot project shows the application of biometric technologies across the full process The pilot project demonstrates the application of biometric technologies across the full process of accessing an installation, starting with testing remote enrolment capabilities, which allow visitors to validate their identities before arriving at the installation, potentially bypassing the Visitor Control Centre. Then there is the testing of the expansion of the facial recognition gate access for vehicles with multiple occupants, beyond just identifying the driver, as well as leveraging the same enrolment to provide facility access using facial recognition and contactless fingerprint capabilities. ID2Access solution IDEMIA NSS’s ID2Access solution leverages IDEMIA’s best-in-class digital and biometric identification technologies, which have a long and successful history in systems nationwide, including operational deployments throughout the U.S. Department of Defence, Federal Government, numerous state and local agencies, and 180 countries across the globe. Redstone gate operators have insight into the comings and goings of people on base in real-time Redstone Arsenal will benefit from improved safety and security, as well as efficiency at access control points. Redstone gate operators will have insight into the comings and goings of people on the base in real-time. Redstone personnel and civilians will find a smoother visitor enrolment process when entering and leaving the base. Remote enrolment technology “Depending on the time of day, visitors can spend an hour or hour and half getting processed at the Visitor Centre,” shared Lafe Hutcheson, Senior Program Director, NSS. “Our remote enrolment technology can enable identities to be validated remotely and greatly reduce those lines. We are also demonstrating the capability of validating not only the driver of the vehicle, but everyone in the vehicle as they enter an access control point for the installation.” Deployment of ID2Access “The deployment of ID2Access demonstrates that our approach to access control and identity authentication provides the protection, efficiency, and installation situational awareness, where it is needed most,” said Patrick Clancey, CEO, IDEMIA NSS. IDEMIA NSS is eager to show the value that ID2Access brings and work with our partners" “IDEMIA NSS is eager to show the value that ID2Access brings and work with our partners to deliver a best-in-class identify verification and access system for securing entry, exit, and movement within the garrison that can reduce the hassle of traffic and delays at Redstone Arsenal.” Author's quote “ID2Access has use cases for operational deployment at continental United States (CONUS) and Outside the Continental United States (OCONUS) military and other sensitive installations," said Evan Bays, VP, Engineering and R&D, IDEMIA NSS. “It can also empower any organisation across any industry looking to expedite access for residents, employees, contractors, and visitors through a streamlined system that protects personnel and assets appropriately while enabling flexibility of movement on and off the installation.”
Sandwell Aquatics Centre in Smethwick is a state-of-the-art leisure centre that originated as a purpose-built arena for the 2022 Commonwealth Games in Birmingham. The facility played host to the highest number of medal events compared to any other, showcasing both swimming and diving competitions. The newly constructed complex included a competition pool for swimming and diving, a temporary pool for swimming and para-swimming warm-up, and an area dedicated to dry-dive training. Reclaiming the space Following its key role in the games, the original structure was reconfigured so it could be used by the local community from the summer of 2023 onwards. The 4000 temporary seats have been removed and fresh facilities tailored for community use have replaced them. The leisure hub boasts a gym with over 100 stations, a specialised ladies-only gym with 25+ stations, along with amenities such as a sauna, steam room, football pitch, two 4-court sports halls, three exercise studios, an indoor cycling studio, and a trio of swimming pools. Plant noise assessment The anticipated noise levels generated by various mechanical components within the plant room In the proposal documents, Mach Acoustics included two detailed acoustic reports – one addressing operational noise and the other focusing on plant noise. The plant noise assessment specifically outlined the anticipated noise levels generated by various mechanical components within the plant room, which includes several pumps and air handling units. Acoustic barrier with integrated louvre The acoustician's initial recommendation proposed an acoustic barrier with integrated louvre features to ensure adequate airflow while mitigating noise. However, a subsequent design amendment specified a solid acoustic barrier with slatted top sections to maintain airflow and enhance aesthetics. Additionally, steel louvre doors were specified for access. Absorptive acoustic barriers These barriers effectively reduce noise pollution originating from mechanical plant areas It has become standard practice to install absorptive acoustic barriers around new and renovated leisure centres. These barriers effectively reduce noise pollution originating from mechanical plant areas and operational compounds. It's not uncommon for heat pumps and air conditioning units to produce a continuous low-level hum or buzzing noise, which can disrupt neighbouring properties and create an unpleasant auditory environment for facility members and visitors alike. Game-changing solutions With prior experience in similar acoustic installations for aquatic and leisure centres, Jacksons Fencing successfully secured a subcontractor contract with