ISJ International Security Journal https://internationalsecurityjournal.com Information and news for the security sector Tue, 22 Sep 2020 10:05:00 +0000 en-GB hourly 1 https://internationalsecurityjournal.com/wp-content/uploads/2019/02/cropped-isjfav-32x32.png ISJ International Security Journal https://internationalsecurityjournal.com 32 32 SecureBI and the American Crime Prevention Institute establish new partnership https://internationalsecurityjournal.com/securebi-and-the-american-crime-prevention-institute-establish-new-partnership/?utm_source=rss&utm_medium=rss&utm_campaign=securebi-and-the-american-crime-prevention-institute-establish-new-partnership Tue, 22 Sep 2020 09:45:25 +0000 https://internationalsecurityjournal.com/?p=22208 SecureBI, a strategic advisory firm delivering business intelligence to the security industry and the American Crime Prevention Institute (ACPI) have established a partnership to bring online crime prevention training and certification courses to law enforcement agencies and security professionals across the country. ACPI has pioneered the development and delivery of in-person crime prevention training and...

The post SecureBI and the American Crime Prevention Institute establish new partnership appeared first on ISJ International Security Journal.

]]>
SecureBI, a strategic advisory firm delivering business intelligence to the security industry and the American Crime Prevention Institute (ACPI) have established a partnership to bring online crime prevention training and certification courses to law enforcement agencies and security professionals across the country.

ACPI has pioneered the development and delivery of in-person crime prevention training and certification programs for law enforcement since 1998. With the new online educational offerings, ACPI can provide efficient delivery of content for professional development and certification remotely using video and online communication tools. ACPI certifications are well-respected throughout the public safety arena, demonstrating a commitment to crime prevention and expertise in proactive security strategies.

“The future of professional development and certification will be driven by the evolution of online technologies and collaboration tools,” said Dan Keller, Executive Director, ACPI. “As an organisation dedicated to making learning accessible to everyone, we looked for ways to modernise our course delivery. Partnering with SecureBI allows us to meet demand for our rich library of offerings for law enforcement agencies and to expand our reach to security industry professionals.”

Initial online courses will be offered live and cover a variety of topics, including:

As additional courses are added to the online collection, a certification track will be developed specifically for security professionals in addition to existing law enforcement certifications.

“ACPI and SecureBI both share a dedication to helping leaders achieve their goals through continuing education. As the world transitions to a more remote, online workforce, it is up to us to ensure e-learning opportunities are readily available and easily accessible,” said Brandon Reich, CEO, SecureBI. “This partnership is about a joint vision of simplifying access to certification opportunities and education that enables law enforcement and security industry professionals to validate their expertise and proficiency in creating safe and secure environments.”

Register and learn more at: http://acpionline.com/courses.

The post SecureBI and the American Crime Prevention Institute establish new partnership appeared first on ISJ International Security Journal.

]]>
Hikvision announces integration with Nedap AEOS https://internationalsecurityjournal.com/hikvision-announces-integration-of-hikcentral-and-nedap-aeos-access-control-solution/?utm_source=rss&utm_medium=rss&utm_campaign=hikvision-announces-integration-of-hikcentral-and-nedap-aeos-access-control-solution Tue, 22 Sep 2020 09:23:39 +0000 https://internationalsecurityjournal.com/?p=22202 Hikvision, an IoT solution provider with video as its core competency, has announced the integration of its HikCentral video security platform with the Nedap AEOS Access Control Solution to provide single-platform operations for users who maintain both Hikvision and Nedap systems. The integration, via Nedap AEOS Connector, provides event information, alarms and person-data synchronisation of...

The post Hikvision announces integration with Nedap AEOS appeared first on ISJ International Security Journal.

]]>
Hikvision, an IoT solution provider with video as its core competency, has announced the integration of its HikCentral video security platform with the Nedap AEOS Access Control Solution to provide single-platform operations for users who maintain both Hikvision and Nedap systems.

The integration, via Nedap AEOS Connector, provides event information, alarms and person-data synchronisation of access control and intrusion events between AEOS-connected hardware and HikCentral. This integration enables operators to manage doors, detectors and intrusion areas, as well as visually verify and handle alarms in HikCentral Clients.

“With the integration, security personnel are able to greatly enhance their situational awareness and control in large installations,” said Jens Berthelsen, Global Partner Alliance Manager of Hikvision. “The integration leverages the Hikvision Optimus framework to ensure a long lifespan for the installation. It also makes future upgrades of both systems seamless and simple – without compromising the continuous operation.”

“I feel very proud having Hikvision onboard our Technology Partner Program. Hikvision skipped half-measures and created a very complete integration for both Access Control and the Intrusion part,” said Wesley Keegstra, Integration Manager at Nedap. “Linking events and alarms to HikCentral creates a single-platform solution to visualise the status of a security system with the corresponding video recordings. Besides visualising a system, users can also control it. Whether they open a door or lock one, or remotely arm or disarm an intrusion area.”

The Nedap AEOS Connector is developed under Hikvision’s latest Optimus framework, which enables systems integrators to easily tailor integrations to individual customers’ needs, building suitable workflows and event-to-action protocols. This is based on a very intuitive and easy-to-use graphical user interface that does not require coding.

The Optimus and Nedap AEOS Connector are available for HikCentral version 1.6 and AEOS version 2019.1.5 and are ready for deployment now.

www.hikvision.com

The post Hikvision announces integration with Nedap AEOS appeared first on ISJ International Security Journal.

