Network / IP security
Morse Watchmans, the pioneer in key control and asset management systems, is excited to be showcasing its line of key control and asset management solutions at the 43rd AJA Expo and Conference in Ft. Lauderdale in 2024 at stand 111. Modern Key Control “Modern Key Control is central to properly securing today’s correctional facilities. Our proven key and asset management solutions are a perfect fit, giving security personnel peace of mind and a forensic audit trail of ke...
In collaboration with key partner Trinet Technologies Pte Ltd, Anviz organized two successful roadshow events. Both events brought together more than 30 industry experts who showed great enthusiasm for Anviz's business model of user scenario-driven solutions and interest in the new features of the product. Need for Southeast Asian Markets: RCEP Brings New Opportunities, Largest Incremental Market in the World As the largest FTA in the world, which will lead the development of global free trade...
An air of excitement circled the Gallagher Security booth at the recent TSE event in Birmingham, as the award-winning, global security manufacturer demonstrated the latest innovations in their security ecosystem. The annual event, held from 30 April – 2 May which attracted more than 14,000 visitors to Birmingham’s NEC, brought together manufacturers, distributors, installers, consultants, and end users, and displayed the latest products, tech...
TraiCon Events will be hosting Botswana’s premier cybersecurity event titled “Cyber Revolution Summit” scheduled on 9th August 2024 in Gaborone, Botswana. This summit will feature keynote presentations and panel discussions with top security experts from various industries covering a range of topics, including cybersecurity innovations, data privacy & security, risk management, network security, threat detection & intelligence, and vulnerability manage...
Current UK Managing Director Andy Madge will retire, effective 1 July 2024, handing over responsibility for the UK and Ireland subsidiary to Mike Garrod. Mike Garrod, with extensive experience in the aerospace and defense sectors, joined Frequentis UK on 13 May to begin a phased handover to close Andy’s seven successful years as Managing Director of the UK and Ireland subsidiary. Frequentis UK Frequentis UK operates across all five Frequentis business segments, including civil and...
Airport Show is all set for a smooth take-off for its 23rd edition on May 14 at the Dubai World Trade Center (DWTC) with key stakeholders utilizing the annual exhibition dedicated to the Middle East, Africa, and South Asia (MEASA) to explore and embrace new technologies and innovative products to handle the fast rebounding air passengers and cargo traffic. Airport passenger expectations The participants will also have their focus and attention on products and services designed t...
News
Allied Universal, the world’s pioneering security and facility services company, is proud to announce it was named a finalist for the 2023 Downtown Orlando Partnership (DOP) Golden Brick Awards. The Golden Brick Awards are commissioned by the DOP and recognize the people, projects and initiatives that support downtown Orlando business, tourism and the local community. Safety and well-being Allied Universal team works with the local police and fire units to ensure the safety and well-being Allied Universal supports the City of Orlando Downtown Ambassador program by providing enhanced hospitality and security with the presence of dedicated representatives to ensure positive downtown experiences. The Allied Universal team works with the local police and fire departments to ensure the safety and well-being of those visiting Orlando, as well as interacting directly with the area’s unhoused population to help them obtain the care and services they need. 2023 DOP Golden Brick Awards “Allied Universal is honored to have been named a finalist for the 2023 DOP Golden Brick Awards,” said Eric Glasgow, regional vice president for Allied Universal in Florida. “Our team is proud to safeguard the public and service the unique needs of the downtown Orlando community through the Ambassador Program. We remain committed to working closely with the DOP and continuing to make a difference in the lives of those working and living in the downtown community.”
Durite will use the Road Transport Expo to demonstrate how AI and digital systems are improving road safety – and how this technology can help attract more young people into the industry. Durite, a pioneer in vehicle safety, lighting and auto electrical parts will be showcasing its popular Demo Van on Stand R45, Hall1 at the RTX in Stoneleigh on 4th-6th June. Durite Driver Status Monitoring The vehicle is equipped with a combination of the company's safety innovations, showcasing how Durite can help to support fleet compliance with standards such as the DVS Phase 2, FORS, and CLOCS. The technology on the vehicle includes Durite’s DVR kits, 4G live-streaming DVR and CCTV kits, AI and Progressive Safe Systems, innovative lighting and smart telematics tracking. Durite can help to support fleet keeping with norms such as the DVS Phase 2, FORS, and CLOCS Visitors will be able to explore the Innovation Corner of the stand, where Durite will feature its HD range of cameras and the new Durite Driver Status Monitoring system. This uses AI to detect dangers that drivers are facing daily, such as fatigue and distractions. It sounds like an alert to make the driver aware of hazards, helping to improve safety for both drivers and other road users. Durite’s ADAS technology The system can be combined with Durite’s ADAS technology, designed to monitor the vehicle and road environment around it to predict potential collisions. By warning the driver early, it allows the driver to react in good time and avoid accidents. John Nobbs, UK Sales Manager for Durite, said: “Our stand will reflect Durite’s ethos of harnessing technology to enhance road safety. The Innovation Corner will showcase pioneering edge tech that is bringing a new dimension to driver safety. Meanwhile, the demo van is a great way for fleet operators to really see how combining and integrating systems can help with compliance and reduce road risk.” Initiative to enhance recruitment Durite is taking part in the School of Thought Automotive’s program to highlight the opportunities Durite is taking part in the School of Thought Automotive’s program to highlight the opportunities that working in the automotive and fleet sector can offer the next generation. School of Thought Automotive is an industry initiative to enhance recruitment and retention of young people. It will bring year 11 students aged 15 and 16 from local schools and colleges to attend the opening day of the Expo, and on the Durite stand, they will be able to experience the challenges of driving an HGV using an interactive truck and logistics simulator game. “It is a great opportunity to promote and raise awareness of the steps that the industry is taking to make the road safer for everyone,” adds John Nobbs. Opportunities for growth and improvement Durite Marketing Manager, Veronique Vanoli, said: “As a significant supplier to the UK Transport industry, we feel a duty to help our sector recruit the next generation. The industry is constantly evolving, always bringing in new and improved technologies for vehicles and smarter ways to handle logistics. It's this ongoing flow of innovation that keeps things interesting and offers endless opportunities for growth and improvement. There are excellent career prospects and we’re proud to play our part in shaping the industry and helping inspire young people to join it.” Durite, a FORS associate, has been supplying vehicle cameras for more than 20 years and has provided more than 50,000 systems to operators throughout the UK. An extensive network of distributors and approved installers service the whole of the UK and Ireland.
Videx Security, a provider of access control and door entry solutions, has announced the launch of its XPROX-MO, a cutting-edge panel mount Mifare proximity reader. Designed for use with the Videx WS4 web server access control system and compatible with third-party access control systems supporting the Open Supervised Device Protocol (OSDP), the XPROX-MO offers unparalleled flexibility and security for modern access control needs. Versatile compatibility and installation The XPROX-MO reader supports a wide range of Mifare cards and tags, including Classic, Plus, Desfire, and Ultralight. It is also compatible with high-security applications utilizing Desfire cards where data encryption is achieved using 128-bit AES on both the reader and cards/tags. The reader’s design aligns with the UK industry standard, fitting a 40mm x 40mm cutout, making it ideal for both new installations and retrofits. Robust security features Featuring IP65 ingress protection, the XPROX-MO is built to withstand harsh environments, ensuring reliable operation in various conditions. The reader includes three status indication LEDs (green for access granted, red for access denied, and amber for standby) and an internal buzzer for clear audible feedback, enhancing user experience and security. Advanced configuration and connectivity XPROX-MO is equipped with a built-in micro-USB connection for easy configuration and firmware updates The XPROX-MO is equipped with a built-in micro-USB connection for easy configuration and firmware updates. Its RS485 connectivity ensures seamless integration with both Videx WS4 and third-party access control systems. The reader also supports multiple proximity card formats, including HID iClass CSN and NTAG, providing extensive compatibility for diverse applications. Flexible and secure access control solution Rob Sands, Videx’s Technical Director, said, “Our goal with the XPROX-MO is to provide a flexible and secure access control solution that meets the evolving needs of our customers." "The combination of advanced features, robust security, and ease of integration makes this reader an excellent choice for a wide range of entry applications.” Key features Ingress protection: IP65 rated for dust and water resistance. Multi-purpose support: Compatible with various Mifare card formats and high-security Desfire applications. Easy integration: Fits a standard 40mm x 40mm cutout, suitable for new and retrofit installations. Status indications: LED lights and buzzer for clear access status. Advanced configuration: Micro-USB input for easy setup and updates. Robust performance: Operates effectively in temperatures ranging from -15°C to +50°C.
Johnson Controls, the global pioneer for smart, healthy, and sustainable buildings, launches the Facility Explorer FX90 Supervisory Controller, packed with unique, advanced features to make building automation easier, smarter, and more cost-efficient. The FX90 represents the next generation of Facility Explorer supervisory controllers designed to streamline and automate workflows to increase building automation performance with minimal maintenance. Responsive user interface “Every aspect of the FX90 controller was designed with the user in mind,” said Kaishi Zhang, global vice president of product management, Building Automation Systems and Controls at Johnson Controls. “From start-up and commissioning to its responsive user interface and the highly scalable design, the FX90 simplifies each process to drive building performance now and in the future.” IoT-embedded controller The IoT-embedded controller seamlessly connects as many as 200 equipment controllers This latest evolution of the Facility Explorer platform delivers unmatched additional value with more than 20 exclusive productivity tools within the FX Appliance built on top of the proven Niagara Framework®. These enable system integrators to quickly establish a system configuration database in minutes using automatic tagging, auto-generated 3D graphics, and more to save time and money. The IoT-embedded controller seamlessly connects as many as 200 equipment controllers, creating a robust control supervision and network management system. Key benefits of the FX90 controller The FX90 features a one-size-fits-all hardware platform with modular accessories and flexible device/point licensing that enables it to handle building automation jobs of any size and complexity. Some of the key benefits of the FX90 controller include: Creates powerful, future-ready buildings: Increased computing power with 2 GB memory and 8 GB storage provides faster boot-up and station startup, quicker data access and decision making along with plenty of storage for backups, point history, and future upgrades. Seamless integration: FX Workbench Import Managers and N2 protocol drivers enable easy integrations, including added support for the TEC3000 Series Thermostat Controller. Maximises scalability: The controller scales from basic to complex applications with a single hardware platform, using orderable devices and point licensing. License upgrades can be purchased as future needs arise. Enhanced user experience: An optimized graphical user interface makes operation easier to help reduce the learning curve and human error. Legacy FX80 controller The FX90 Supervisory Controller replaces the legacy FX80 controller, which will be phased out in 2025. The FX90 uses the same footprint, wiring connection location and orientation as the FX80, and is fully compatible with all existing expansion modules to enable a seamless drop-in replacement or upgrade. Future-proofing the system now allows for a long operational life and makes future updates easier.