Wates. They designed, manufactured, and installed customised acoustic fencing and gates across three elevations: The first elevation covered 16.5m and featured 2.8m high Jakoustic Reflective panels with 2.1m high timber slats above. The second elevation spanned 11m, incorporating 3.2m high Jakoustic Reflective panels with 2.1m high timber slats above, 9.64m of 5.3m high panels, and 11.3m of 3.2m high panels with 2.1m high timber slats. The third elevation extended 16.5m and used 3.2m high Jakoustic Reflective panels with 2.1m high timber slats above. Benefits of solid acoustic barriers These barriers offer an appealing noise reduction solution that conceals machinery and serves as a robust security barrier The different heights of the solid acoustic barriers were strategically chosen to benefit noise reduction, with timber slats enhancing aesthetics and airflow. The project also included matching double-leaf acoustic gates for access. In the first elevation, two apertures were left for steel louvre panels. The acoustic barriers, mounted on galvanised steel posts, were constructed from tongue and groove boards with a deep V profile, tightly slotting together to reflect noise by up to 28dB. These barriers not only offer an appealing noise reduction solution that conceals machinery but also serve as a robust security barrier, devoid of footholds and challenging to scale. Tailored security solutions Peter Jackson, Managing Director, of Jacksons Fencing says, “The Sandwell Aquatics Centre serves as a remarkable example of how facilities can undergo effective reconfiguration to align with their new objectives to ensure they are being utilised effectively." "This project showcases our team's dedication to tailoring security solutions precisely to the task at hand, achieved through the customisation of acoustic fencing. The outcome not only exudes a sleek and sophisticated appearance but also fulfils its vital function. Coupled with a reliable 25-year guarantee, this acoustic fencing ensures enduring noise reduction, cost efficiency, and sustainability.”
Located in Kerala, India, the Somatheeram Ayurveda Hospital with a Resort Ambiance is the best place for not only visual rejuvenation but also physical and mental rejuvenation. Through Ayurveda, Somatheeram provides a means to shed all worries, anxieties, and illnesses. With the objective of combining Ayurveda and Tourism, the Somatheeram Research Institute & Ayurveda Hospital was founded in the year 1985, thus making it the world’s first-ever Ayurvedic Hospital in a Resort Ambiance. The Somatheeram Group of Companies came into being with the efforts of the Founder Managing Director, and Architect Mr. Baby Mathew. Challenges Multi-location transmission proves to be an expensive affair if devices are not chosen wisely Somatheeram has multiple resorts, located at different locations. Multi-location communication can prove to be an expensive affair if communication devices are not chosen wisely. Their dependence on public service providers for communication added to their woes of communication between their resorts. To elaborate: Feasibility of existing telephony: Existing telephony became impracticable considering the frequent communication between multi-located properties. Managing different protocols: Interface with different telecom networks requires managing different protocols, which can be cumbersome, time, and energy-consuming. Absence of modern phone features: The lack of advanced features like abbreviated dialing, call pick up, and internal call restriction, prevented them from becoming efficient in day-to-day operations. Transition to modern communication with existing infrastructure: Their investment in existing infrastructure needed protection while also a provision had to be made to modernise the communication using existing infrastructure. Solution The solution offered was based on the fundamentals of multi-location communication solutions Matrix analysed the challenges of communications for Somatheeram, and crafted a solution that was the best fit. The solution offered was based on the fundamentals of multi-location communication solutions. This included the Matrix range of IP-PBX (ETERNITY GENX12S) and GSM Gateway (SIMADO GFX11 and SIMADO GFX11 4G) that optimised the feasibility of communication and helped the firm become more efficient. Solution includes: The Hybrid IP-PBX included ETERNITY GENX12SAC, which enabled them up to 240 Analogue users with 64 CO Ports. Another Hybrid IP-PBX included ETERNITY PENX, which allowed them access to 100 IP Users, onboard IP User Support, LDAP Client support, support of 4G VoLTE ports, COSEC Door Integration, and much more. The GSM gateway included SIMADO GFX11 and SIMADO GFX11 4G which enabled them to make and receive calls from analogue extensions. The capability to integrate with almost all industry-pioneering PBXs enabled them a smooth transition to modern communication while maintaining existing infrastructure. Results The solution so implemented enabled all properties to work as a single communication platform and proved to be beneficial for Somatheeram and its properties in more than one way. The Hybrid IP-PBX enabled them, unified communication facilities like Email to SMS, audio/video calling, unified messaging facilities, and multi-location collaboration features like UC client integration, one-number reach, etc. The Hybrid IP-PBX also enabled, investment optimisation through universal network connectivity, easy and centralised phonebook management through LDAP client support, mobility convenience through 4G VoLTE support, and much more. The GSM/4G gateway enabled them, GSM/4G connectivity to existing infrastructure, hotline extension dialing, emergency number dialing even in the absence of a sim card, etc. through secure network bridging.