]]>
Exclusive: Connecting the dots https://internationalsecurityjournal.com/exclusive-connecting-the-dots/?utm_source=rss&utm_medium=rss&utm_campaign=exclusive-connecting-the-dots Tue, 22 Sep 2020 09:10:11 +0000 https://internationalsecurityjournal.com/?p=22198 LEGIC’s Christine Mayr, John Harvey and Carl Fenger reveal the benefits of the company’s state-of-the-art smartphone security platform. Creating secure virtual services or apps that require rapid deployment on smartphones or other mobile devices is becoming increasingly common for consumer and professional applications. LEGIC Connect is a cloud platform service which enables you to carry...

The post Exclusive: Connecting the dots appeared first on ISJ International Security Journal.

]]>
LEGIC’s Christine Mayr, John Harvey and Carl Fenger reveal the benefits of the company’s state-of-the-art smartphone security platform.

Creating secure virtual services or apps that require rapid deployment on smartphones or other mobile devices is becoming increasingly common for consumer and professional applications. LEGIC Connect is a cloud platform service which enables you to carry out this task quickly and securely over publicly available internet or cellular services.

The rise of smartphone-based services

Services that enable users to interact with and control infrastructures such as shared offices and vehicles, hotel rooms, campuses and city services are on the rise. Personalised interaction with infrastructure based on a smartphone-based mobile app is becoming the preferred choice for users to interact with the world around them for both professional and leisure activities.

Today, such services are growing in consumer markets as well as industrial IoT sectors where they enable access to and personalised interaction with private and vacation dwellings, shared and rental vehicles, electric car charging stations, industrial machines, robots and personal IoT devices.

As most users today possess a smartphone, many new mobile app-based solutions are being introduced to serve all these application areas.

A shared challenge

A common challenge that applies to all these use cases be it for private or professional use is how to securely onboard new users as well as instantly enable or disable access and modify usage rights – an example being a virtual smartphone-based hotel room key which has very precise times when it should open specific doors, when it shouldn’t and by whom.

The LEGIC Security Platform solves this issue by providing secure and flexible technology consisting of a central cloud-based Trusted Service and plug-in mobile SDK that communicates with LEGIC hardware Security Modules embedded in edge devices (a hotel room door, for example). This enables service providers to focus on managing their infrastructure and offerings and on optimising the user experience – the secure communication of configuration data between the service provider’s management backend, mobile apps and service infrastructure is taken care of by the LEGIC Security Platform.

Introducing LEGIC Connect

LEGIC Connect is the smartphone part of the LEGIC Security Platform. It is used to manage mobile credentials which determines what each user pre­fers, or is allowed to do and when. It is a mature technology with thousands of credentials being deployed at any given moment around the globe based on secure end-to-end AES data encryption, an encryption technique so powerful it has been adopted by the US government for protection of classified information.

Thanks to LEGIC’s service-agnostic platform, smartphones can be securely provisioned over-the-air for a wide variety of applications such as unlocking doors, purchasing train tickets, starting cars or streamlining manufacturing or logis­tics processes.

LEGIC Connect also enables operators to configure cryptographic keys or custom parameters on edge devices, update and maintain infrastructure or securely receive status reports or maintenance data back from infrastructure to the service backend. This capability is useful for status and security alerts, for enabling preventive maintenance and can be done at any time all over the globe via any Android or iOS smartphone.

LEGIC Connect not only leverages existing user smartphones but allows for a highly customisable user experience tailored to service and security needs. It also supports security mechanisms such as optional PIN code or biometric verification including facial or fingerprint recognition, features which are readily available on today’s smartphones.

To support contactless communication between smartphone and infrastructure, Bluetooth Low Energy (for up to 10+ metres) or NFC wireless communications (typically up to 20 cm) are leveraged – both are common features on modern smartphones and are supported by LEGIC Connect.

Focus on your service, not how it is deployed

The beauty of LEGIC Connect is that it enables service providers to focus on their mobile service offerings and not on its deployment or security. LEGIC Connect ensures secure distribution and management of cryptographic and authentication data. It secures the communication channel between backend and infrastructure which can be over the publicly available internet or cellular service. When a smartphone and LEGIC technologies are combined, the possi­bilities for secure mobile services are endless.

How LEGIC Connect works

LEGIC
Figure 1: LEGIC Connect end-to-end mobile security platform

Figure 1 illustrates the operation of a smartphone-based authentication and credential management sys­tem which uses LEGIC Connect.

A service provider’s application management system uses LEGIC Trusted Service to send credentials to a mobile app via an encrypted channel. These credentials are provisioned to users to indicate what he or she pre­fers, or is allowed to do and when. A classic example used in infra­structure management is determin­ing which doors may be opened in an office building by whom and at what times.

Credentials which are relevant for a specific user and edge device, for example a car door or vending machine, are then transmitted to the edge device using the smartphone’s built-in Bluetooth or NFC capabilities. In order to facilitate the seamless design of the application and authentication sys­tem, API and Mobile SDK for mobile devices, as well as Security Modules with embedded Secure Element for the edge device are all provided by LEGIC.

Thanks to LEGIC Connect, smartphones can be securely provisioned over-the-air with multiple powerful functionalities within existing telecommunications infrastructure.

Key features

Android- and iOS-based Smartphone apps which leverage secure user authentication and credential management can be quickly developed and deployed based on an easy-to-use mobile SDK provided by LEGIC.

