securitylinkindia

CEM’s RED Compliant Access Control

Johnson Controls confirms that their powerful range of CEM Systems access control hardware is compliant with the European Union’s new Radio Equipment Directive (RED) 2014/ 53/ EU, which came into full effect on 13 June 2017. CEM Systems intelligent card readers including the CEM S610 (iCLASS SE, DESFire and Prox) reader, CEM S700 reader, CEM emerald reader and their biometric equivalents are all RED compliant and continue to be available for distribution within the EU. The CEM sPass reader and CEM S3040 portable reader are also confirmed as being RED compliant. On June 13, 2016, the former Directive on Radio and Telecommunications Terminal Equipment (also known as the R&TTE Directive, 1999/ 5/ EC) was repealed and the new requirements came into law. Manufacturers who were compliant with the existing legislation (R&TTED and LVD/ EMCD) had until 13 June 2017 to comply with the new ‘RED’ requirements. The Radio Equipment Directive applies to radio equipment being sold in the EU market and applies to all manner of products, including web enabled appliances, home monitoring medical devices, navigation or tracking systems and mobile phones to name just a few. Anything that uses the radio spectrum to communicate (apart from those items specifically excluded in the Directive) falls within the scope of the legislation and must comply. Equipment that does not comply with RED cannot be imported, distributed or represented in EU member states. In the age of the Internet of Things, more and more devices are transmitting and receiving data, and in effect, are behaving like radio equipment. It is important that radio products are ‘RED’ compliant to ensure the visibility of devices entering the market and to ensure that they do not present an interference risk to other electrical devices or a health and safety risk. CEM Systems access hardware has a legacy of innovation, with industry firsts including portable handheld card readers Power over Ethernet plus (PoE+) door controls and intelligent card readers with in-built memory.

Read More

Geutebruck Integrated Video Content Analysis

Geutebrück is expanding its portfolio with camera-based video content analysis (VCA). VCA reliably detects people, cars, trucks, animals, colors or behavior patterns in moving images – by day or night. Items such as containers, pallets or packages can be accurately identified. The video motion detection in the camera is activated by the customer. The main features are abandoned object (loitering items), removed object (missing items), counting (item counting), intrusion detection (perimeter security) and a dwell filter (loitering/ evaluation of dwell time). further filters are the speed filter (velocity), enter & exit filter (intrusion and leaving), stopping filter (immobility for too long) and tailgating filter (distance detection). Many of the filters can be logically sequenced together. Tamper detection (detection of tampering) and shake cancellation (image stabilizer) are also included. With item counting, the VCA camera automatically identifies in a direction-dependent way how many people, vehicles or objects cross over a counting line, which can be positioned anywhere in the image. To safeguard fenced outside areas, the intrusion detection detects any attempts to get through the barriers by means of determined perimeters and provides secure protection for goods which are stored outside and parked vehicles. The dwell filter identifies when people remain for an unusually long time in a defined area, for example outside a factory entrance/ exit or a financial institution.

Read More

S2 Cumulus Cloud-based Service

S2 Cumulus makes it easy to remotely monitor and administer S2 systems from a centralized dashboard. S2 Security, the leading developer of complete enterprise security solutions, has recently announced S2 Cumulus, a new cloud-based service. It is a major step in connecting the S2 ecosystem, enabling administration and monitoring of S2 products as well as critical communication between people, devices and third-party systems. “Cumulus represents an enormous advantage for S2 system owners,” said John L. Moss, CEO, S2 Security, “We’ve created the backbone for providing new cloud services to our integrators, our end users and our end users’ people.” S2 Cumulus transforms the way S2 systems integrators monitor and manage S2 deployments. At launch, S2 Cumulus offers system health monitoring, software license management, remote software updates and automatic alerts to changes in system status. Leveraging the cloud, S2 Cumulus will enable S2 Security to develop and provide countless services such as virtual credential acquisition and management, video stream sharing, remote mustering, communication with third-party systems and more. From a centralized, easy-to-use dashboard, integrators can organize and view critical information about their registered S2 systems to provide better service to customers. They can also set up and receive email or text message alerts to changes in system status, reducing the time to detect and resolve problems. In addition, common tasks such as updating software and managing and renewing licenses can be performed remotely through S2 Cumulus without requiring an onsite visit, reducing service and maintenance costs. S2 Cumulus currently supports S2 NetBox series access control and event monitoring systems, S2 NetVR series video management systems and the S2 Magic Monitor unified client, and over the course of 2018 will be offered for all S2 product lines.