Residents at Chapel View can receive and answer door entry requests via mobile while granting temporary access using QR codes, due to Comelit-PAC’s dedicated mobile app and use of the latest security technology. Chapel View Set in the quaint village of Gildersome in Leeds, Chapel View is an exclusive housing development, presenting seven residential homes in a discreet cul-de-sac, all secured with a communal gate. The community featured a legacy door entry system that required an upgrade to ensure the security of residents. Comelit-PAC worked with local installation specialists AC Secure from the initial design process, through the works programme to project completion. Door entry Each house has its licence and users can use the feature-rich Comelit app to control the gate Door entry, via Comelit-PAC’s VIP system, was specified, utilising its stylish Ultra door entry solution, to enable control of the gate to the housing estate. Each house has its licence and users can use the feature-rich Comelit app to control the gate while also creating QR codes to allow temporary access for visitors. Says David of the resident’s association of Chapel View, “With high expectations for our residents to deliver ultimate security, every element of the new door entry system also had to be considered from a convenience perspective, to enable them to answer door entry requests remotely, from their smartphone." Additional benefits “AC Secure worked with us right from the specification process and took the time to understand these requirements, before recommending Comelit-PAC as an ideal solution." "The additional benefits of utilising app technology to present door entry and QR codes for temporary access to visitors immediately appealed. And the system was installed with minimal disruption and a great benefit to our community." Smart home security systems Adam Cousens, Managing Director at AC Secure added, “Chapel View has the look and feel of a quaint village community where security and door entry is a high priority. All the smart home security systems had to be stylish and futureproof to suit the requirements of the community, whilst also ensuring ease of installation and simple use." “Comelit-PAC’s Ultra system with VIP technology, coordinating with its dedicated app was the natural choice for door entry." Ultra digital entrance panel The system enables new residents to grant access through the vehicle gates using Comelit’s dedicated mobile app "Residents love the sleek design and the VIP technology is easy to use and allows them the convenience to receive calls and see visitors from anywhere. The combination has truly elevated the door entry experience.” The entrance to Chapel View has been enhanced with Comelit-PAC’s stylish, flush-mounted Ultra digital entrance panel. The system enables new residents to grant access through the vehicle gates using Comelit’s dedicated mobile app. Mobile-first solution Stephen Wragg, Business Development Manager for Comelit-PAC concluded, "What our work with AC Secure at Chapel View demonstrates is how Comelit-PAC is ‘with you always.” There is no project too big or too small for us to work with our installers and partners to provide smart, yet stylish door entry solutions for residents to benefit from the latest in smart access control." "Ultra, together with VIP presents a powerful mobile-first solution that can ensure the ultimate security for this residential community.”