Hospitals are turning to video technology to enhance patient care and safety with the rising demand for healthcare services and the ongoing battle against staffing shortages. However, hospitals looking to expand their video technology must ensure their surveillance systems are compliant with the Health Insurance Portability and Accountability Act (HIPPA). Being HIPAA compliant helps protect patient privacy and safeguard sensitive health information. This is non-negotiable in the digital age. With the increasing adoption of healthcare video analytics and artificial intelligence (AI) technology, it’s more crucial than ever to strike the right balance between leveraging technology and maintaining HIPAA compliance. This article explores how they can establish a HIPAA-compliant video surveillance system for the healthcare facility. HIPAA compliance in video surveillance Video analytics in healthcare systems must be set up in a way that saves patient privacy at every turn HIPAA extends beyond paperwork and digital records — its regulations include video surveillance and electronically protected health information (ePHI) in healthcare settings. While HIPAA does not specifically address video surveillance, its requirements for privacy and security of PHI affect how it should be implemented. This means anything that could identify a patient, whether their name, medical history or face in a video, falls under HIPAA’s watchful gaze. Now, when they’re thinking about bolstering the hospital’s video technology, ensuring that the video surveillance systems play by HIPAA’s rules is essential. This involves verifying that the cameras, recording devices and any healthcare video analytics tools they might use are all HIPAA-compliant. Video analytics in healthcare systems must be set up in a way that protects patient privacy at every turn. Some ways include encrypting recorded footage, restricting access to authorized personnel, or blurring out identifying features. HIPAA requirements in video surveillance The following practices help ensure video technology usage complies with HIPAA’s overarching goals: Limiting PHI exposure: Place video surveillance in a way that reduces the possibility of collecting PHI unless necessary for a specific, justifiable purpose. Some settings to avoid include places where PHI is likely to be accessible or discussed, such as treatment areas or screen displays. Access control: Access to video material should be managed and limited to authorized personnel only. This aligns with HIPAA’s mandate to create technical policies and procedures restricting ePHI access to authorized individuals. Encryption and security: Video data should be encrypted in transit and at rest, mainly if it could capture PHI. Encryption keys should protect against unauthorized access, tampering and loss. Data retention and disposal: Set up policies for video footage retention and disposal. This security measure ensures it’s kept no longer than necessary and disposed of securely to prevent unauthorized access to PHI. Breach notification: If a breach occurs, then facilities must reference the HIPAA Breach Notification Rule. This rule requires they to notify affected individuals, the Department of Health and Human Services (HHS) and, in some cases, the media. Training and policies: Staff should be trained on proper video surveillance system usage. Additionally, they should set up policies regarding using, accessing and monitoring video surveillance to protect PHI. Physical safeguards: Camera placement and the physical security of the video surveillance system should be considered to prevent unauthorized viewing or tampering. Eight best practices for adopting video analytics Beyond the foundational HIPAA considerations, there are additional best practices to consider. With these concerns in mind, hospital administrators can improve compliance, protect patient privacy and use video surveillance technology effectively and ethically. Vendor Agreements: If a third-party provider offers or manages the video surveillance system, a Business Associate Agreement (BAA) is required. This agreement assures that the vendor follows HIPAA requirements for protecting and handling PHI. Regular Audits and Assessments: Conduct security risk assessments and audits of the system to identify vulnerabilities and assess compliance with HIPAA regulations. These audits should include reviewing who has accessed video data, and ensuring access controls function as intended. It should also involve verifying that physical and technical safeguards are adequate. Incident Response Plan: Develop and implement an incident response plan. Ensure the response plan includes procedures for responding to security incidents that may affect the confidentiality, integrity or availability of video data containing ePHI. This plan should also outline steps for mitigating risks, documenting incidents and reporting breaches in compliance with HIPAA requirements. Notice of Privacy Practices: Ensure the Notice of Privacy Practices (NPP) reflects the potential for video recording in areas where patients are treated or where PHI may be disclosed. Patients should be informed about how their information — including video recordings — may be used. Patients should also be aware of their rights regarding those recordings. Consent and Signage: In some cases, it may be necessary or required to acquire explicit consent from patients or to display signage informing them of video surveillance. This depends on state regulations and the specific contexts in which video surveillance is used in healthcare facilities. State Laws and Regulations: Be aware of and comply with state-specific laws and regulations regarding video surveillance in healthcare settings. Some states may have more stringent requirements than HIPAA regarding patient consent, the use of video recordings or privacy protections. Integration With Other Security Measures: Ensure that video surveillance is integrated into the broader security and privacy framework. This approach includes aligning video surveillance practices with other physical and technical safeguards to protect PHI. These safeguards have secure communication channels, data encryption, and access control systems. Training and Awareness: Provide ongoing training and awareness programs for staff about the proper usage of video surveillance systems. These trainings can include the importance of protecting patient privacy, and the legal requirements surrounding PHI. AI and HIPAA compliance in healthcare These AI solutions help streamline guard operations and allow them to respond quickly to incidents Technology continuously evolves and they’ve seen increasing usage of artificial intelligence (AI). But how is AI used in health care? How is it used for video surveillance in healthcare settings? Imagine having a virtual assistant that constantly watches over the video footage, analyzing it in real-time to flag any potential HIPAA violations. That’s where AI-driven analytics come in. These algorithms can automatically detect and redact sensitive information from the surveillance footage. This helps ensure that only authorized personnel can access it. But AI doesn’t stop there. With AI-powered remote monitoring solutions, they can monitor the surveillance cameras anywhere, anytime, from the device. These AI solutions help streamline surveillance operations and allow them to respond quickly to incidents or security breaches. See AI as giving the healthcare facility’s security system a high-tech upgrade that can help automate compliance tasks, improve data security and streamline surveillance operations. Enhance HIPAA compliance with AI and security technology Healthcare facilities can comply with HIPAA requirements with video analytics and AI-driven solutions while streamlining their surveillance operations. If they’re considering upgrading the facility’s video technology, partner with BCD. They offer innovative security solutions tailored to the unique needs of healthcare facilities. The solutions boast features like NDAA compliance, cyber-hardened hardware and validated integration with top VMS and analytics solutions. By exploring and adopting BCD’s solutions, hospital admins can enhance patient care, improve operational efficiency and build a safer, smarter healthcare environment.
The 23rd edition of the Airport Show was the venue to showcase and introduce new technologies and services in ground handling, cargo movements, and airport operations to foster agility as well as sustainability. More than 30 new innovators joined the Airport Show to introduce their cutting-edge technologies and services. Innovations introduced were a major draw at the Show, which attracted thousands of trade visitors and stakeholders. Helipad Systems Supplies Ground handling service providers and air navigation service providers, participating in the Airport Show received overwhelming response from the industry as well as trade visitors. Global Air Navigation Services (GANS), the only private sector air navigation services provider in the region certified by the UAE’s General Civil Aviation Authority (GCAA), displayed its capabilities in the engineering of Heliport Facilities and Helipad Systems Supplies and Installation. GSE Zone, in partnership with dnata, witnessed the showcasing of innovations presented by ground-handling equipment manufacturers. GSE Zone at Airport Show 2024 Mallaghan trucks This innovative choice aligns seamlessly with Dnata's dedication to environmental responsibility Big players like dnata showcased Mallaghan's cutting-edge trucks for catering operations, highlighting its commitment to sustainability. By opting for Mallaghan trucks equipped with EURO 6 technology, dnata achieves an impressive 80% reduction in emissions compared to EURO 5 standards, along with a 66% reduction in permitted particulate mass. This innovative choice aligns seamlessly with dnata's dedication to environmental responsibility and engineering excellence. Tisabas Operation, Towbarless tractor dnata also showcased ‘Tisabas Operation’, a folding baggage conveyor system for loading and unloading bags, cargo, and mail in aircraft. This system is created to help prevent back injuries caused by working in confined spaces, repetitive lifting, and twisting of loads. It also helps to reduce damage to aircraft and to customer baggage with fewer claims. dnata also displayed the Towbarless tractor, an electric vehicle for towing aircraft at airports. SDX 10060 XDi Smith Detection showcased SDX 10060 XDi, a groundbreaking advancement in security screening technology. The system accurately identifies molecular structures by utilizing X-ray Diffraction (XRD), revolutionizing object detection even among items with similar densities. Smiths Detection Stand at Airport Show 2024 Key features include automated alarm resolution for hold baggage screening, enhancing both security and operational efficiency. Screening accuracy SDX 10060 XDi elevates screening accuracy for narcotics and contraband, bolstering security measures Additionally, in-line automatic air cargo screening is streamlined, improving security and operational speed for small parcels and mail. The SDX 10060 XDi also elevates screening accuracy for narcotics and contraband, bolstering security measures at international checkpoints. Panel discussion The Airport Show 2024 hosted a high-profile panel discussion titled “Elevating Passenger Experience: Investing in Innovation to Capture Traveler Hearts.” At a time when the travel industry is facing unprecedented changes and challenges, the session explored the critical importance of passenger experience in today’s competitive landscape and the pivotal role of innovation in shaping it. Experts and pioneers from the industry shared their insights and strategies for elevating the passenger experience through innovative solutions and technologies. Critical nature of passenger experience The panelists highlighted innovation as the driving force behind enhancing and transforming this experience The session, moderated by Dr. Nikhil Kilpady, Director - Aerospace & Defense, Frost & Sullivan, featured Nagy Abu Zeid, Vice President of Strategy and Planning at Oman Airports, Alpros Mohammad Hamzouq, Quality, Safety and Risk Management Director, Airport International Group (AIG), Anurag Shandilya, Head of Operations, Noida International Airport in India, Ismail Issa, Manager Innovation - Web 3.0, Futures & Innovation at Emirates Group, and Ioana Apintei, Head of Product at AirportLabs. The panelists emphasized the critical nature of passenger experience as a key differentiator in the competitive travel industry. They highlighted innovation as the driving force behind enhancing and transforming this experience. Data-driven insights and feedback mechanisms The speakers discussed the importance of continuously adapting to the evolving expectations and preferences of travelers through innovative approaches, leveraging data-driven insights and feedback mechanisms. They also explored innovative passenger-centric solutions and advanced technologies that have significantly improved passenger experiences across different travel modes, including biometrics, AI, IoT, and seamless travel journey solutions.