Read More

RISC-Based Multi-WWAN Computers

One of the biggest challenges in modern rolling stock systems is establishing a solid and dependable communication network between a fast-moving train and the stations along the track. Wireless train-to-ground communication is the link that connects many advanced train services such as automatic train operation (ATO) and passenger Wi-Fi systems. In order to meet the stringent requirements of these systems, wireless devices must be able to consistently deliver reliable connectivity and sufficient bandwidth to support all the applications that count on train-to-ground communication systems. Moxa’s newly launched UC-8580 is a RISC-based multi-WWAN industrial computing platform designed specifically for seamless vehicle-to-ground communication. The UC-8580 is provided with four slots for installing wireless modules. Three slots support 3G/ LTE cellular modules, and one slot supports a Wi-Fi module. Each cellular module is provided with two SIM card slots to support redundant cellular network communication and geo-fencing SIM card selection, which you can implement by leveraging the built-in Wireless Manager, a Moxa software utility for cellular and Wi-Fi management. The UC-8580’s single-sided I/O design is ideal for space-limited vehicle applications. With its front-side access panel design, the computer allows for convenient installation and replacement of wireless modules, SIM cards, and mSATA cards without needing to unmount the entire unit from the wall, thereby simplifying maintenance. The UC-8580 uses an open platform based on Debian 8 with Linux Kernel 4.1, allowing solution providers to manage software packages via Debian’s APT, or develop software applications with Moxa’s API Library and GNU C Library.

Read More

CNL IPSecurityCenter™ V5.5

CNL Software has released IPSecurityCenter™ Version 5.5, which includes many performance and feature enhancements for large-scale and mission critical deployments of IPSecurityCenter for integrated, enterprise-wide situation management. As the size, scale, and complexity of IPSecurityCenter deployments continue to increase, so does its scalability, subsystem and sensor compatibility, and accessibility. Enterprise customers, in particular, require performance and reliability, the flexibility to efficiently integrate existing and new systems and technology, and the convenience that Web and mobile applications provide to help them effectively manage risk and enforce compliance across the enterprise. The latest version of IPSecurityCenter addresses a large number of PSIM system deployment challenges through features that include: Federated hub & node architecture: IPSecurityCenter’s federated architecture enables interoperability between and across independent and often geographically distributed IPSecurityCenter systems, delivering information about alarms and devices and controlled access to system assets and data for other federated members, while ensuring local availability for critical sites. Security policies and standard operating procedures (SOPs) are managed centrally and published instantly across the enterprise, ensuring incidents are quickly identified and properly and consistently resolved, limiting organizational liability and compliance risk and reducing administrative costs. Publishing: IPSecurityCenter is remotely deployable over regional, national, and global networks. New subsystem integrations, driver updates, and user interfaces are managed centrally, and published increasing conformity and reducing deployment and maintenance costs. Enhanced plug-in framework: IPSecurityCenter features an enhanced capability to support built for purpose ‘plug-ins’ that use modern development capabilities without requiring wholesale updates to the underlying framework, ensuring that end user interfaces are always 100% fit for the purpose. Maintenance management: IPSecurityCenter supports the health status and diagnosis of connected subsystem devices including CCTV cameras, access control equipment, vertical transportation systems, and supporting network and communications infrastructure. IPSecurityCenter also integrates with third-party service desk systems and supports the tracking and measurement of service level agreements. Integration of these technologies enables IPSecurityCenter to increase the uptime of connected systems and devices, enhances security posture, and reduces subsystem and equipment maintenance and sustainment costs. Image scroller: Presents event-driven visual information in real-time with a graphical indication of event status. This allows operators to rapidly process large volumes of data to support faster decision making. For example, the system can be used to present employee ID photographs as they enter critical areas, or license plate images for violating vehicles. Automated software upgrades: Lowers the total cost of IPSecurityCenter ownership by automatically delivering updated client software to each operator workstation computer, minimizing IT resource, administrative and maintenance and sustainment costs. Geographic data: Whether dealing with threats detected by sensors such as radar and sonar or to reduce the risks of lone workers in hazardous environments, IPSecurityCenter plots and tracks people, vehicles, vessels, and GIS-enabled devices, and displays current and historic information. Auditing and management data: IPSecurityCenter creates records of all operator activity to assist with regulatory compliance or corporate governance. This ensures that IPSecurityCenter can act as the single source of truth for all the connected sub-systems, reducing the time to access vital audit information. “In total IPSecurityCenter V5.5 represents over a years’ worth of development effort that has delivered a product that contains major new functional areas designed to address the business challenges encountered by IPSecurityCenter users every day,” says Dave Taylor, Chief Product Manager at CNL Software, “IPSecurityCenter is in use at over 400 sites around the world. We will continue to invest heavily in developing the features that are required to address the growing needs of our customers and partners.”