Smooth, fast, secure radio connectivity over short (up to 20 cm) or long (up to 10+ metres) distances can be established based on Bluetooth or NFC.

Secure, contactless file transfer of system configuration as well as application data can be sent via the LEGIC Trusted Service.

Low power consumption of the SM-6000 Security Module series makes them ideal for battery powered edge devices.

Online and offline operation are supported – secure authorisation and credential management continues even when network connectivity is unavailable, for example when opening a car door via smartphone app in an underground park house.

End-devices based on the LEGIC Security Platform meet the official Common Criteria level EAL5+.

Encrypted, bi-directional messaging between edge devices and management system backend is ideal for pre-emptive maintenance or alert notifications.

Smartcard option: applications are also supported by all globally relevant smartcard standards such as LEGIC, NXP MIFARE, and HID iCLASS.

One-stop shop – all software, components and tools as well as training and support are provided by LEGIC, an industry leader in embedded, contactless security solutions.

www.legic.com

This article was published in the September 2020 edition of International Security Journal. Pick up your FREE digital copy on the link here

The post Exclusive: Connecting the dots appeared first on ISJ International Security Journal.

]]>
GSX+ 2020, the world’s premier virtual security experience, breaks new ground https://internationalsecurityjournal.com/gsx-2020-the-worlds-premier-virtual-security-experience-breaks-new-ground/?utm_source=rss&utm_medium=rss&utm_campaign=gsx-2020-the-worlds-premier-virtual-security-experience-breaks-new-ground Tue, 22 Sep 2020 08:34:02 +0000 https://internationalsecurityjournal.com/?p=22195 ASIS International, the world’s largest association for security management professionals, has opened its annual conference on an entirely new virtual platform to provide maximum value for association members during the unprecedented global pandemic. The new virtual experience, branded GSX+, builds on the annual Global Security Exchange (GSX) event and promises to be the largest virtual...

The post GSX+ 2020, the world’s premier virtual security experience, breaks new ground appeared first on ISJ International Security Journal.

]]>
ASIS International, the world’s largest association for security management professionals, has opened its annual conference on an entirely new virtual platform to provide maximum value for association members during the unprecedented global pandemic.

The new virtual experience, branded GSX+, builds on the annual Global Security Exchange (GSX) event and promises to be the largest virtual gathering of global security professionals. GSX+ is delivering a fully virtual experience that includes CPE-eligible education sessions, a robust Marketplace (virtual exhibit hall) and lively peer-to-peer networking. The event will continue through 25 September, featuring an extensive program with 140+ education sessions and daily keynote presentations. The show kicks off today with a General Session presentation by Juan Manuel Santos, two-term President of Columbia and recipient of the 2016 Nobel Peace Prize.

“GSX+ is truly a virtual experience unlike anything the security industry has experienced before,” says Godfried Hendriks, CPP, 2020 President, ASIS International Global Board of Directors. “The global pandemic challenged us, so we responded by seizing the opportunity to provide new value. For example, every educational session will be recorded and made available for attendees on-demand 24/7. Unlike previous in-person events, this change means that every attendee, no matter their travel restrictions or time zone, will be able to see and learn from every offered session. We are excited about every element of this new virtual event and we hope that attendees will also seize this opportunity to experience all the possibilities. Only ASIS has the experience, global reach and expertise of its members to convene a virtual event of this magnitude and quality.”

The following keynote presentations are scheduled for Tuesday, Wednesday and Thursday at GSX+ this week:

22 September: Embracing the Future: Strategies for Building Resilience and Innovation

Presented by Dr. Ilham Kadri, CEO of Solvay and Werner Cooreman, CPP, PSP, Senior Vice President – Group Security Director of Solvay

23 September: Leading in Turbulent Times

Presented by General Stanley McChrystal, 4-star General and former Commander of US and International forces in Afghanistan

24 September: The Future of Cybersecurity

Presented by Keren Elazari, CISSP, Security Analyst, Researcher and Public Speaker

The GSX+ educational line-up includes 140+ scheduled and on-demand sessions across five tracks: National Security, Physical and Operational Security, Risk Management, Digital Transformation/ Information Security and Leadership and Managing within Organisations. All-Access attendees can earn up to 25 CPEs and will be able to access education sessions through 31 December.

GSX+ also offers numerous opportunities for peer networking, including virtual receptions, awards celebrations and even the famous ASIS Break Room. Here are a few of the planned events:

  • 22 September, 3:30 pm ET: ASIS Women in Security and Young Professionals Happy Hour
  • 23 September, 3:30 pm ET: GSX+ Military and Law Enforcement Appreciation Day
  • 24 September, 3:30 pm ET: President’s Reception
  • 25 September, 12:25 pm ET: Awards Celebration
  • 24/7: The ASIS Break Room

For more information, please visit www.GSX.org.

The post GSX+ 2020, the world’s premier virtual security experience, breaks new ground appeared first on ISJ International Security Journal.

]]>
Boon Edam to feature new turnstile at GSX+ https://internationalsecurityjournal.com/boon-edam-to-feature-new-turnstile-at-gsx/?utm_source=rss&utm_medium=rss&utm_campaign=boon-edam-to-feature-new-turnstile-at-gsx Tue, 22 Sep 2020 08:21:04 +0000 https://internationalsecurityjournal.com/?p=22192 Boon Edam Inc., a global provider of security entrances and architectural revolving doors, has announced it is showcasing a new optical turnstile, the Speedlane Compact, as well as presenting the inaugural first episode of BoonTV about “Scalable Security” at the Global Security Xchange Plus (GSX+) virtual exhibition hosted by ASIS International. From 21-25 September, 2020,...