Expert commentary
For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdles. A majority of public-school districts today are faced with outdated infrastructure and security controls, requiring necessary upgrades. By addressing these concerns head on, schools will ensure a safer environment for both students and staff, mitigating risks posed by unforeseen physical and digital threats. Common K12 security pain points There’s no one-size-fits-all solution in school district security. School districts may have big plans to implement upgraded security systems but to set out on the right foot, pioneers must have a clear vision of their long-term strategy. When embarking on their security journey, education pioneers often wonder where to start and what exact steps are they need to be taking to identify and address weaknesses. Local K12 and government pioneers are promoting and mandating security assessments to uncover safety gaps on campuses and mitigate these risks with advanced technology solutions. Not only do assessments provide detailed, customizable roadmaps for district pioneers, but they also recommend technologies and funding opportunities to help close threat gaps. K12 school districts are mainly vulnerable to cyber-attacks due to the sensitive nature of student records In today’s climate, schools face a growing number of physical and digital security threats. From a cybersecurity standpoint, K12 school districts are particularly vulnerable to cyber-attacks due to the sensitive nature of student records. However, only one-third of these districts have adequate staffing to address threats effectively. In addition, according to a recent survey from Johnson Controls and Forrester Consulting, security decision-makers are having trouble receiving actionable insights. Nearly two-thirds of respondents said that they struggle to receive information from all necessary systems regarding their security threats. To gain more clarity into what school districts need in terms of security tools and threat mitigation, implementing system-wide monitoring and optimization can be invaluable. This approach enhances equipment and operational efficiency, while providing necessary resources and expertise for critical patch updates across all systems, strengthening their overall security posture. Achieving a well-rounded security program In the past few years, AI technology has emerged as a trending solution and is generating considerable attention. While the allure of implementing cutting-edge technologies is undeniable, it’s important to recognize that a robust security program hinges on solid access control. Access control technology provides administrators with the means to oversee and regulate entry into facilities, serving as the foundation for basic physical security. The technology helps administrators and staff control access to multiple areas from web-enabled devices, even during lockdowns which is crucial in emergency situations. School district pioneers should utilize available digital risk assessment tools to uncover threat areas Once basic security controls are in place, school districts must address their next set of security pain points and identify which solutions meet their specific needs. This involves identifying and prioritizing the highest need and most cost-effective investments that will have the greatest impact on enhancing security measures. To accurately determine which security solutions are needed for a specific environment, school district pioneers should utilize available digital risk assessment tools to uncover threat areas and determine levels of priority. By focusing on these priority areas, districts can allocate their resources and efforts where they are needed most, ensuring maximum effectiveness in mitigating risks and vulnerabilities. Securing funding before approaching deadlines A major challenge for school districts surrounding campus security is identifying and securing the necessary funding to implement solutions aligned with their goals. Leveraging available funding sources is critical, especially considering certain programs are approaching their deadline, like the Elementary and Secondary School Emergency Relief (ESSER) fund. Announced during the pandemic, ESSER is a funding program that has allocated nearly $190 billion in aid to U.S. public school districts to fund projects benefitting the well-being of occupants. Notable ESSER funding deadlines to keep in mind as the clock winds down include September 30, 2024 Notable ESSER funding deadlines to keep in mind as the clock winds down include September 30, 2024, when schools must attribute all of their funds to assigned contracts. Following this date, pioneers will need to complete all ESSER spending by January 2025 unless approved for an extension into March 2025. As ESSER wanes, school districts are acutely aware of the fiscal cliff in budgets through 2025. However, many states are ramping up grant funding to close the deficit gap. Administrators should become familiar with these grant opportunities at a local and state level. Get started on security plans The time for school district pioneers to act is now. While the safety and well-being of students and staff are always top priorities, it’s crucial to acknowledge that a lack of insight into necessary security upgrades and available funding options will leave districts behind the curve. Seizing the final months of ESSER funding presents an ideal window to address security pain points and build a safer future for K12 facilities. Looking beyond ESSER, pioneers must proactively seek out and leverage other funding avenues to help ensure the continuity of their security efforts and maintain a proactive stance in safeguarding healthy and safe educational environments.
Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabilities and features, and the usability to achieve adoption and productivity goals. A successful evaluation process will help ensure that this mature and proven user authentication method performs as expected. Fingerprint biometric advantages The speed, simplicity, accuracy, and cost-effectiveness of the fingerprint method have made it among the most widely used for biometric authentication across industry sectors ranging from banking and finance, retail, and healthcare, to government and law enforcement. It performs biometric technology’s “something you are” function while offering unique characteristics that make it particularly valuable for many applications. Unique identifier The fingerprint biometric has the permanency of being reasonably stable and consistent over time Among these characteristics is the pervasiveness and special nature of the fingerprint -- almost everyone has one, and each is a unique identifier. The fingerprint biometric has the permanency of being reasonably stable and consistent over time. It is also easy to acquire, measure, and process. High adoption rate Another key attribute of a fingerprint biometric is its ability to be protected against threats ranging from abuse and misuse to theft, imitation, and substitution. When it is used with recognition techniques the resulting solution performs with a combination of accuracy, speed, scalability, and ease of use. Fingerprint biometric solutions also have the highest adoption rate among biometric authentication solutions according to an industry report published by Payments Journal. Three interrelated components There are three basic components in any fingerprint biometric system as shown in Figure 1: capture (using a sensor that can capture even the most difficult finger types); liveness detection (using the Presentation Attack Detection – or PAD – technique); and matching (including preventing rejection of a legitimate user). Biometric algorithm The sensor captures and pre-processes the fingerprint data. It must be able to successfully capture fingerprint images for a range of skin types and print conditions under diverse temperatures, humidity, light, surface oil, dust, dirt, and other environmental conditions. A biometric algorithm then extracts minutiae data about the fingerprint ridges (endings, bifurcations, islands, etc.) and their orientation and position. PAD technique Implementing a presentation attack detection (PAD) technique at this stage activates the fingerprint biometric system’s second key element: liveness detection. This verifies the fingerprint’s authenticity and that it belongs to a living person. The system’s third element – matching – occurs after the PAD-verified fingerprint dataset has been securely stored as a record, known as a template, inside an enclave with cryptographic protection. Check for liveness The corresponding template of the legitimate user is then retrieved from secure storage When the fingerprint is presented for matching, it is rechecked for liveness. The corresponding template of the legitimate user is then retrieved from secure storage and the process of matching the fingerprint with this template is executed. This must be completed accurately and without rejecting a legitimate user. Types of fingerprint sensing technologies There are four prevailing categories of sensing technologies used with fingerprint readers: optical, capacitive, thin-film transistor (TFT), and multispectral imaging (MSI). Optical and capacitive method Optical is the most mature sensor technology and offers the benefits of a compact size, good capture Optical is the most mature sensor technology, and offers the benefits of a compact size, good capture and matching performance, a small enough size to fit in most desktop environments or shared workstations, and a high level of accuracy at a cost-effective price point across all use cases. The capacitive method, on the other hand, is less prone to fake finger attempts while also offering a thin and compact size for space-limited applications, the power efficiency to support battery-operated devices, and the ability to handle both indoor and outdoor lighting conditions. TFT technology The third technology goes a step further in capture accuracy. TFT technology can accurately recognize the smallest fingerprint features with ultra-high resolution and is used either as a larger-size matrix capacitive proximity detector (capacitive fingerprint sensor) or a larger-area matrix light detector (optical fingerprint sensor). It is ideal for in-the-field mobile identification applications that require a cost-effective, ultra-slim, and lightweight solution with low power consumption. MSI technology MSI technology differs from all three approaches, projecting multiple colors of light into the finger from different angles to collect both surface and subsurface biometrics data. It captures the most difficult fingerprints of diverse demographics, in a wide range of challenging environments. HID has used this patented technology in fingerprint readers that are compliant with ISO 30107-3 PAD Level 2 for advanced anti-spoofing against fraud. The technology also improves matching and offers sophisticated endpoint security that prohibits cyber criminals from gaining unauthorized access to networks by turning fingerprint readers into secure endpoints. Best practices for technology selection Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership. There are three top considerations: security, suitability, and usability. Each is important and the best approach is to strike a balance between all three. Following are the questions to ask during the selection process: Security: What is the regulatory environment? Financial and government services, healthcare, and law enforcement are some examples of highly regulated sectors with elevated security compliance requirements. Are there mandates in place for advanced capturing and biometric authentication specifications? How important is it to ensure anti-spoofing through liveness detection? Will endpoint security be required so that, if the fingerprint device is hacked, no network, system, or data behind the firewall will be impacted? Suitability: Where will the biometric technology be implemented? There will be additional considerations if it is to be embedded in portable, battery-operated devices that require low power consumption. Where will the technology be used? Will it need to fit into small spaces or be used in challenging indoor or outdoor conditions and environments? Will durability be important? Some deployments will face unpredictable weather and difficult lighting conditions for image capture. Will the technology be used for mission-critical border control or a more common – and less demanding -- commercial use? Usability Is it critical that the technology easily and consistently perform capture and matching? Will there be high volumes of fingerprint captures and matches? Is “friction frustration” a concern? If so, the solution must perform matching quickly and accurately to sustain high levels of user productivity. Will the fingerprint device be used by one person exclusively, or multiple people in a shared workstation setting? How diverse is the user population? Some readers are designed to handle all types of fingerprints and diversified demographics. Different applications Fingerprint biometrics is a proven solution to address real-world challenges, each with its requirements The answers to these questions will help determine the best choice of fingerprint technology. Different applications apply fingerprint biometrics to very different use cases but in all cases. It is a proven solution to address real-world challenges, each with its requirements. For instance, in a healthcare clinician’s terminal area or a similar shared environment with limited space, a durable, low-profile capacitive sensor may be the right answer. For an organization in a highly regulated, mission-critical environment like a bank or border control agency, advanced technologies such as MSI readers may be needed to avoid the serious repercussions of a spoofed identity or the rejection of a legitimate one. Requirements for a biometric solution These are just a few of the requirements to consider when choosing a fingerprint solution. In banking and finance, alone, fingerprint biometrics is used for applications ranging from transacting at the ATM to customer onboarding (eKYC), compliance (AML/KYC), and fraud prevention. The retail sector adds even more, including age verification, loss prevention, point of sale (POS) security, self-service checkout, and secure time and attendance. Law enforcement organizations have their unique requirements, using fingerprint biometrics for background checks, criminal booking, crime investigation, inmate management, mobile identification, and more. For government agencies, typical applications include benefits distribution, border security, citizen ID, employ authentication (SSO/MFA), and voter registration. Each application requires a thorough assessment of the best fingerprint technology for the job. The right touch The right solution will deliver the optimal balance of security, suitability, and usability Fingerprint biometric solutions empower a wide range of use cases with the simple touch of a finger. The right solution will deliver the optimal balance of security, suitability, and usability based on an analysis of criteria including specific application requirements, the characteristics and size of the user population, and challenges posed by environmental conditions. Accuracy, efficiency, and security The world faces increasingly dangerous fraud, account takeover, and impersonation threats. As industries and enterprises work to improve and evolve their identity and access strategies to combat these threats, fingerprint biometrics continue to prove their value through solutions that meet the key selection criteria while delivering the highest levels of accuracy, efficiency, and security.