Read More

Dahua Safeguards BRICS Summit

Building on its success in providing a comprehensive security solution for the G20 Hangzhou Summit in 2016, the 9th BRICS Summit has been another accomplishment for Dahua. The Summit was held during 3-5 September 2017 in Xiamen, China, where national leaders from the five member countries made their points for their brighter future. In partnership with the Summit’s security team, Dahua constructed a robust security barrier and guaranteed a smooth opening for the summit. Main meeting venue and surrounding areas Dahua installed their visual emergency dispatch and command system at the BRICS command center which is normally administered by the Public Security Department of Xiamen. The Center’s large display wall was stitched together with the Dahua edgeless HD LED panels that enabled complete pictures of all units during the meeting under command center control, which simplified the control and responses to great extent. A full range of video surveillance and display solutions from Dahua was deployed around the Xiamen International Conference & Exhibition Center as well as the security command center. Police cars A fleet of 228 patrol cars and 72 special cars from the Xiamen Public Security Bureau was used to clear the way for Summit leaders. A customized Dahua mobile solution with GPS positioning and in-vehicle wireless image transmission system was installed on each vehicle to provide the command center continuous live overview of all areas which helped handling of various emergencies. The ‘Four Bridges and One Tunnel’ – the various road access points to Xiamen Island – was deployed with Dahua’s advanced technologies such as intelligent analysis, big data, and video analysis centers to significantly increase the efficiency of emergency command and information technology management capabilities, providing uninterrupted HD video surveillance and smart road event monitoring on bridges and tunnels. This ensured smooth operation of each component in the ‘Four Bridges and One Tunnel’ during the BRICS Summit. In addition, Dahua also contributed to the security of other key areas including the Xiamen Airport, train station, ferry piers, and police checkpoints. Hotel Areas In surrounding districts such as Haicang and Jimei, Dahua installed video surveillance on key routes and sites where key activities of the city held. This helped achieving full coverage of places such as guarded routes, main roads, key sites, as well as surrounding areas and regions of elevated-risk. Dahua also took on surveillance of the practices of catering, accommodations and traveling of the leaders. The hotels and surrounding areas were upgraded to HD systems in a short time. The mobile law enforcement surveillance system assisted the Xiamen Market Supervision Commission in guaranteeing the provision of safe food during the Summit. The Dahua Smart Healthcare Solution covered various grade-A hospitals in Xiamen, enabling them to be ready for possible emergencies at any time. Dahua also participated in logistics services during the Summit. Dahua was actively engaged in the Summit’s surveillance operations since January. Dahua assisted public security and traffic police departments in accomplishing almost 300 security tasks. They ensure zero device malfunctions during the Summit. Summit security units have spoken high about Dahua’s attitude, standardized operations, and intelligent video surveillance solutions.