The post Boon Edam to feature new turnstile at GSX+ appeared first on ISJ International Security Journal.

]]>
Boon Edam Inc., a global provider of security entrances and architectural revolving doors, has announced it is showcasing a new optical turnstile, the Speedlane Compact, as well as presenting the inaugural first episode of BoonTV about “Scalable Security” at the Global Security Xchange Plus (GSX+) virtual exhibition hosted by ASIS International. From 21-25 September, 2020, security professionals from across the globe are converging online to participate in over 100 educational sessions, network with peers and visit the virtual “Marketplace” to browse and learn about new and innovative security technologies.

New Compact optical turnstile

Boon Edam’s Marketplace Profile at GSX+ features information about a new physical security solution, the Speedlane Compact optical turnstile. A video teaches security managers about the key features of this new turnstile, created out of a need for a shorter security barrier with the same level of security as more robust optical turnstile models. The Speedlane Compact features swinging barriers, generous space for access control or biometric device integration and tailgating, safety and low-object detection sensors – all in a compact footprint ideal for locations where interior space is at a premium.

The Speedlane Compact has recently won the Security Today 2020 New Product of the Year Award in the Pedestrian Security Entrances category. This honour is awarded to products that are considered to be particularly noteworthy in their ability to improve security.

Touchless entry without compromising security

Due to the global outbreak of COVID-19, security professionals are tasked with providing a “touchless” entry experience while maintaining the security of the building. Boon Edam’s Marketplace Profile contains a “Security Entrances” Brochure which outlines the types of security entrances that also fulfil the need for touchless entry. Boon Edam’s Entry Experts are available the entire week of the GSX+ event to field questions and host face-to-face meetings to discuss further how to make buildings contactless and secure.

Educational TV episode

The Boon Edam virtual booth will also feature a 20-minute episode of BoonTV where host, JC Powell, Vice President of Sales at Boon Edam, will introduce the concept of “Scalable Security.” JC discusses the three basic capability levels of security entrances relative to tailgating mitigation – deterrence, detection and prevention – in order to help security professionals identify the best entrance type for each area of their building.

Visit https://www.boonedam.us/events/gsx-plus-virtual-2020 for a US$50 credit towards an “All-Access” or “One Day” pass, or towards one free “Marketplace-Only” pass.

The post Boon Edam to feature new turnstile at GSX+ appeared first on ISJ International Security Journal.

]]>
Fujitsu develops technology to block facial authentication fraud https://internationalsecurityjournal.com/fujitsu-develops-technology-to-block-facial-authentication-fraud/?utm_source=rss&utm_medium=rss&utm_campaign=fujitsu-develops-technology-to-block-facial-authentication-fraud Mon, 21 Sep 2020 10:16:34 +0000 https://internationalsecurityjournal.com/?p=22185 Fujitsu Laboratories Ltd. has announced the development of a facial recognition technology that uses conventional cameras to successfully identify efforts to spoof authentication systems. This includes impersonation attempts in which a person presents a printed photograph or an image from the internet to a camera. Conventional technologies rely on expensive, dedicated devices like near-infrared cameras...

The post Fujitsu develops technology to block facial authentication fraud appeared first on ISJ International Security Journal.

]]>
Fujitsu Laboratories Ltd. has announced the development of a facial recognition technology that uses conventional cameras to successfully identify efforts to spoof authentication systems. This includes impersonation attempts in which a person presents a printed photograph or an image from the internet to a camera.

Conventional technologies rely on expensive, dedicated devices like near-infrared cameras to identify tell-tale signs of forgery, or the user is required to move their face from side to side, which remains difficult to duplicate with a forgery. This leads to increased costs, however and the need for additional user interaction slows the authentication process. To tackle these challenges, Fujitsu has developed a forgery feature extraction technology that detects the subtle differences between an authentic image and a forgery, as well as a forgery judgment technology that accounts for variations in appearance due to the capture environment.

Fujitsu’s new technology ultimately makes it possible to prevent impersonation with forgeries using only face images taken at the time of authentication, enhancing security without sacrificing the convenience of face authentication and contributing to the DX (digital transformation) of operations with improved personal authentication technologies.

Growing risk of fraud using facial images

While biometric authentication continues to grow in popularity, many risks remain. In some cases, when facial images are disclosed on the Internet via SNS, etc., the possibility emerges that the image may become the target of malicious users if stolen due to the loss of an ID card with a facial photograph, etc.–because of the prevalence of such images, this makes facial authentication more vulnerable than other authentication methods, such as fingerprints or palm veins.

Challenges

Smartphone screens, ID cards and face images printed on paper vary in their appearance due to factors like reflections or blurring on a smartphone screen. It has proven difficult to determine the authenticity of a face by relying on a facial image alone because of the effects of similar fluctuations, such as reflections caused by fluorescent lights or sunlight, or blurring caused by facial movement. For this reason, special cameras like near-infrared cameras or depth cameras that measure the distance between the subject and the camera are used to catch typical signs of forgery. These methods remain imperfect, however and lead to issues including increased costs for dedicated cameras and reduced convenience due to the addition of motion information required when using general-purpose cameras. The development of technologies that can conveniently and inexpensively detect spoofing with general-purpose cameras has become a topic of consideration.