DTiQ, the provider of intelligent video surveillance, analytics, and loss prevention services for restaurants, retail, and convenience store locations announced a strategic contract with Church's Texas Chicken®. The agreement recognises DTiQ as an approved supplier of managed video and loss prevention solutions in support of Church’s company-owned restaurant operations. AI and machine learning For over 20 years, DTiQ has provided next-generation business intelligence solutions and services to over 45,000 customers worldwide. DTiQ’s technology continuously gets smarter in real-time through AI machine learning to better identify suspicious transactions, including refunds, discounts, and voids. Using its advanced AI technology, DTiQ’s certified auditors assess suspicious transactions through video footage to provide organisations with an unbiased compliance review, allowing restaurant teams to deliver operational excellence at each location. Video and loss prevention solution DTiQ’s loss prevention solutions will help us remain focused on our mission of serving the bold taste of Texas" Following a successful pilot rollout in 15 Church’s company restaurants, DTiQ’s intelligent video and loss prevention solution will further expand across company-owned restaurants, and the company is a preferred provider for the franchise system. “DTiQ’s loss prevention solutions will help us remain focused on our mission of serving the bold taste of Texas to our guests at an affordable cost,” said Bill Mitchell, Church’s Texas Chicken’s Vice President of Company Restaurant Operations. Easy service Bill Mitchell adds, “From the pilot launch, we measured locations against comparable business periods and recognised a proven reduction in both cash and product theft, resulting in noticeable improvements in food-related costs. These results made our decision to expand DTiQ’s services easy, and we look forward to our continued vendor relationship.” DTiQ’s video-as-a-service provider solution Programmable into any remote video system, DTiQ’s proactive solution maps and marries point-of-sale data with advanced video to identify fraudulent transactions. The video-as-a-service provider’s solutions provide customers with an average of 1% to 2% in cost savings to their bottom lines. Economic value We’re excited to continue to roll their cutting-edge technology and services into additional company restaurants" “The clear delineation from the tailored insights and services provided by DTiQ revealed compelling economic value,” said Danton Nolan, Church’s Texas Chicken’s Executive Vice President and Chief Financial Officer. Danton Nolan adds, “We’re excited to continue to roll their cutting-edge technology and services into additional company restaurants.” Video and managed services “Our video and managed services aim to support Church’s Texas Chicken’s operational, guest experience, and brand goals and is uniquely positioned for a verifiable return on investment for both company and franchisee restaurants,” said John Donnelly III, DTiQ’s Chief Revenue Officer. John Donnelly III adds, “Church’s Texas Chicken is an excellent addition to our growing network of QSR vendors, and we appreciate the opportunity to help them deliver efficient, cost-effective compliance for their guests.”
The legendary Wave Pool in the “Valley of Waves” is the undisputed main attraction in Sun City’s famous water park. Here, visitors find their place in the sun, with two-metre-high waves shooting into the air every 90 seconds. But where there is a lot of light, there is also plenty of shadow which comes in the form of pickpocketing and occasionally swimming accidents. With a video technology solution from Regensburg-based manufacturer Dallmeier, the Sun City Resort has been able to significantly improve its “customer experience”. Panomera® multifocal sensor cameras and SeMSy® video management software Due to the size of the resort, it's a daunting task to monitor the movements of all residents and day visitors in the “Valley of Waves” and therefore, as in any amusement park, it's unfortunately unavoidable to be accountable for the actions of “Valley” users. With Dallmeier, the operators have succeeded in effectively managing their liability for the safety of all visitors By using Dallmeier's patented Panomera® multifocal sensor cameras and SeMSy® video management software, the operators have succeeded in effectively managing their liability for the safety of all visitors to the Valley. In the event of an accident, the company also has access to easy-to-use video documentation. This makes it possible to accurately reconstruct the causes of accidents and take appropriate action. No sunbathing under cameras The challenge was to reconcile the security interests of the visitors and the desire to improve customer service with the expectation of a carefree stay at the beach. Of course, signs are pointing out the video security technology in place, but it is unlikely that guests want to be constantly confronted with the sight of cameras. Video security “This was also the classic paradox of many security solutions: How can you secure an entire beach area in such a way that visitors are protected in the best possible way, but do not feel harassed?” says Hendrik Strauss, Resort Security Manager at Sun City. “It quickly became clear to us that the right choice of technology would play a central role in this initial situation.” Only three systems for more than 16,000 square metres These cameras solve the dilemma of decreasing resolution in depth or distance by combining multiple sensors" In these conditions, and after extensive testing, conventional camera technology was ruled out: The images were simply not accurate enough or the operator would have had to “spike” the site with many cameras. In the end, the surveillance department opted for the patented Panomera® multifocal sensor technology from Regensburg, Germany. “These cameras solve the optical dilemma of decreasing resolution in depth or distance by combining multiple sensors with lenses of different focal lengths,” says Johnathan Rieder, CCTV Technician at Sun International, explaining the patented technology. Panomera® S8 Ultraline camera “In this way, the systems provide a consistently high-resolution image of the entire object space, including the rear image areas and for the entire area of just over 16,000 