Read More

Raytec IP Lighting Combats Crime at Manor House

Raytec Network Illuminators have been deployed as a key element of a bespoke IP security solution for a Grade II listed Manor House in Shropshire, UK to deliver outstanding night-time surveillance images and actively combat crime. Previously a target of crime, the estate had no professional CCTV system, relying only on halogen lighting with inbuilt PIR detectors. The security team needed a solution which would allow 24/7 monitoring over the property, particularly at night, with the ability to respond instantly to any security breaches. SMC who were made responsible for designing the solution, designed a state-of-the-art IP surveillance system, fully integrated with Raytec. White-light IP illuminators were installed around the estate perimeter and the Manor House. IP addressability and connectivity was crucial to the system design, ensuring that the IP lighting could be automatically triggered by any network device to provide an instant, visual response to any incident in real-time. A bespoke integration with Crestron Control System also allowed remote control over the lighting at any time and was designed in house by SMC using Raytec’s network lighting API. OPTEX PIR’s were installed to detect the first signs of an intruder and automatically trigger the Raytec network lighting as a first line of response to deter any potential intruders. Simultaneously the system sounds an internal alarm in the estate office and the manager’s apartment. The powerful LED lighting enables new Samsung PTZ network cameras to deliver high quality images during the hours of darkness, providing reliable information to the staff as to who or what is on-site. The security team are able to use the Crestron system via a simple touch screen interface to take live control over any individual illuminator or group of illuminators. Selecting them via a simple map view, they can flash key zones of illuminators in the exact place an incident is occurring as a further warning signal to deter crime. Sean Gill, SMC Security Manager comments, “We selected the Raytec IP lighting as it could be easily integrated with the wider system and enables us to respond instantly to any potential break-ins, even if they occur out of hours. The high quality LED lighting is also crucial to helping our CCTV operate at night. We know that our PTZ cameras can zoom in on any incident anywhere in the grounds and capture exceptionally detailed images in the dark. In fact, the new IP system has already allowed us to prevent a potential break-in and helped us to clearly identify the intruders.” “This is a fantastic example showing the endless integration possibilities with network lighting,” comments David Lambert, Managing Director – Joint, Raytec, “IP lighting is fully customisable to any requirement and represents a leap in the performance capability of security systems. We’re pleased that SMC have been able to use our API to create a bespoke lighting integration with their Crestron Control System which puts them firmly in control of their security at all times.” The installation has been an incredible success with proven results and the estate is extremely pleased with the final outcome. Both SMC and Raytec are pleased that their collaboration of intelligent system design and IP surveillance lighting has significantly improved security, actively prevented crime, whilst creating a flexible system that can adapt and evolve with the needs of the site.

Read More

VIVOTEK Protects Gran Marquise

In a yet another crowning stoke, VIVOTEK successfully commissioned a hospitality project for Gran Marquise, a 5 Star, Brazilian property with a history of 23 years. Executed in association with Genetec as its VMS partners, VIVOTEK enabled Gran Marquise to reinvent and convert its analog technology to IP surveillance. Post the project accomplishment, the property now has 250 VIVOTEK network cameras installed, integrated and linked with all other hotel devices under Genetec’s cloud-based video-surveillance-as-a-service (VSaaS) solution, Stratocast™. Elaborating on the importance of the upgrade in security, William Ku, Vice President, Brand Business Division for VIVOTEK Inc. commented, “Gran Marquise has been on the top of its game for the past 23 years and is one of the most sought after hotels among national and international authorities, artists and athletes. Some of the who’s who of the world that stayed in the property were Bill Clinton, Vladimir Putin, singer Paul McCartney, rapper Snoop Dogg and many more. Considering their clientele upgrading their security systems was of prime importance. Furthermore, it was also the first property in Brazil to achieve the ISO 22000 certificate that ensures adherence to extremely high standards of food quality and safety. Now bringing the property at par with the new age IP surveillance security standards, we along with Genetec converted their age old analogue technology into IP surveillance.”