Educational institutions worldwide increasingly rely on robust wireless networks to enhance academic pursuits, safety measures, and operational efficiency. The campus environment, a complex network of interconnected buildings, and the humans navigating them require innovative technologies to meet these diverse needs. The solution lies in a new wireless protocol that provides an ideal fit for the long-range, low-power connectivity requirements of educational campuses: Wi-Fi-certified HaLow. Wi-Fi HaLow: Wi-Fi HaLow, a new Wi-Fi certification released by the Wi-Fi Alliance in November 2021 and incorporating the IEEE 802.11ah standard, is optimized for the unique requirements of Internet of Things (IoT) applications. Wi-Fi HaLow provides a reliable and robust wireless solution that overcomes the trade-offs Its combination of long-range connectivity, low power consumption, advanced Wi-Fi CERTIFIED WPA3 security features, and the ability to connect more than 8,000 devices from a single access point makes the protocol a game changer for campus environments. Wi-Fi HaLow provides a reliable and robust wireless solution that overcomes the trade-offs between range and speed that limit the effectiveness of conventional Wi-Fi in the 2.4, 5, and 6 GHz frequency bands for campus applications. Robust, secure connections for access control Operating at sub-GHz frequencies, the Wi-Fi HaLow protocol's unparalleled ability to penetrate physical barriers and its advanced security features make it an ideal wireless technology for supporting access control systems throughout campuses. Credential systems for students, badge scanners, cameras, and dormitory door locks can work efficiently and securely in hard-to-reach locations, providing an interconnected and safe environment for the campus community. Enhancing safety through improved connectivity Body-worn cameras used by public safety officers can remain connected to the wireless local-area network The low-power and long-range attributes of Wi-Fi HaLow can play a significant role in strengthening campus safety systems. Body-worn cameras used by public safety officers can remain connected to the wireless local-area network (WLAN) or mobile router in their patrol vehicles even at a long distance, reducing the need to consume cellular data. Wi-Fi HaLow enables the development of robust wireless networks that can reliably support campus-wide, two-way video intercoms, potentially enhancing response times and safety measures. Streamlining outdoor equipment automation Outdoor equipment automation, such as irrigation systems, smart lighting, and robotic lawnmowers, can leverage Wi-Fi HaLow's power efficiency, and long-range and expansive coverage. Automation of these systems with such efficient wireless connectivity can lead to significant energy savings, improved productivity, and reduced operational costs. Delivering superior speed and range 8 MHz capable device using 64 QAM modulation can transmit at speeds of up to 32 megabits per second A Wi-Fi HaLow network shatters the traditional tradeoff of wireless communications between speed and range. A single-stream, 8 MHz capable device using 64 QAM modulation can transmit at speeds of up to 32 megabits per second at sub-GHz frequencies, enabling live streaming on large screens, connecting multiple real-time AI edge cameras, as well as thousands of low-power IoT devices, all connected without compromising on range. Wi-Fi HaLow signals can extend beyond 1 kilometer, up to 10 times farther than traditional forms of Wi-Fi in the 2.4, 5, and 6 GHz frequency bands, and are capable of connecting far-flung devices and systems across campus environments. Setting a new standard for campus connectivity By addressing the connectivity needs of modern campuses, Wi-Fi HaLow paves the way for future campus applications. As we navigate the digital era, Wi-Fi HaLow presents a compelling solution that significantly enhances connectivity, safety, and efficiency. This leap in wireless capabilities isn’t merely incremental; it represents a transformative stride toward a smarter, more connected future. Wide-reaching wireless network Educational institutions can leverage Wi-Fi HaLow to create safer, more efficient, and interconnected campus environments. By providing a robust, reliable, and wide-reaching wireless network, Wi-Fi HaLow enables campuses everywhere to fulfill their diverse connectivity needs without compromise.
Security beat
ISC West 2024 mirrored a vibrant industry on the precipice of accelerated change. Factors such as the cloud, artificial intelligence (AI), edge computing, and biometrics are shaping the future of the security marketplace, and they were front-and-center at the industry’s biggest U.S. show in Las Vegas. Foot traffic was steady and impressive, including more than 29,000 security industry professionals viewing 750 exhibitors. A torrent of eager attendees crowded the lobby on the first day and could not wait for the doors to open. When they were admitted, the wealth of technological innovation and business opportunity did not disappoint. Focus on cloud systems Cloud systems were high-profile at ISC West. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference. Meanwhile, Genetec officially launched their Security Center SaaS platform, which aims at eliminating points of friction to enable integrators to easily embrace cloud systems from quoting and ordering to provisioning and installing. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference Cloud provider Eagle Eye Networks promoted their new “Eagle Eye 911 Camera Sharing” technology under which both non-Eagle Eye Cloud VMS customers (via Eagle Eye 911 Public Safety Camera Sharing) and Eagle Eye customers can opt to share their video feeds for use by 911 operators in case of emergency. If users opt-in, 911 operators can have access to live video as an emergency unfolds. Eagle Eye Networks provides the feature by integrating with RapidSOS call center software. Camera locations are based on geolocation coordinates, and customers can choose if they want to participate and which cameras they want to share. Biometrics in the mainstream Biometrics were well represented at ISC West, including Alcatraz AI, which introduced an outdoor version of their biometric face recognition product. The Rock X works well despite harsh lighting. Alcatraz’s products do not have to be integrated, they communicate just like a card reader using OSDP or Wiegand protocol. “At the show, customers are excited about moving to a frictionless environment and getting rid of existing credentialing,” said Tina D’Agostin, CEO and co-founder of Alcatraz. “We are making access control frictionless, secure and private. The experience can be as passive as possible – people can just walk in.” Multiple types of authentication, and the ability to detect tailgating and stream video SAFR from Real Networks also featured biometric face recognition, emphasizing feature sets, convenience, and price/performance. They offer multiple types of authentication, and the ability to detect tailgating and stream video. A new device is a small mullion mount that is “approaching the price of a card reader, factoring in the need to purchase cards,” said Brad Donaldson, Vice President and General Manager. SAFR focuses on convenience: You don’t have to take out your phone to pass through a door. Enrollment is easy by incorporating existing databases, and costs are lower than competitors, said Donaldson. The system analyses multiple points on the face, turns it into data and then encrypts it, providing a “unique signature for each person.” Credentials in Apple Wallet and Google Wallet AMAG Technology announced the compatibility of credentials with the Apple Wallet and Google Wallet. The company is also embracing a new strategic direction under President David Sullivan. They launched a new website in January, are developing dynamic resources and a partner page, and they now integrate with 120 tech partners. AMAG Technology Financial Services now enables their channel partners to offer leasing and financing options to customers. The big new booth at ISC West reflected an effort to “market different and look different,” according to the company. The big new booth at ISC West reflected an effort to “market different and look different" The new Symmetry Control Room, a command-and-control system, is a relaunch of an earlier AMAG product with enhanced features. Suitable for large enterprise customers, the software enables a big video wall to display all the various systems and incorporates all the data into a single “pane of glass.” Operators can “draw a lasso” around cameras they want to display on the video wall and can follow action across multiple camera feeds. Navigating megatrends A breakfast meeting for integrators, sponsored by Assa Abloy Opening Solutions, was built around the theme “Navigating Megatrends for Sustainable Growth." The megatrends are artificial intelligence, sustainability and cybersecurity. Related to cybersecurity, there are 350 common vulnerabilities and exposures (CVE) published per week, reflecting the continuing threat to cybersecurity. Physical security has a “data lake” of information from various physical security systems that can be an attractive target for cybersecurity breaches. Data sets can be exploited and/or poisoned. The security industry needs to apply “defense in depth” to the challenges of protecting data. “The threat landscape is always changing, and security technology is an iterative process,” said Antoinette King, i-PRO’s head of cyber convergence, one of the panelists. Natural language systems Natural language systems are a newer approach making an early appearance at ISC West Natural language systems are a newer approach making an early appearance at ISC West. Brivo, for example, has an early prototype of its “natural language search capabilities” that can answer questions such as “Who is in the office?” or “Where is Bob and what has he done?” Brivo also promoted its all-in-one door station device that combines a card reader and a camera (for facial authentication) and serves as a video intercom, thus eliminating the need for multiple devices at the door. Brivo is also emphasizing tailgate prevention, facial authentication, and people counting using AI at the edge. Also promoting natural language systems was Verkada, which unveiled a beta version of its AI Search feature that embraces national language capabilities. With AI Search, users will soon be able to use natural language to search for people or items. For example, a search could be “person climbing over a fence” or “person making phone call” or “person wearing football jersey.” Verkada wants to be thoughtful with the rollout and make sure effective guardrails are implemented to prevent abuse and bias. The release should happen in the coming months. Multi-family applications Allegion is promoting the XE360 hardware lock platform in various formats, including cylindrical lock, mortise lock, deadbolt, and exit trim. At the show, Allegion noted an enthusiasm for multi-family applications. “We have been surprised by the people who want to add electronics and to retrofit existing multi-family facilities to compete with newer facilities,” said Henry “Butch” Holland, Allegion’s Regional Director, Channel Sales East Region. Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec Allegion also offers an “indicator” display on its locks, showing at a glance whether a door is locked or unlocked. The “indicator” might also display “occupied” or “vacant.” Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec. Integrator M&A trends Everon looks for acquisitions in areas where they do not currently have support for national accounts A conversation with Everon at ISC West provided insights into the accelerating trend of mergers and acquisitions among the integrator community. Everon, formerly ADT Commercial, has done six acquisitions of local integrators since they changed their name last year. In targeting companies to acquire, they look for a good company with a good reputation, and they consider how the new company’s competencies complement their own. Some M&A strategy is geographic, as Everon looks for acquisitions in areas where they do not currently have support for national accounts. They also consider density, seeking to add new acquisitions in larger markets where they don’t currently have a big market share. “A lot of investment is coming into security because it is seen by investors as recession-proof,” said Michael Kennedy, VP, Mergers and Acquisitions, for Everon. Kennedy met with 95 businesses last year for possible acquisition, and the company only finalized a handful – reflecting that Everon is selective and careful that corporate cultures are aligned. “With an acquisition, the goal is to keep every customer and every employee,” said Kennedy. Voice of the customer ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. “We have every kind of problem come to the booth,” commented Heather Torrey, Honeywell’s General Manager, Commercial Security, Americas. “People are passionate, interested and very specific with their questions and comments,” she said. “We are driving a complete system, but we are flexible, helping our customers to meet their needs and not try to fit every foot into the same shoe. Sometimes meeting customer needs involves working with competitors," Torrey commented. “It truly comes back to listening to the customer, not just ‘this is what we have to offer,’” she adds. ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. Edge applications are everywhere at ISC West, and one company is promoting a new approach to expand functionality at the edge. Camera company i-PRO advocates the use of the “Docker” platform for app development, an option they offer on their cameras. Docker “containers” package deep-learning algorithms to make it easier to embed software into edge devices. Anyone can run Docker apps on i-PRO cameras that use the powerful Ambarella chip. A Docker “swarm” can combine multiple edge devices to work together and share resources. For example, the approach can increase computing power at the edge to increase the capabilities of instant analytics. It’s faster and provides better redundancies. A “distributed computing platform” ensures less latency than communicating analytics to a central server. Unification of capabilities Johnson Controls (JCI) also promotes the trend of combining multiple systems into a single pane of glass. Their “Open Blue” platform, with a security version unveiled at the show, integrates various security systems into one, combining data and monitoring device health. Basically, the system manages all resources holistically. JCI also notes a trend toward “unification of capabilities,” e.g., combining access control and video. “The scope of security is evolving from a focus on protection to a broader focus on operations,” commented Julie M. Brandt, JCI’s President, Building Solutions North America.
Security professionals are recognizing the intelligence value of leveraging publicly and commercially available information. This information can now be accessed more effectively from typically hard-to-reach regions. Also, the technological capabilities have matured in our age of artificial intelligence, machine learning, and data science. Intelligence has historically been based on classified data. However, today’s unclassified data, including open-source intelligence (OSINT), is increasingly being used to provide context and queuing for other types of intelligence. Advanced identity intelligence Babel Street is a technology company providing advanced identity intelligence and risk operations using an AI-enabled data-to-knowledge platform to unlock insights from a flood of data. The company provides advanced data analytics and intelligence for the world’s most trusted government and commercial organizations. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally The sheer volume of data is growing exponentially. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally. Not only are we seeing exponential growth in the volume of data, but there is also disparity in the veracity and the variety of data. This is being compounded by the ‘app economy’ in which data is created in a new format for every app added around the globe. Human language technology “The problem is that the data ‘junk’ and the ‘crown jewels’ are in the same bucket, and government and commercial entities need better and faster ways to extract intelligence from these torrents of data,” says Farid Moussa, VP, Strategy & Public Sector, Babel Street. Prior to joining Babel Street, Farid retired from the National Security Agency (NSA). He has guided video, image, speech, and text analytics (VISTA) and developed an appreciation for human language technology. An elusive source of data is the Dark Web, where every user, by design, is attempting to obfuscate their identity, and bad actors are hiding much better. “This presents a cat and mouse game – the cat must be smarter than the mouse, but the mouse is continually getting smarter,” says Moussa. Intelligence tools for data analysis SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence There are several intelligence tools for analyzing data. One of them is signals intelligence (SIGINT), which refers to electronic transmissions collected by ships, planes, ground sites, or satellites. Another is human intelligence (HUMINT), which is collected in a human-to-human fashion. Open-source intelligence (OSINT) is obtained by searching on topics or entities of interest that are publicly available on the Internet at large. Today, these various categories are often done in ‘silos of excellence.’ However, the best practice is using all forms together in a holistic fashion. SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence, while OSINT, which is growing in importance, is most cost-effective. All are vital forms of intelligence; OSINT is complementary and crucial to holistic intelligence practices. Holistic intelligence practices When it comes to physical security of people and places, OSINT has become a critical source of actionable information. Security directors leverage Publicly Available Information (PAI) to safeguard against threats to individuals, property, travel routes, and event sites. By monitoring PAI, security teams can detect and respond to potential dangers, including during and after events where thorough preparation is vital. Online information can contain warning signs of impending threats. It informs security professionals in uncovering digital traces, confirming intentions, and addressing risks across language barriers, ensuring proactive risk management for the protection of people and property. Role of Natural Language Processing (NLP) The Internet and social media were mostly English language by default, but that has changed exponentially Natural Language Processing (NLP) is a crucial capability that has evolved to recognize the richness and variety of words and names in multiple languages and scripts, and their use across cultures. Using machine learning and linguistics algorithms, the technology simultaneously considers numerous types of name variations. At one time, the Internet and social media were mostly English language by default, but that has changed exponentially. Babel Street’s world-class entity matching technology measures over 100 features to calculate the similarity of entities across multiple languages. Despite advances in data management and the cloud, there are still multiple challenges and complexities with integration of these data elements. Challenges include spelling variances/phonetics, language translation issues, criminal evasion, human error upon input, typos, etc. Accessing data from a scattered landscape While there have been advancements in cloud technologies, agencies utilizing open-source data are typically working within a highly scattered data landscape and must use a wide array of tools to get at the relevant pieces. This fragmentation makes it difficult to run analytics and apply AI and machine learning at scale in order to derive actionable insights. Unstructured and relationship data are visualised through advanced link analysis As with many disciplines, artificial intelligence (AI) is changing the game when it comes to intelligence. NLP and AI algorithms are employed to enhance datasets for greater quality, usability, and completeness. Unstructured and relationship data are visualized through advanced link analysis, geographic heat maps, influential entity carousels, topic clouds, and patterns by time and day. Geographic heat maps The advanced algorithms accurately score and prioritize critical entities within the relationship network while providing the citations from which an AI/ML-based decision was made. “With the democratization of AI, the world is becoming flat,” says Moussa. “Just like the most prosperous countries, even the poorest countries have the most advanced capabilities to do damage. Third-world economies often present a scenario where the financial gain of nefarious schemes and low-to-no regulation combine to incentivize bad actors.” The Challenges of Name Matching Identity has been an ongoing challenge for intelligence analysis due to the vast complexity of linguistics, spelling and cultural variances, human error, as well as human evasion. Technology and data science approaches are maturing, however machine translation can still struggle with meaning. The best-of-breed natural language processing capabilities run against the data while it still is in its native language. This minimizes the occurrence of analytic errors caused by inaccurate machine translations. This minimizes the occurrence of analytic errors caused by inaccurate machine translations It’s tempting to think that name matching is like doing a keyword search. The complexity of language makes it more challenging. New names are constantly created, with multiple spellings and no set of rules to encompass how names are formed. They are variable across languages, scripts, cultures, and ethnicities. Culturally specific nicknames and aliases add to the complexity. Replacing human involvement The investigation of the Boston Marathon Bombing in 2013 spotlighted an example of the significance of intelligence analysis. Even though the FBI had issued a detain alert for Tamerlan Tsarnaev back in 2011, Tsarnaev managed to travel to Russia in January 2012; and in July 2012, he returned to Boston. He was not detained on either occasion because there were too many names on the lists, and Tsarnaev’s last name had been spelled differently from the way it was on travel documents, thus enabling him to get through security. With the Internet, social media, and the dark web, there’s been an exponential increase in public communications in various languages, adding significantly to the amount of analysis required to keep societies safe. Name matching, using AI, analyses multiple contextual data points across languages to arrive at matches. Name matching, using AI, analyzes multiple contextual data points across languages to arrive at matches A common misconception is that this technology will replace human intelligence. “It’s more accurate to recognize its role as a force-multiplier, allowing humans to focus on the on the harder problems and/or vetting the results of AI,” says Moussa. “The technology can efficiently analyze massive volumes of data and distill it into actionable information in a timely manner. It augments human capabilities, enabling analysis at speed and scale beyond human capacity, without replacing human involvement.” Commercial Technology to the rescue “When it comes to threat and identity intelligence, we face a risk-confidence gap, underscored by the challenge of integrating traditional tactics with the modern digital landscape,” adds Moussa. “We cannot ‘hire’ our way out of this problem. Instead, it is imperative that we adopt technology to scale our efforts and free humans to solve the harder problems that machines cannot solve yet.” The public sector loves to build things, but there are time-to-value and return-on-investment considerations to the ‘build or buy’ decision. When commercial technology can be leveraged by government, it frees resources up to work on problems that the commercial world hasn’t yet figured out, says Moussa. “The public and private sectors need to come together – one team, one nation, working together with mutual trust and collaboration,” he says.