square metres, the operator only needs three Panomera® S8 Ultraline camera systems." "At the end of the day, the operators are looking at a single overall image; with standard 4K cameras, this would quickly be 20–24 individual images.” Maximum overview for the operators The images from these “individual cameras” are then “stitched” together by software to form an overall image, eight individual images are combined to form one overall image. This means that the operator always has a complete overview during live observation, as the entire terrain is displayed on just three monitors. If required, any section of the overall image can be selected with the mouse and opened in a separate window. Records all details The special feature is that any number of these detailed views can be opened at the same time Operators can zoom into these detailed views as required, enabling them to identify and track details with precision. The special feature is that any number of these detailed views can be opened at the same time and that this function is available in live operation, but also in the recording. This provides Sun City's security experts with an extremely powerful tool for investigating crimes or determining the exact cause of an accident. Bright beach, dark forest Another advantage of the technology used is that, with eight individual sensors available for each image, the problem of large differences in brightness can be solved very well. After all, each of the sensors only must adjust to the differences in brightness in exactly the image area for which it is “responsible”. And in the Valley of Waves, the contrasts could not be greater: The terrain includes both bright sandy beaches and the adjacent tropical rainforest, a huge challenge for any imaging system. “Customer experience” improved to the maximum “We have been using Dallmeier's ‘standard’ camera technology and the company's SeMSy® video and alarm management system ‘indoors’ in the casino for years. We have a total of around 1,200 cameras and are still convinced of the quality of the systems,” says Hendrik Strauss, Resort Security Manager at Sun City. “So, it made sense for us to also use Dallmeier in the outdoor area as well. Especially as there is simply no camera technology on the market that meets our key requirements. Maximum improvement of the customer experience with minimum visibility.”
IDEMIA National Security Solutions (NSS), a subsidiary of IDEMIA, the world’s pioneering biometric and identity solutions provider, provided a demonstration of its innovative biometric access control technology, ID2Access, to key U.S. Army and U.S. Department of Defence stakeholders on November 15 at Redstone Arsenal. The system is deployed at Redstone Arsenal, a massive 38,400-acre site Huntsville, Alabama that serves as the primary training and testing centre for the U.S. Army’s missile and rocket programmes. The U.S. Army Corps of Engineers (USACE) Engineer Research and Development Centre (ERDC) selected IDEMIA to deliver frictionless next-generation access control, increase force protection, promote security, and improve the quality of life for Redstone Arsenal personnel, visitors, and Huntsville residents. Application of biometric technologies The pilot project shows the application of biometric technologies across the full process The pilot project demonstrates the application of biometric technologies across the full process of accessing an installation, starting with testing remote enrolment capabilities, which allow visitors to validate their identities before arriving at the installation, potentially bypassing the Visitor Control Centre. Then there is the testing of the expansion of the facial recognition gate access for vehicles with multiple occupants, beyond just identifying the driver, as well as leveraging the same enrolment to provide facility access using facial recognition and contactless fingerprint capabilities. ID2Access solution IDEMIA NSS’s ID2Access solution leverages IDEMIA’s best-in-class digital and biometric identification technologies, which have a long and successful history in systems nationwide, including operational deployments throughout the U.S. Department of Defence, Federal Government, numerous state and local agencies, and 180 countries across the globe. Redstone gate operators have insight into the comings and goings of people on base in real-time Redstone Arsenal will benefit from improved safety and security, as well as efficiency at access control points. Redstone gate operators will have insight into the comings and goings of people on the base in real-time. Redstone personnel and civilians will find a smoother visitor enrolment process when entering and leaving the base. Remote enrolment technology “Depending on the time of day, visitors can spend an hour or hour and half getting processed at the Visitor Centre,” shared Lafe Hutcheson, Senior Program Director, NSS. “Our remote enrolment technology can enable identities to be validated remotely and greatly reduce those lines. We are also demonstrating the capability of validating not only the driver of the vehicle, but everyone in the vehicle as they enter an access control point for the installation.” Deployment of ID2Access “The deployment of ID2Access demonstrates that our approach to access control and identity authentication provides the protection, efficiency, and installation situational awareness, where it is needed most,” said Patrick Clancey, CEO, IDEMIA NSS. IDEMIA NSS is eager to show the value that ID2Access brings and work with our partners" “IDEMIA NSS is eager to show the value that ID2Access brings and work with our partners to deliver a best-in-class identify verification and access system for securing entry, exit, and movement within the garrison that can reduce the hassle of traffic and delays at Redstone Arsenal.” Author's quote “ID2Access has use cases for operational deployment at continental United States (CONUS) and Outside the Continental United States (OCONUS) military and other sensitive installations," said Evan Bays, VP, Engineering and R&D, IDEMIA NSS. “It can also empower any organisation across any industry looking to expedite access for residents, employees, contractors, and visitors through a streamlined system that protects personnel and assets appropriately while enabling flexibility of movement on and off the installation.”