About the newly developed technology

Fujitsu has developed a technology that can detect the impersonation of others through photographs, etc. from face images taken with a general-purpose camera. The features of the developed technology are as follows.

Forgery feature extraction technology

Various features characteristic of a forgery remains in images obtained by presenting the forgery to the camera, such as reflections on the terminal screen of a smartphone and distortion of the shape of the face caused by taking a planar forgery. Fujitsu has developed a forgery feature extraction technique to express the difference between the forgery’s characteristic features and the real face as determinable values.

First, the face image captured by the camera is separated into various elements that exhibit the characteristic features of forgery, such as reflection elements and shape elements. Next, image processing technology is used to digitise the characteristic features of forgery for each of the separated elements and the characteristics of each element are combined to generate a characteristic for judgment. This makes it possible to identify counterfeits without information based on user operations.

Technology for judging forgery

In the past, in order to respond to variations in image appearance caused by the capture environment, a single determination model was generated by training a system with face images containing various variations using machine learning. However, the wide range of variations in the way images are taken, depending on the type of forgery, such as a smartphone screen or ID card, complicates the boundary between the real face and the forgery, making it difficult to identify the forgery even with the latest Deep Learning techniques. Therefore, Fujitsu has developed a technology that can correctly identify counterfeits by generating determination models that reduce the influence of variations by learning the categories of face images that have similar variations, such as face images taken at the office or face images taken by a window.

The development technology steps are divided into a training phase and a judgment phase. In the training phase, face images acquired in various environments are classified into categories such as window, backlight and normally based on the capture environment, such as the intensity of light and the direction of light. Next, a judgment model is made for determining whether the target is a real face or a counterfeit with machine learning, using the decision features generated by the forgery feature extraction technology for each category.

In the judgment phase, in order to estimate which of the categories defined in the training phase the input image capture environment is close to, the similarity between the input image and each category is calculated dynamically. Next, in order to emphasise the result of the determination model of the category in which the input image and the environment are close to each other, a value obtained by multiplying the score indicating the authenticity output from each determination model by the weight based on the similarity with each category is used to determine whether or not the object is a fake.

By using these technologies, it becomes possible to identify counterfeits using only the information of face images taken by a general-purpose camera and to realise relatively convenient and inexpensive spoofing detection.

Outcomes

Fujitsu reviewed its own evaluation data set collected in a general office environment or an environment where telework outside the office is assumed and confirmed that spoofing attempts can be detected with the same level of accuracy as before, even when there is no specified movement by a dedicated camera or a user. This makes it possible to prevent unauthorised access at a low cost without sacrificing convenience. The technology offers the potential to improve security for workers remotely accessing company systems from offsite and to contribute to the digital transformation of operations through the advancement of enhanced personal authentication technology.

Future Plans

Fujitsu aims to further improve the accuracy of its forgery detection technology with the aim of putting it into practical use by the end of the fiscal 2020 in March 2021.

www.fujitsu.com

The post Fujitsu develops technology to block facial authentication fraud appeared first on ISJ International Security Journal.

]]>
Gallagher unveils brand new T30 access reader to provide customers with extra flexibility https://internationalsecurityjournal.com/gallagher-unveils-brand-new-t30-access-reader-to-provide-customers-with-extra-flexibility/?utm_source=rss&utm_medium=rss&utm_campaign=gallagher-unveils-brand-new-t30-access-reader-to-provide-customers-with-extra-flexibility Mon, 21 Sep 2020 09:53:26 +0000 https://internationalsecurityjournal.com/?p=22171 Security manufacturer, Gallagher has launched its new T30 keypad reader. The first of its kind from Gallagher, the T30 card and PIN reader offers an extra layer of security without the display screen of the T20, providing customers with even greater choice and flexibility when choosing hardware to secure their sites. Robust enough to withstand...

The post Gallagher unveils brand new T30 access reader to provide customers with extra flexibility appeared first on ISJ International Security Journal.

]]>
Security manufacturer, Gallagher has launched its new T30 keypad reader. The first of its kind from Gallagher, the T30 card and PIN reader offers an extra layer of security without the display screen of the T20, providing customers with even greater choice and flexibility when choosing hardware to secure their sites.

Robust enough to withstand the harshest conditions and with an IK09 impact protection rating, the T30 is available in MIFARE and multi-tech variants, offering compatibility with MIFARE smart card and NFC technology and Bluetooth credentials through Gallagher Mobile Connect.

Meredith Palmer, Chief Product Officer at Gallagher, says: “We’re very excited about the release of our T30 reader. With two-factor authentication, the T30 is the perfect reader for sites who require that vital extra layer of security but don’t need all the ‘bells and whistles’ built into our T20 reader.”

Palmer continued: “At Gallagher, we’re invested in developing products that meet the needs of our users. There has been a great amount of interest in the T30 already; in fact, the first readers had barely come off the production line before they were being shipped out to sites around the world.”

The original release was planned for October; a date set long before the effects of COVID-19 lockdowns and restrictions came into effect. “Our team pulled out all the stops to release the T30 to market a full month ahead of schedule, which is quite an achievement during the current pandemic climate,” says Palmer.

The T30 is compliant with FCC, CE and C-Tick approvals, with UL compliance currently pending. The T30 reader is available for order now.

For more information, visit security.gallagher.com.

The post Gallagher unveils brand new T30 access reader to provide customers with extra flexibility appeared first on ISJ International Security Journal.