Fueled by mounting concerns about the cybersecurity vulnerability of U.S. ports, President Joe Biden has signed an Executive Order aimed at shoring up defenses against cyberattacks. Cybersecurity initiative The cybersecurity initiative marks a significant shift in policy, empowering key agencies and outlining concrete actions to bolster defenses. By empowering agencies, establishing clear standards, and fostering collaboration, the initiative aims to strengthen U.S. ports against the evolving threat of cyberattacks, safeguarding the nation's maritime economy and national security. Expanded authority for DHS The proactive approach aims to prevent incidents before they occur The Executive Order grants expanded authority to the Department of Homeland Security (DHS) and the Coast Guard to address maritime cyber threats. DHS gains the power to directly tackle these challenges, while the Coast Guard receives specific tools. The Coast Guard can compel vessels and waterfront facilities to address cyber vulnerabilities that endanger safety. The proactive approach aims to prevent incidents before they occur. Real-time information sharing Reporting any cyber threats or incidents targeting ports and harbors becomes mandatory. This real-time information sharing allows for swifter response and mitigation efforts. The Coast Guard also gains the authority to restrict the movement of vessels suspected of posing cyber threats. Inspections can be conducted on vessels and facilities deemed risky. Mandatory cybersecurity standards The standardization aims to eliminate weak links in the chain and prevent attackers from exploiting Beyond these broad powers, the Executive Order establishes foundational elements for improved cybersecurity. Mandatory cybersecurity standards will be implemented for U.S. ports' networks and systems, ensuring a baseline level of protection across the board. This standardization aims to eliminate weak links in the chain and prevent attackers from exploiting individual vulnerabilities. Importance of collaboration and transparency Furthermore, the initiative emphasizes the importance of collaboration and information sharing. Mandatory reporting of cyber incidents fosters transparency and allows government agencies and private sector partners to work together in mitigating threats. Additionally, the Executive Order encourages increased information sharing among all stakeholders, facilitating a unified response to potential attacks. Maritime Security Directive The Executive Order encourages investment in research and development for innovative cybersecurity solutions To address specific concerns, the Coast Guard will issue a Maritime Security Directive targeting operators of Chinese-manufactured ship-to-shore cranes. This directive outlines risk management strategies to address identified vulnerabilities in these critical pieces of port infrastructure. The long-term success of this initiative hinges on effective implementation. The Executive Order encourages investment in research and development for innovative cybersecurity solutions, recognizing the need for continuous improvement and adaptation to evolving threats. Recognizing the urgency of cyber threats The initiative has been met with widespread support from port authorities, industry stakeholders, and cybersecurity experts who recognize the urgency of addressing cyber threats. However, some concerns exist regarding the potential burden of complying with new regulations for smaller port operators. Effective communication, resource allocation, and collaboration among all stakeholders will be crucial to ensure the successful implementation of this comprehensive plan. Enhancing cybersecurity The more impactful and noteworthy piece is the associated NPRM from the U.S. Coast Guard (USCG) “This Executive Order is a positive move that will give the U.S. Coast Guard (USCG) additional authority to enhance cybersecurity within the marine transportation system and respond to cyber incidents,” comments Josh Kolleda, practice director, transport at NCC Group, a cybersecurity consulting firm. The more impactful and noteworthy piece is the associated Notice of Proposed Rulemaking (NPRM) from the U.S. Coast Guard (USCG) on “Cybersecurity in the Marine Transportation System,” adds Kolleda. Portions of the notice of proposed rulemaking (NPRM) look similar to the Transportation Security Administration (TSA) Security Directive for the rail industry and the Emergency Amendment for the aviation industry. Coordinating with TSA on lessons learned The USCG should be coordinating with TSA on lessons learned and incorporating them into additional guidance to stakeholders and processes to review plans and overall compliance, says Kolleda. “At first glance, the NPRM provides a great roadmap to increase cybersecurity posture across the various stakeholders, but it underestimates the cost to private companies in meeting the requirements, particularly in areas such as penetration testing,” says Kolleda. Cyber espionage and threats The focus is on PRC because nearly 80% of cranes operated at U.S. ports are manufactured there “It is unclear if or how the federal government will provide support for compliance efforts. As this seems to be an unfunded mandate, many private companies will opt for the bare minimum in compliance.” “Cyber espionage and threats have been reported by the Director of National Intelligence from multiple nation-states including China, Russia, and Iran,” adds Paul Kingsbury, principal security consultant & North America Maritime Lead at NCC Group. The focus here is on the People’s Republic of China (PRC) because nearly 80% of cranes operated at U.S. ports are manufactured there, he says. Destructive malware “The state-sponsored cyber actors’ goal is to disrupt critical functions by deploying destructive malware resulting in disruption to the U.S. supply chain,” says Kingsbury. “These threat actors do not only originate in China or other nation-states but also include advanced persistent threats (APTs) operated by criminal syndicates seeking financial gain from such disruptions." "The threat actors don’t care where the crane was manufactured but rather seek targets with limited protections and defenses. The minimum cyber security requirements outlined within the NPRM should be adopted by all crane operators and all cranes, regardless of where they are manufactured.” PRC-manufactured cranes Kingsbury adds, “The pioneering risk outlined in the briefing is that these cranes (PRC manufactured) are controlled, serviced, and programmed from remote locations in China." "While this is a valid concern and should be assessed, there are certainly instances where PRC-manufactured cranes do not have control systems manufactured in PRC. For example, there are situations in maritime transportation system facilities where older cranes have been retrofitted with control systems of European Union or Japanese origin.” Monitoring wireless threats “The Biden Administration’s recent Executive Order is a critical step forward in protecting U.S. ports from cyberattacks and securing America’s supply chains,” says Dr. Brett Walkenhorst, CTO at Bastille, a wireless threat intelligence technology company. “To ensure proper defense against malicious actors accessing port-side networks, attention must also be paid to common wireless vulnerabilities." "Attacks leveraging Wi-Fi, Bluetooth, and IoT protocols may be used to access authorized infrastructure including IT and OT systems. Monitoring such wireless threats is an important element in a comprehensive approach to upgrading the defenses of our nation’s critical infrastructure.”
Case studies
In a groundbreaking initiative to bolster security measures, Indian Railways has successfully implemented Herta's state-of-the-art facial recognition solutions across its extensive network of train stations in the Eastern region. This transformative project marks a significant step towards ensuring the safety and well-being of passengers and staff throughout the railway system. The project becomes the largest one in the world in the transport sector. Herta has also been awarded two more regions that will be implemented after the Eastern one. Facial recognition technology The deployment of Herta's cutting-edge facial recognition technology is part of IndianRailways' commitment to embracing advanced solutions for enhancing security. By leveraging Herta's expertise, the railway network aims to create a safer environment for passengers, mitigate potential security threats, and streamline operational efficiency. Key features Key features of Herta's facial recognition solutions implemented at 230 train stations using thousands of video surveillance cameras include: Real-time Identification: Herta's technology provides real-time facial identification capabilities, allowing for swift and accurate recognition of individuals within the train station premises. Enhanced Security: The implementation of facial recognition enhances security by automatically identifying and alerting authorities about the presence of individuals with potential security concerns, contributing to the overall safety of passengers and staff. Efficient Monitoring: Herta's system enables efficient monitoring of the train stations, offering a proactive approach to security management. The technology assists in the quick response to incidents and ensures a rapid resolution of security issues. User-Friendly Interface: The intuitive user interface of Herta's solutions facilitates easy integration with existing security systems, providing a seamless experience for railway personnel responsible for monitoring and managing security. Stringent security requirements Mr. Rahat Jain, IDIS INDIA - MD, expressed his enthusiasm about the successful implementation, stating, "We are delighted to announce the successful integration of Herta's facial recognition solutions at Indian Railways." Startologic, the official partner overseeing the deployment of Herta's facial recognition solutions at Indian Railways, is proud to be part of this transformative project. The successful implementation showcases the capability of Herta's technology to meet the stringent security requirements of one of the world's largest railway networks.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation announced that its proactive gun detection and intelligent situational awareness solution will be deployed by Michigan’s Olivet Community Schools to protect students and faculty against gun-related violence. The school was approved for the State’s dedicated grant funding, enabling Olivet to implement ZeroEyes. Olivet Community School Olivet Community School comprises an elementary school, as well as a middle and high school that is located at the same complex. According to The Gun Violence Research Center, 55% of the incidents analyzed in Michigan educational systems were spontaneous attacks and 42% involved former students. To combat the rising threat of violence, the district has been bolstering its safety and security efforts by installing an access control system and brand-new digital cameras, along with the deployment of ZeroEyes. Multi-layered security framework "We've always maintained a multi-layered security framework, from our security camera and access control system to CRG maps for first responders, and adding ZeroEyes significantly strengthens our preparedness," said John Mertz, Superintendent of Olivet Community Schools. "While this technology greatly enhances our security, we hope we never have to use it in a real-world situation." AI gun detection and intelligent situational awareness If a gun is identified, images are instantly shared with the ZOC staffed 24/7/365 by specially trained U.S. veterans ZeroEyes’ AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence including visual description, gun type, and last known location to local law enforcement and the district's school resource officers as quickly as 3 to 5 seconds from detection. Proactive safety measures "We applaud Olivet Community Schools for their proactive approach to safety," said Mike Lahiff, CEO and co-founder of ZeroEyes. "Our AI gun detection technology is a vital layer in fortifying the security of both students and staff."