Sandwell Aquatics Centre in Smethwick is a state-of-the-art leisure centre that originated as a purpose-built arena for the 2022 Commonwealth Games in Birmingham. The facility played host to the highest number of medal events compared to any other, showcasing both swimming and diving competitions. The newly constructed complex included a competition pool for swimming and diving, a temporary pool for swimming and para-swimming warm-up, and an area dedicated to dry-dive training. Reclaiming the space Following its key role in the games, the original structure was reconfigured so it could be used by the local community from the summer of 2023 onwards. The 4000 temporary seats have been removed and fresh facilities tailored for community use have replaced them. The leisure hub boasts a gym with over 100 stations, a specialised ladies-only gym with 25+ stations, along with amenities such as a sauna, steam room, football pitch, two 4-court sports halls, three exercise studios, an indoor cycling studio, and a trio of swimming pools. Plant noise assessment The anticipated noise levels generated by various mechanical components within the plant room In the proposal documents, Mach Acoustics included two detailed acoustic reports – one addressing operational noise and the other focusing on plant noise. The plant noise assessment specifically outlined the anticipated noise levels generated by various mechanical components within the plant room, which includes several pumps and air handling units. Acoustic barrier with integrated louvre The acoustician's initial recommendation proposed an acoustic barrier with integrated louvre features to ensure adequate airflow while mitigating noise. However, a subsequent design amendment specified a solid acoustic barrier with slatted top sections to maintain airflow and enhance aesthetics. Additionally, steel louvre doors were specified for access. Absorptive acoustic barriers These barriers effectively reduce noise pollution originating from mechanical plant areas It has become standard practice to install absorptive acoustic barriers around new and renovated leisure centres. These barriers effectively reduce noise pollution originating from mechanical plant areas and operational compounds. It's not uncommon for heat pumps and air conditioning units to produce a continuous low-level hum or buzzing noise, which can disrupt neighbouring properties and create an unpleasant auditory environment for facility members and visitors alike. Game-changing solutions With prior experience in similar acoustic installations for aquatic and leisure centres, Jacksons Fencing successfully secured a subcontractor contract with Wates. They designed, manufactured, and installed customised acoustic fencing and gates across three elevations: The first elevation covered 16.5m and featured 2.8m high Jakoustic Reflective panels with 2.1m high timber slats above. The second elevation spanned 11m, incorporating 3.2m high Jakoustic Reflective panels with 2.1m high timber slats above, 9.64m of 5.3m high panels, and 11.3m of 3.2m high panels with 2.1m high timber slats. The third elevation extended 16.5m and used 3.2m high Jakoustic Reflective panels with 2.1m high timber slats above. Benefits of solid acoustic barriers These barriers offer an appealing noise reduction solution that conceals machinery and serves as a robust security barrier The different heights of the solid acoustic barriers were strategically chosen to benefit noise reduction, with timber slats enhancing aesthetics and airflow. The project also included matching double-leaf acoustic gates for access. In the first elevation, two apertures were left for steel louvre panels. The acoustic barriers, mounted on galvanised steel posts, were constructed from tongue and groove boards with a deep V profile, tightly slotting together to reflect noise by up to 28dB. These barriers not only offer an appealing noise reduction solution that conceals machinery but also serve as a robust security barrier, devoid of footholds and challenging to scale. Tailored security solutions Peter Jackson, Managing Director, of Jacksons Fencing says, “The Sandwell Aquatics Centre serves as a remarkable example of how facilities can undergo effective reconfiguration to align with their new objectives to ensure they are being utilised effectively." "This project showcases our team's dedication to tailoring security solutions precisely to the task at hand, achieved through the customisation of acoustic fencing. The outcome not only exudes a sleek and sophisticated appearance but also fulfils its vital function. Coupled with a reliable 25-year guarantee, this acoustic fencing ensures enduring noise reduction, cost efficiency, and sustainability.”