]]>
How AI-powered cameras are keeping workers safe https://internationalsecurityjournal.com/how-ai-powered-cameras-are-keeping-workers-safe/?utm_source=rss&utm_medium=rss&utm_campaign=how-ai-powered-cameras-are-keeping-workers-safe Mon, 21 Sep 2020 08:24:15 +0000 https://internationalsecurityjournal.com/?p=22168 Hard hats save lives: but only if people wear them. Discover how intelligent, AI-powered hard-hat cameras are helping to ensure workers in dangerous locations stay safe at all times. In 1919, the E.D. Bullard Company patented the “Hard Boiled hat”, based on the steel helmets used by soldiers in World War One. These hats were...

The post How AI-powered cameras are keeping workers safe appeared first on ISJ International Security Journal.

]]>
Hard hats save lives: but only if people wear them. Discover how intelligent, AI-powered hard-hat cameras are helping to ensure workers in dangerous locations stay safe at all times.

In 1919, the E.D. Bullard Company patented the “Hard Boiled hat”, based on the steel helmets used by soldiers in World War One. These hats were made of steamed canvas and glue and were designed as daily protective headgear for miners.

Over the course of the 20th century, the hard hat evolved to become the brightly coloured, impact-resistant headgear of choice for those working in hazardous environments. And today, many countries have legislated to ensure hard hats are worn at all times in such places – with good reason.

Failing to wear a hard hat in a hazardous workplace can be fatal. In the US in 2012, more than 1,000 people died from head injuries while working. What’s more, data from the US National Safety Council suggests that such fatalities are increasing, with construction, transportation/warehousing and agriculture reporting the highest number of preventable deaths in 2016 and 2017.

Importantly, not wearing safety headgear not only costs lives: it can also cost companies money in lawsuits, compensation and life insurance payouts and lost labour.

Enforcing safety in a busy environment

In spite of the risks, enforcing hard hat use can be challenging, as people can forget or decide not to put them on. This means site managers must keep a constant lookout, but that’s not always easy in a distracting, noisy environment with vehicles, materials and people always moving around, often over multiple levels.

That’s why many organisations are turning to AI-powered solutions that intelligently help identify if people are complying with hard-hat safety rules.

AI cameras watching out for workers

In real life, artificial intelligence technology is being used around the world every single day to make workplaces operate more efficiently, more productively and of course more safely.

The latest hard-hat detection video cameras use embedded AI algorithms to ‘learn’ what a person wearing a hard hat should look like. They then apply this algorithm while scanning a site, rapidly identifying if anyone is working without a hard hat and alerting management teams so they can take action. Of note, when a violation is detected, management teams can also send an auditory warning through the on-site speaker to remind people of the rules.

AI-powered Hard Hat Detection from Hikvision

Hikvision’s AI-powered Hard Hat Detection Cameras are equipped to intelligently detect if workers are or are not wearing safety headgear. The high definition cameras constantly scan your site, rapidly sounding an alert if someone is identified as breaching defined rules. Cameras can also be linked with access control systems, to ensure that members of staff are wearing hard hats from the moment they enter a hazardous location.

Accelerate your business with AI

To find out more about the application of hard hat detection technology, visit the industrial park solution pages for more information.

https://www.hikvision.com/en/solutions/solutions-by-industry/industrial-parks/

https://www.hikvision.com/en/products/IP-Products/Network-Cameras/DeepinView-Series/ids-2cd7a46g0-izhs-y–r-/

The post How AI-powered cameras are keeping workers safe appeared first on ISJ International Security Journal.

]]>
Exclusive: Transforming CCTV from surveillance to a solution https://internationalsecurityjournal.com/exclusive-transforming-cctv-from-surveillance-to-solution/?utm_source=rss&utm_medium=rss&utm_campaign=exclusive-transforming-cctv-from-surveillance-to-solution Mon, 21 Sep 2020 08:11:32 +0000 https://internationalsecurityjournal.com/?p=22164 Phillip Antoniou, Vice President Sales, Europe South/West & MEAPAC at MOBOTIX looks at how the perception of CCTV has shifted. Walk down any street, public space or shop and chances are, you are going to spot a CCTV camera. Often the first thing that springs to mind is who is looking at me?  Isn’t it...

The post Exclusive: Transforming CCTV from surveillance to a solution appeared first on ISJ International Security Journal.

]]>
Phillip Antoniou, Vice President Sales, Europe South/West & MEAPAC at MOBOTIX looks at how the perception of CCTV has shifted.

Walk down any street, public space or shop and chances are, you are going to spot a CCTV camera. Often the first thing that springs to mind is who is looking at me?  Isn’t it just another way in which Big Brother is spying on our private lives? This is certainly the common view, or at least it used to be. Over the last few years there has been a growing acceptance that CCTV is more than an invasive tool for surveillance. That function remains and it is an important one, but it is as a means of protecting people and property rather than spying on us. There are several factors, particularly technology developments, that are driving a change in how governments and business use CCTV systems for more than just surveillance and how perceptions are changing.

Also, a plethora of things, like reality TV programmes about the police or shoplifting along with our own use of mobile devices as cameras, have started to change negative views. From the conversations we have with customers all over the world there is definitely a shift in attitude from the CCTV camera being somehow an intrusive surveillance tool to one that offers you protection.