The airport, named after a notable historical figure, serves as a key transportation hub for both domestic and seasonal international flights in its region. Serving over 11 lakh passengers a year, it ranks as one of the busiest airports in terms of passenger and aircraft movements. The terminal building at this airport is spread over 26,936 square meters and has 14 check-in counters, four immigration counters for departures, and six immigration counters for arrivals. Located near major transportation arteries, it offers convenient access to travelers from various directions. Business scenario They required a robust video surveillance solution that could ensure 24x7 recording capabilities With a growing number of passengers and flights at the airport, a new terminal was recently constructed at this airport. To facilitate the security of passengers and staff at this terminal building, they required a robust video surveillance solution that could ensure 24x7 recording capabilities. Without adequate surveillance coverage, this airport was vulnerable to security threats such as perimeter breaches, theft, vandalism, and terrorist activities. Challenges Ensuring passenger and staff safety: Being one of the busiest airports in the state, the absence of a video surveillance system was risking the safety of passengers and staff from potential threats like theft of personal belongings or other such criminal activities. Continuous monitoring with redundancy: The airport wanted continuous 24x7 monitoring with a dual setup ensuring that surveillance operations continued uninterrupted even in the event of equipment failure or maintenance downtime. Ensuring cargo safety: The airport faced challenges in ensuring the safety and security of cargo pioneering to risks such as theft, tampering, and damage during handling and transportation processes. Regulatory non-compliance risk: Without adequate surveillance systems, the airport was facing the risk of non-compliance with security regulations, which could lead to penalties and legal liabilities. Solution The entire airport terminal was covered with Matrix Project Series Bullet, Dome, and PTZ Cameras to provide extensive coverage. Matrix Project Series Bullet IP Cameras were deployed in/at: Outdoor public spaces such as drop-off zones and walkways: To monitor crowd movements and enhance overall security. Cargo handling areas: To monitor the loading and unloading of cargo and ensure compliance with security protocols. Matrix Project Series Dome IP Cameras were deployed in/at: Main entrances and exits: To monitor the flow of passengers and detect any suspicious behavior. Check-in counters: To oversee passenger interactions and baggage handling. Baggage claim areas: To monitor baggage claim areas and prevent theft or tampering of luggage. Retail areas: Placed in retail shops and duty-free zones to deter shoplifting and ensure security for both customers and staff. Matrix PTZ Cameras were deployed at: Elevated structures overlooking runways and aprons: To provide a panoramic view enabling operators to zoom in on specific aircraft or incidents. These cameras also aided in monitoring critical infrastructure such as control towers, fueling stations, and power substations, providing close-up views for detailed inspection and surveillance. Monitoring and managing video surveillance SATATYA SAMAS - Video Management Software was deployed at two sites within the terminal Matrix SATATYA SAMAS - Video Management Software was deployed at two locations within the terminal. The first location served as a primary control center for monitoring and managing video surveillance feeds, and coordinating security responses. The second location served as a secondary control center. This could be used in case of failures or emergencies at the primary control center, ensuring the continuity of surveillance operations. Also, different users at two different locations could manage and monitor the camera streams, if needed. Products Offered SATATYA SAMAS PLT (1 No.): Enterprise Video Management Software Matrix License Dongle 200 (1 No.): USB Dongle to Run Matrix SATATYA SAMAS SATATYA SAMAS CAM20 (3 Nos.): License for Adding 20 Additional Cameras SATATYA SAMAS CAM5 (2 Nos.): License for Adding five Additional Cameras SATATYA SAMAS USER10 (1 No.): Three Concurrent User Licenses for Smart Client and Mobile Client SATATYA CIDR20MVL12CWP (52 Nos.): 2MP IR Dome Motorized Varifocal 2.8-12 mm with Audio SATATYA CIBR20MVL12CWP (14 Nos.): 2MP IR Bullet Motorized Varifocal 2.8-12 mm with Audio SATATYA PZCR20ML33CWP (9 Nos.): 2MP PTZ Camera 33x Zoom with Audio Benefits The superior image quality enabled security personnel to identify potential threats quickly Matrix IP Cameras provided full coverage at the new terminal building. The superior image quality enabled security personnel to identify potential threats quickly. The motorized varifocal lens in Matrix IP Cameras enabled zooming in for specific details when required. Matrix PTZ IP Cameras provided 360° surveillance and up to 33x zoom, providing perimeter security at the airport. Matrix IP Cameras are cyber-secure, complying with the OWASP ASVS 4.0 L2 norms, certified by STQC, Delhi. This helps in safeguarding sensitive surveillance footage, maintaining network integrity, and complying with stringent cybersecurity regulations. Matrix IP cameras are also NDAA compliant, which helped in meeting the regulatory standard requirements at the Airport. The dual setup of Matrix Video Management Software helped in providing redundancy to the surveillance system, ensuring continuous monitoring and recording even in the event of equipment failures, network disruptions, or other unforeseen circumstances. It also allowed for distributed monitoring and management capabilities, enhancing overall surveillance effectiveness. Features like Day Highlights and Time-lapse in Matrix Video Management Software aided airport security teams in leveraging intelligent search functionalities to conduct thorough investigations quickly.
Every year, the Veronafiere Exhibition Center and its conference center host an average of 35 exhibitions and 50 conventions. Among the successful and best-known events, Vinitaly, Marmomac, Fieracavalli, Fieragricola, Samoter, Progetto Fuoco, and MotorBike Expo stand out. These events attract up to 800,000 trade fair visitors and exhibitors every year. To ensure security for the outdoor areas of the brand new “Gallerie Mercatali” in Verona, Veronafiere again decided to install a Dallmeier video security system with Panomera® cameras. Trade fairs and events Veronafiere S.p.A. is an international group that has been organizing trade fairs and events “connecting people, nations, and different businesses” since 1898. The trade fair site of Veronafiere with its various exhibition halls stands in the centre of the Italian city of Verona. Dallmeier video security system The high-tech solution also allows for objective management of any complaints Precisely to ensure greater safety for its guests, since 2016 Veronafiere implemented a Dallmeier video security system with a total of 15 Panomera® cameras. The initiative protects as much as possible both exhibitors, starting from the stand set-up phase, and visitors and operators, during the events. This high-tech solution also allows for objective management of any complaints, in a rapid, reassuring, and unequivocal way. “Recognition” with a minimum number of cameras In 2021 the Dallmeier Panomera® video coverage was also extended to the spaces of the “Gallerie Mercatali” of Verona, transformed by Veronafiere into additional exhibition and meeting spaces serving business and the city, after a long conservative restoration intervention of the two archeological industrial structures. “The purpose of the video system is to minimize the hazards from vandalism, theft, and unauthorized entry, even when no trade fairs or events are taking place. At the same time, Veronafiere wanted to watch over the adjacent parking area,” says Simone Sterza, System Engineer of Italsicurezza, installer and system integrator who collaborates with Dallmeier. Price-performance ratio “It was just as important to the customer to have the best possible price-performance ratio: Veronafiere wanted to have 'Recognition' image quality according to DIN 62676‐4 over the entire area to be monitored, with the smallest number of cameras possible and low total operating costs.” Furthermore, the system should also offer high availability and have comprehensive data protection and data security functions. Any number of “virtual PTZs” and just one Allen key To find a video solution that satisfies the requirements profile, Veronafiere instituted a call for tenders To find a video solution that satisfies the requirements profile, Veronafiere instituted a call for tenders, which was won by the Italian general contractor Cubi S.r.l. One of the main reasons the contract was awarded to Cubi was that as a customer of Italsicurezza, it was able to offer the patented “Panomera®” multifocal sensor cameras. High-resolution images The remarkable feature of the Panomera® cameras is that they can capture long distances and large expanses in high resolution. To do this, they combine up to seven detail sensors having various focal lengths with an overview sensor in one optical unit. The result is a homogeneous, high-resolution total image covering the entire area that is to be captured. 4K cameras The benefit in this case is equivalent to combining multiple 4K cameras with any number of “virtual” PTZ systems but with significantly lower total operating costs. The reason for this is that, apart from fewer cameras, users also need considerably less infrastructure, such as cables, masts, networks, and monitors, to be able to see everything that is happening. Mountera® mounting “Besides their well-known image quality, the thing I found particularly surprising about the new Dallmeier Panomera® cameras was how quickly and easily we were able to mount them,” declares Simone Sterza, System Engineer with Italsicurezza. “Just a single Allen key size was needed for all of the main installation and adjustment work. Thanks to the Mountera® mounting system we were able to mount the cameras safely using just one technician, without needing any assistance from a second person.” Helpful extra services It was also a simple matter to integrate the new cameras and the IPS 10000 Recording Server The Dallmeier cameras capture the outdoor area of the Gallerie Mercatali in the resolution specified in the call for tenders. Italsicurezza was able to define this precisely for the entire area of 10,625 m2 using Dallmeier planning software. It was also a simple matter to integrate the new cameras and the IPS 10000 Recording Server into the existing Dallmeier system. Panomera® S8, S4, and single-sensor cameras Accordingly, Veronafiere only needs two Panomera® S8, three Panomera® S4, and two single-sensor cameras to secure the whole outdoor area of the Gallerie Mercatali and keep a reliable watch over everything that is happening over the entire area. To take advantage of the expanded video system from the very beginning, the security personnel at Veronafiere received thorough training from the team of Dallmeier Italy. Privacy & Security by Design These days, the Veronafiere control center houses just three workstations, with which the authorized security personnel can observe the entire outdoor area of the trade fair site live and access camera recordings. RAID-6 storage ensures high availability of the recordings. To satisfy Italian data protection regulations, the system deletes the recordings of the camera images automatically after seven days. VCA or AI-based video analysis Searches for specific incidents could also be carried out even more rapidly Moreover, the modular nature of the system allows “upgrades on demand”: this means that Veronafiere could also implement Video Content Analyse (VCA) or AI-based video analysis applications to enable automatic reporting of unauthorized access to “sterile areas” (i.e., areas in which people and objects are not permitted to remain). Searches for specific incidents could also be carried out even more rapidly. Video system for safe events “The Dallmeier system”, ends Simone Sterza, “helps to ensure that exhibitors and visitors have an untroubled, enjoyable trade fair experience.”