Located in Kerala, India, the Somatheeram Ayurveda Hospital with a Resort Ambiance is the best place for not only visual rejuvenation but also physical and mental rejuvenation. Through Ayurveda, Somatheeram provides a means to shed all worries, anxieties, and illnesses. With the objective of combining Ayurveda and Tourism, the Somatheeram Research Institute & Ayurveda Hospital was founded in the year 1985, thus making it the world’s first-ever Ayurvedic Hospital in a Resort Ambiance. The Somatheeram Group of Companies came into being with the efforts of the Founder Managing Director, and Architect Mr. Baby Mathew. Challenges Multi-location transmission proves to be an expensive affair if devices are not chosen wisely Somatheeram has multiple resorts, located at different locations. Multi-location communication can prove to be an expensive affair if communication devices are not chosen wisely. Their dependence on public service providers for communication added to their woes of communication between their resorts. To elaborate: Feasibility of existing telephony: Existing telephony became impracticable considering the frequent communication between multi-located properties. Managing different protocols: Interface with different telecom networks requires managing different protocols, which can be cumbersome, time, and energy-consuming. Absence of modern phone features: The lack of advanced features like abbreviated dialing, call pick up, and internal call restriction, prevented them from becoming efficient in day-to-day operations. Transition to modern communication with existing infrastructure: Their investment in existing infrastructure needed protection while also a provision had to be made to modernise the communication using existing infrastructure. Solution The solution offered was based on the fundamentals of multi-location communication solutions Matrix analysed the challenges of communications for Somatheeram, and crafted a solution that was the best fit. The solution offered was based on the fundamentals of multi-location communication solutions. This included the Matrix range of IP-PBX (ETERNITY GENX12S) and GSM Gateway (SIMADO GFX11 and SIMADO GFX11 4G) that optimised the feasibility of communication and helped the firm become more efficient. Solution includes: The Hybrid IP-PBX included ETERNITY GENX12SAC, which enabled them up to 240 Analogue users with 64 CO Ports. Another Hybrid IP-PBX included ETERNITY PENX, which allowed them access to 100 IP Users, onboard IP User Support, LDAP Client support, support of 4G VoLTE ports, COSEC Door Integration, and much more. The GSM gateway included SIMADO GFX11 and SIMADO GFX11 4G which enabled them to make and receive calls from analogue extensions. The capability to integrate with almost all industry-pioneering PBXs enabled them a smooth transition to modern communication while maintaining existing infrastructure. Results The solution so implemented enabled all properties to work as a single communication platform and proved to be beneficial for Somatheeram and its properties in more than one way. The Hybrid IP-PBX enabled them, unified communication facilities like Email to SMS, audio/video calling, unified messaging facilities, and multi-location collaboration features like UC client integration, one-number reach, etc. The Hybrid IP-PBX also enabled, investment optimisation through universal network connectivity, easy and centralised phonebook management through LDAP client support, mobility convenience through 4G VoLTE support, and much more. The GSM/4G gateway enabled them, GSM/4G connectivity to existing infrastructure, hotline extension dialing, emergency number dialing even in the absence of a sim card, etc. through secure network bridging.


Round table discussion
Driving the smart homes market is the convenience of simple technology solutions. Almost every home now has a “smart speaker” that makes it easier than ever for homeowners to interface and control their technology. But where does security fit into the new landscape of smart home systems? We asked this week’s Expert Panel Roundtable: What’s new in smart homes and residential security systems?
Historically, the emphasis of security systems has been on reactivity, whether it’s providing video evidence of an incident or data to support a resulting investigation. Reactivity is core to impactful security, but increasingly, systems are also seeking to be more proactive. A proactive system seeks to prevent events from happening in the first place, thus mitigating the harm to an organisation, and making the need for a reactive response moot. We asked this week’s Expert Panel Roundtable: How can security systems be proactive? Please provide a couple of examples.
The Metaverse sounds like the plot of the latest summer action movie. In reality, it’s a technology - or, more accurately, a group of technologies - that will likely have a transformational impact on a host of markets. For security, the Metaverse has an extensive list of needs. It also presents some opportunities. We asked this week’s Expert Panel Roundtable: What does the Metaverse mean for security?

Using artificial intelligence (AI) to automate physical security systems
Download
A modern guide to data loss prevention
Download
7 proven solutions for law enforcement key control and asset management
Download
The truth behind 9 mobile access myths
Download
Access control system planning phase 2
Download