Of course, what CCTV does is collect images of a situation. But what they do and what people are starting to appreciate, is to act as a positive protection rather than a so-called ‘sinister’ surveillance device. If there is an incident, CCTV captures the situation in real time, alerts the relevant emergency service and provides evidence for follow up investigation. So, it is a balance of understanding that essentially surveillance is what enables protection. Protection is a better and more acceptable way to position CCTV technology than calling it surveillance.

Focus on data

There the story could have ended. But several advances in digital technology – broadband and wireless connectivity, cloud computing and data storage for example – are transforming how CCTV is used. The focus has shifted from device to data.

The camera is still important because it captures the images, what is now much more significant is data and how that data is used. Data is the key. If you use CCTV to capture information and just sit on it then, yes, it’s surveillance. But if you are doing something with that data to improve the situation or application, to me that is protection, as well as health and safety.

It is important to note at this point a divergence in the market. On one side there is a wide range of low-cost, commodity CCTV devices that are essentially point and click, easy to replace, but have a limited lifetime, scalability and Return on Invest (ROI). They film what is going on, store or communicate the images for historical view or as a record in case an incident needs to be reviewed. These systems are standalone. Typically, you would find this type of device in a small shop or garage forecourt. For less than €100 it is possible to install a CCTV system inside a home and view images in real time from a mobile device even when you are on holiday.

Although technology is improving the quality and capability of equipment at this end of the market – as in internet-enabled home CCTV systems – this market sector is probably starting to contract.

It is at the other end of the spectrum where dynamic and exciting change is taking place. Here, there are CCTV systems that leverage technology to become highly intelligent, reliable and robust solutions with scalability and long-term investment value. As an example, half of the MOBOTIX range of cameras have no moving parts, fewer single points of failure, need less maintenance and offer a meantime before failure of up to nine years.

This kind of high-end CCTV equipment delivers a significant expansion in scope of capability. They use new technologies such as IoT (Internet of Things), artificial intelligence (AI), advanced analytics and integration with other systems like building management, fire and even industrial and asset recovery. Interestingly, MOBOTIX was a bit ahead of the game in that it had IoT capability embedded in its camera technology long before IoT became a buzz word.

Transforming retail marketing

The retail sector is a good example of how CCTV is focusing on the importance and value of data. Initially, a typical CCTV system in a retail environment such as a department store or shopping mall, would have been installed primarily as a security tool to prevent shoplifting, for example. It would store images on disk for retrospective viewing or enable an operator to monitor shoppers in real time.

Now retailers are starting to realise the value of CCTV and importantly, the data it captures, to deliver a host of additional benefits. The data can be used to analyse how customers move around a store, where there is a concentration of people, how long they browse a particular department or aisle.

Sales information will tell you if a product is selling well or not, but it can’t tell you how long someone spent looking at it before purchase or indeed if they spent time viewing, but then didn’t buy. It is common knowledge that supermarkets place certain items at checkout because they know there are people standing waiting to pay for their shopping.

CCTV, on the other hand, gathers data about how and where shoppers move around the whole store. It can reveal, for example, if most people pass a particular shelf but seldom select anything from it. Again, CCTV can deliver real marketing insights into queue management, how many people are queuing, at what time of the day and how long does it take to serve customers. Instead of CCTV being a costly but necessary security asset it becomes a solution for improving customer experience, increasing sales and revenue and streamlining operations.

CCTV

Flexibility and adaptability

As we see traditional CCTV shifting from a standalone security system to an integrated management solution, the technology needs to be more adaptable. That means building solutions that fit the application, such as mixing different camera types and viewpoints and applying different sensors depending on specific areas of a site. Cameras with 360o capabilities are more appropriate for large open spaces while 180o-cameras are a more cost-effective solution for single line-of-sight situations. Cameras themselves also need to be configurable so they are better able to meet specific needs. That allows organisations to modify a solution to almost any environment to get the best results.

One transport company has deployed a MOBOTIX CCTV solution at its bus depot. It acts as a security system for the site. But it also integrates with the lighting system so that when buses return in the evening, lights are automatically switched on depending on where the bus is on site. The system also turns on lights so that drivers feel safe moving from their vehicle to the depot office. Interestingly, this enhanced CCTV application complements the traditional security role since multiple light switching on and off is an additional deterrent to potential criminal activity.

Security is critical

Cybersecurity continues to be a constant challenge and CCTV is no different. Stories about CCTV systems being hacked and secure, private video images appearing on public websites are now all too common.

I read about an incident back in 2016, where ransomware infected 70% of surveillance cameras in Washington D.C. The problem is not just access to video images. An insecure camera is an open door to the corporate systems to which it is connected. Cybersecurity is critical, especially as CCTV systems are integrated increasingly with networks, databases and other business systems. The cost of damages in this situation is immeasurable.

Cybersecurity is something that MOBOTIX takes very seriously and, from the start, has embedded security protocols into the platform of its technology. MOBOTIX equipment has been and continues to be rigorously subjected to third-party and industry-standard security testing. It confirms that robust security protocols were already well established in the technology by design and continues to revaluate on how it can further improve and evolve in today’s market to be able to provide as secure a platform as possible. Not only does that approach make existing technology more secure, it means you can quickly and easily adapt and deploy future security protocols as criminals come up with new and smarter ways to infiltrate systems.