Read More

Extreme’s Fully-Automated Secure Networking Solution

For Campus Environments Extreme combines existing and acquired technologies to simplify and secure IoT deployments. IT managers are in need of an easier and faster way to manage the 8.4 billion connected devices expected to overload networks with data this year, according to Gartner. To address the time constraints and resources spent on managing complex networks, Extreme Networks, Inc. has recently launched Extreme Automated Campus™, a cost-effective alternative to outdated traditional networking solutions that delivers plug-and-play simplicity and true business agility. The solution comes within just two months of Extreme closing on its acquisition of Avaya’s networking business, and combines Avaya’s field-proven Fabric Connect infrastructure, Extreme’s industry-leading Extreme Management Center™ and Extreme’s top-ranked support services to eliminate networking complexity, increase security and deliver increased visibility into the network. Now with over 1,500 unique deployments, spanning every industry, Fabric Connect has been proven to deliver 11x faster time to service, 7x faster mean time to repair and provide a 100% reduction in outages as a result of human error, according to Fabric Connect Customer Experience Research Report. With this announcement, Extreme wired and wireless edge products have been integrated into the Fabric Connect architecture, giving customers greater choice on how they evolve their network edge. Additionally, Avaya’s networking portfolio has been integrated into Extreme Management Center, bringing a unique 360-degree view of the network, users, devices and applications for actionable business insights. Also available are two new fabric enabled hardware platforms for high performance 10/ 40/ 100 Gigabits per second aggregation and core networking. The first is the VSP 8600, an innovative small 7RU form factor core chassis with over 21 Tbps of switching capacity. The other is the VSP 8404C, a 2RU modular core form factor with four pluggable slots providing for highly flexible deployment options. Finally, to increase customer satisfaction and loyalty, the end-to-end solution is supported by Extreme’s top-ranked services and support organization. Key facts The enterprise market’s only fully-automated end-to-end campus solution: Extreme is introducing a consistent policy-based, fabric-enabled architecture extending from core to wired/ wireless edge – enabling true dynamic services through a suite of zero-touch policy and networking features. Enhanced security through frictionless hyper-segments: Extreme’s Automated Campus leverages hyper-segments – which contain breaches, and isolate and protect critical applications, information or users – for heightened security. These hyper-segments can be implemented with greater ease and far greater scale than traditional networking technologies. Centralized, intuitive, role-based policies control user and device access to hyper-segments. 360-degree visibility: Extreme’s Automated Campus solution is unique in its ability to provide a true 360-degree view of the network (wired and wireless), users, devices and applications – with context and scale – through integrated management, analytics and policy. IT managers can create centralized policies for as many as 200,000 users and devices, and gain actionable insights with customizable signature sets for more than 7,000 applications. Additionally, through open APIs, Extreme Management Center integrates with third party solution providers so that customers can orchestrate workflows based on third party alerts, providing a holistic and programmable solution. First-person resolution: Underlying the end-to-end solution is Extreme’s top-ranked 100% in-sourced support and services, according to Gartner’s Peer Insights, with a first-person resolution rate of over 90 percent.

Read More

Elbit – In-Fill Radar and Tower System

U.S. Customs and Border Protection (CBP) awarded Elbit Systems of America, LLC, a contract to provide an in-fill radar system and tower. The amount of the award is not material to Elbit Systems Ltd, the parent company of Elbit Systems of America. The work is being performed in Texas. “U.S. Customs and Border Protection will soon have another important capability helping secure our southwest border,” said Raanan Horowitz, CEO and President, Elbit Systems of America, “This contract allows us to directly support CBP Air and Marine Operations and extend our border security solutions into the air domain.” Elbit Systems of America, LLC, has partnered with C Speed, LLC to incorporate its LightWave Radar technology used for detecting small and low-flying airborne threats in a high clutter environment. C Speed’s LightWave radar has also been deployed worldwide to mitigate the effects of wind turbine clutter in similar environments. “C Speed continually incorporates its state-of-the-art technology into its ground-based radar systems and subsystems,” explained David Lysack, President and Chief Executive Officer of C Speed, “This opportunity allows us to provide new capabilities and enhanced performance for our customers while leveraging our field proven architecture and 25 years of operational experience.” This program is another example of Elbit Systems of America delivering solutions supporting CBP’s mission to protect U.S. borders. Separately, the company is the prime contractor and system integrator for the Integrated Fixed Tower (IFT) system, currently deployed along the Arizona border. Elbit Systems of America furnishes the sensor towers with radar, day/ night cameras, and command & control software that correlates sensor information to provide a single operating picture. Information from the towers is networked into Border Patrol Station Command and Control Centers. This system increases situational awareness for Border Patrol Agents. The IFT’s high reliability and proven contractor logistics support provides CBP with 24/7 surveillance coverage.

Read More