The University of California San Diego (UCSD) Police Department is a full-fledged law enforcement agency responsible for patrolling, investigating, and preventing crime within its jurisdiction. Spanning over 1,200 acres and comprising 900 buildings, UCSD’s campus presents unique challenges for law enforcement. The department’s Communications Division serves as the nerve center, coordinating responses to emergencies, managing communications, and ensuring coordination among officers. Garrett Williams, a seasoned Sergeant at the University of California San Diego (UCSD) Police Department, oversees the Communications Division. With over two decades of experience, Williams understands the critical role technology can play in public safety. The challenge Before partnering with RGB Spectrum, UCSD faced significant obstacles in its dispatch operations Before partnering with RGB Spectrum, UCSD faced significant obstacles in its dispatch operations. Dispatchers juggled multiple computers, including a CAD, radio, and phone computer, each requiring separate keyboards and mice. “I didn’t look to RGB to solve all my problems. However, I understood all that could be accomplished once the team showed us how the technology operated and what was possible,” Garrett Williams, Sergeant, University of California San Diego Police Department. “Three separate mice and operators constantly moving side to side to look from one to the other and then having to move their hands back and forth between control devices - anytime they have to do that, it’s slowing their workflow down; we figured there had to be a better solution,” shared Williams. “And up to 25% of our operators were suffering from repetitive movement and neck Injuries, resulting in downtime and light duty restrictions.” Why UCSD chose XtendPoint KVM-over-IP UCSD wanted a seamless KVM solution that integrated multiple systems over IP under a unified interface. It explored various options before discovering RGB Spectrum’s XtendPoint™ solution, which provides local and remote access to source computers, consolidates separate monitors into multi-view displays, and unifies control for more streamlined operation and enhanced efficiency. With RGB’s XtendPoint KVM system, UCSD grew access to the fire alarm system at each operator’s station UCSD’s key selling point was its ergonomic benefits. It offered a solution to the ergonomic challenges plaguing dispatchers by minimizing the need for multiple keyboards and mice. So did replacing monitor clutter. With the XtendPoint solution, single-signal monitors are consolidated on each console using multiview displays that can handle up to four computer signals each or up to eight signals displayed on just two pieces of glass. A notable feature of this solution is the ability to offer each operator customized display viewing, even in a multi-shift operation. A KVM-over-IP backbone offers additional benefits. Before, only one dispatcher station could see the fire alarm system. With RGB’s XtendPoint KVM system, UCSD expanded access to the fire alarm system at each operator’s station. Now, no matter where dispatchers are seated, they have access to all needed systems. How UCSD uses RGB’s solution The RGB Spectrum solution marked a significant turning point for UCSD’s dispatch operations. Dispatchers experienced a dramatic improvement in efficiency, ergonomics, and situational awareness. Gone are the days of dispatchers juggling multiple control devices. With a unified interface, dispatchers can control all systems from a single keyboard and mouse. A streamlined workflow accelerated response times and reduced errors. Video integration proved invaluable. Dispatchers can now access live video feeds and additional mission-critical systems directly within one system interface, providing them with real-time visual information as required. With a unified interface, dispatchers can control all systems from a single keyboard and mouse Additionally, support for video integration with a video wall provided opportunities for enhanced collaboration and situational awareness. Commented Williams, “The flexibility of the RGB system also allowed UCSD dispatchers to leverage video wall capabilities. They can easily share critical information and task lists with colleagues. A more collaborative environment has facilitated communication and coordination among dispatchers, ensuring that tasks are efficiently managed and prioritized during high-stress situations. We can use the RGB system to throw things up on the wall so other dispatchers can see what’s happening and interact as needed.” “In addition," said Williams, “the resilience of the RGB XtendPoint system is invaluable in maintaining operational continuity. For example, in the event of a problem at a station, technicians can work on the issue while the dispatcher moves to a backup computer or station, allowing dispatchers to continue critical work without interruption. This proactive approach to system maintainability and resilience saves time and resources and ensures that dispatch operations remain fully functional at all times.” The result The impact of XtendPoint KVM-over-IP on UCSD’s dispatch operations has been profound. UCSD witnessed significant improvements in efficiency, ergonomics, and situational awareness. Efficiency soared as dispatchers seamlessly controlled multiple systems from a single interface. Ergonomic issues were mitigated, and dispatcher morale improved, enabling dispatchers to respond more effectively to emergencies. Future plans with RGB Spectrum Williams is enthusiastic about the wraparound monitors RGB has announced Looking ahead, UCSD sees opportunities to leverage RGB Spectrum’s technology further to enhance operations. RGB system’s versatility also enables UCSD to adapt to evolving threats and emergencies. In the event of, say, a building evacuation or siege, for example, UCSD could almost immediately establish a satellite facility. Williams is enthusiastic about the wraparound monitors RGB has announced. “We are looking at RGB’s new, yet to come to market, 43-inch curved monitors that will be the finishing touch for even better ergonomics and a customized workspace.” Another potential interest is a “flyaway” kit, a transportable command-and-control system with integral radio access. This mobile system would enable UCSD to monitor special events, such as festivals, where real-time situational awareness is crucial for ensuring the safety of attendees and staff. Williams notes, “We can have a mobile command post set up near a festival or special event, take one of our dispatch systems and put it there without having to move a lot of equipment or figuring out how to get it on the network.” Implementing RGB Spectrum’s solutions UCSD also aims to extend the reach of its dispatch operations by providing in-the-field personnel with access to real-time information. By equipping mobile units with RGB’s AV-over-IP systems via smartphones, police officers could receive critical updates and better collaborate with dispatchers to respond to incidents. “If you think of the unthinkable, like a school shooting, it would be ideal to share live coverage of what’s happening, detailed building schematics, and info on weapons the assailant might be using. Who doesn’t want to know what’s potentially happening behind closed doors before walking in? It’s situational awareness on a whole new level,” commented Williams. The partnership between the UCSD Police Department and RGB Spectrum has proven successful. By implementing RGB Spectrum’s solutions, UCSD transformed its dispatch operations to achieve unprecedented levels of efficiency, ergonomics, and situational awareness. And it is just a start.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation, announced that its solution has been selected by Iowa’s Murray Community School District to identify illegally brandished guns on campus and help protect students and faculty against gun-related violence. Murray Community School District serves 300 students in Murray, Iowa in grades pre-K-12. The district provides an educational environment that challenges the status quo and makes it its mission to clear away any roadblocks that constrain creativity and innovation. New layer of security “While we are a small, rural community, if there is anything we have learned it’s that gun-related violence can happen anywhere,” said Tim Kuehl, superintendent of Murray Community School District. “We are prioritizing the safety and security of our students and faculty, and ZeroEyes ensures that our campus is protected from gun-related threats 24/7. We are proud to add this new layer of security to make our community safer.” Existing digital security cameras ZeroEyes' AI gun detection and clever situational grasp software layers onto security cameras ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to local law enforcement and school staff as quickly as three to five seconds from detection. AI gun detection solution “Gun-related violence in school communities is far too common,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “Murray Community School District is addressing this problem head-on by adopting our AI gun detection solution. We are grateful to have the opportunity to proactively combat this issue and alert local authorities of a potential threat before it happens.”
Products
Round table discussion
When it comes to protecting the environment, the security industry has historically been perched on the sidelines. For instance, the amount of electricity that physical security systems use is minimal when compared to the total energy usage in a typical building. However, as awareness of environmental issues has surged, and as some of the "low-hanging fruit" has been harvested, attention has come back to opportunities for additional, if small, savings. The lifecycles of security products are also being more closely examined, including the environmental impact of using plastics and other chemicals. We asked this week's Expert Panel Roundtable: How can the security industry contribute to protecting the environment?
The economic fallout of the COVID-19 epidemic was felt in supply chain disruptions, higher prices, and shortages of certain goods. The physical security industry was not spared, although the epidemic also presented opportunities for security companies. Changing access control trends triggered by the pandemic are still reverberating throughout the industry, for example. Four years later, the impact of the pandemic is still being felt in the security market, lingering like the symptoms of "long COVID." We asked this week's Expert Panel Roundtable: Four years after the start of the COVID-19 pandemic, what is its lingering impact on the physical security industry?
When it comes to preventing theft and ensuring overall safety, technology offers a robust toolkit for retail stores to enhance security in several ways. From intelligent surveillance systems to RFID tags used to avoid shoplifting, today’s retail and loss prevention strategies are more effective than ever. Beyond security, the newer technologies can also provide benefits related to merchandising, inventory control, customer service, and the list goes on. The combination of abundant data and artificial intelligence (AI) is a powerful one-two punch that is on the verge of reshaping the retail industry. We asked this week's Expert Panel Roundtable: How are new technologies transforming the retail and loss prevention markets?
White papers
5 Surprising Findings From OT Vulnerability Assessments
DownloadMulti-Residential Access Management And Security
DownloadGuide For HAAS: New Choice Of SMB Security System
DownloadPrecision And Intelligence: LiDAR's Role In Modern Security Ecosystems
DownloadAre You Ready For An On-Site Emergency?
DownloadIntegrating IT & Physical Security Teams
DownloadUnderstanding All-In-One Solutions
DownloadTop 7 Trends To Watch In The Physical Security Industry
DownloadHow Video Technology Is Transforming Loss Prevention, Operations, And Customer Experience In The Retail Sector
DownloadTroubleshooting IP Video Systems
Download2024 Trends In Video Surveillance
DownloadHow Intelligent Video Is Transforming Banking And Financial Institutions
DownloadSecuring Data Centers: Varied Technologies And Exacting Demands
DownloadHow To Create A Successful Physical Security Roadmap
DownloadThe Real Cost Of An Outdated Video Security System
Download