Countering COVID-19

The COVID-19 pandemic has had an unprecedented impact on every aspect of our lives and has thrown up several questions in this dialogue. The pandemic and the need to lockdown society has catapulted digital technology to the forefront of almost everything we do from online schooling, connecting with friends and family and remote healthcare to homeworking, digital marketing and online recruitment. Suddenly the ability of CCTV to facilitate remote working and operations and reducing the need to visit locations has come to the fore.

One of the main roles of CCTV in relation to COVID-19 is one of health and safety.  But here the industry needs to be careful since there have been several claims made about CCTV as a fever detection system. CCTV cannot do this and it is not a medical device, but it can be a critical part in a package of measures to help tackle COVID-19 and make processes and operations more efficient.

Since lockdown, MOBOTIX has seen an increase in demand for its thermal imaging solutions. Several airports around the world have deployed thermal monitoring systems as part of a package of measures to safeguard and mitigate the impact of COVID-19. Much faster and more efficiently than handheld devices, thermal cameras can measure surface temperature ranges. A bit like an early warning system. Staff can then draw the individual aside for further investigation to see if they might be ill, allowing other travellers to carry on unimpeded.

In other instances, MOBOTIX thermal technology has been deployed to reduce the risk and potential cost of fire. Because thermal cameras sense heat – the parameters can be customised to the environment – these systems can often detect the beginning of a fire hazard long before a human is able to see, hear or smell a fire. In several cases MOBOTIX has enabled its customers to realise cost avoidance savings of up to 40% dependant on the application.

Recently we have seen significant advances in the use of AI, deep learning and complex automation that are enhancing what CCTV solutions can achieve. I see the next evolution of CCTV as one of convergence where you have truly integrated and open-platform solutions. Systems like security, access, fire, facility management on industrial sites, border control locations and even homes will come together and communicate seamlessly to enable operational efficiency. The technology to do this is already there or at least well advanced, but it also needs common standards if the industry is going to deliver the kind of quality and reliability that customers will expect.

AI is still at an early stage, but it is gathering pace and there will be more edge-based solutions. As internet connectivity and bandwidth improves – with innovations like 5G networks – we are going to see more wireless and cloud-based systems and developments like private cloud environments which offer greater control and security.

If I have one message to the market, but especially to customers and users, it is to make sure you do the research and ensure you have the best product set and solution for the application. And as CCTV manufacturers it is our responsibility to make sure that we deliver a broad portfolio of capabilities in our devices which can be used across multiple verticals and applications, that the technology behind the products is robust, high-quality and secure and that it can scale as the needs of customers change. COVID-19 has shown everyone, you never know what is around the corner.

To find out more about MOBOTIX video protection solutions, contact www.mobotix.com

This article was originally published in the September 2020 edition of International Security Journal. Pick up your FREE digital copy here

 

The post Exclusive: Transforming CCTV from surveillance to a solution appeared first on ISJ International Security Journal.

]]>
AMAG Technology expands Symmetry Mobile app to support return to work https://internationalsecurityjournal.com/amag-technology-expands-symmetry-mobile-app-to-support-return-to-work/?utm_source=rss&utm_medium=rss&utm_campaign=amag-technology-expands-symmetry-mobile-app-to-support-return-to-work Mon, 21 Sep 2020 07:58:47 +0000 https://internationalsecurityjournal.com/?p=22161 AMAG Technology, a G4S company, has expanded the Symmetry Mobile functionalities to support Return to Work strategies for businesses as they reopen. The added features of Symmetry Mobile provide additional controls for a person’s access to corporate sites and facilities. Symmetry Mobile now offers additional screening questions to help reduce the risk of potentially infected...

The post AMAG Technology expands Symmetry Mobile app to support return to work appeared first on ISJ International Security Journal.

]]>
AMAG Technology, a G4S company, has expanded the Symmetry Mobile functionalities to support Return to Work strategies for businesses as they reopen. The added features of Symmetry Mobile provide additional controls for a person’s access to corporate sites and facilities. Symmetry Mobile now offers additional screening questions to help reduce the risk of potentially infected employees accessing corporate sites.

With Symmetry Mobile, employees can be required to complete a Return to Work questionnaire on their smartphone. Upon successful completion, their physical access card or mobile credential will be enabled for a specified period of time. If the form is not completed successfully, the access card will expire and the employee will not be able to enter the facility.

The forms can be customised and can operate on a configurable schedule. For example, an organisation can require its employees to complete the form every morning before reporting for work or by a selected time of day. The solution also includes email notifications, which can be sent to the employee’s manager for visibility.

“Symmetry Mobile provides an easy-to-use Return to Work remote technology solution that provides an actual hard barrier to entry if a person fails to meet their company’s required screening questions,” said AMAG Technology President, Howard Johnson. “By recording every person’s answer, Symmetry Mobile also provides an audit trail, which helps companies remain in compliance with governing authorities while keeping employees safe.”

The Return to Work questionnaire’s functionality within Symmetry Mobile operates independently from the access control readers and can be used on virtually any existing Symmetry Access Control system installation — and without any local infrastructure changes. Symmetry Mobile also operates with Symmetry Blue Bluetooth readers, supporting organisations that are transitioning to a fully mobile access control solution. Organisations can phase in Symmetry Blue readers to minimise disruption while modernising the user experience, increasing flexibility and security and creating a safer onboarding environment.

The app is available in English, Spanish, French and Arabic.

For more information about Symmetry Mobile, please visit www.amag.com or contact your sales representative at www.amag.com/contact.

 

The post AMAG Technology expands Symmetry Mobile app to support return to work appeared first on ISJ International Security Journal.

]]>