securitylinkindia

ACTIONABLE VIDEO INTELLIGENCE

Traditional CCTV systems use a set of cameras and a local network to connect these cameras to a video management software. The video management system typically runs on a network video recorder (NVR) or a digital video recorder (DVR). The fundamental difference between the two – NVR records IP cameras while DVR records analog cameras connected via coaxial cables, hence a DVR system would not require a network but connect cameras to the DVR as point to point connections. In traditional CCTV system, monitoring is done by using a central monitoring system where human beings would watch multiple screens to make security-based decisions and take appropriate actions. With the technology advancement to IP, most of the earlier DVR systems have been replaced by NVR systems. This is because the IP cameras can be controlled remotely, and more importantly, they produce a digital video stream. The video stream could be in a raw or compressed form to save bandwidth as well asstorage space. Both network bandwidth and storage space are of premium significance and hence they need to be optimized for cost considerations. Analog video streams cannot be processed by software unless they are converted into a digital stream, and in the conversion process from analog to digital video, detail, color and resolution are lost from the original analog video stream. Many deployments use this technique to process video because it is cheaper than replacing the existing system with an IP system. This is a trade-off between cost and losing key video data that could have been otherwise processed accurately to build a superior video surveillance system. Any green field project should implement an IP system as the flexibility, long term costs and future scalability of the system are at stake. For the corporate business and high security installations such as nuclear power stations, hydro-electric power generators, airports, highway monitoring systems etc., an NVR based system is no longer an option because of its limited ability to scale. If the software processing engine is a server-based system then the scaling of the surveillance system is easily solved. A server gives one the option of building a custom solution based on the project requirements by including other surveillance and security software and hardware components besides cameras. These can be integrated into the VMS easily to build a comprehensive surveillance and security system. The other security components are access control systems, radar, signage, facial recognition, fire alarms etc. By now one must realize that an NVR based surveillance system is incapable of providing all the features to build a comprehensive surveillance and security system. Software components that make a comprehensive Actionable Video Intelligence System The following diagram illustrates the various security and surveillance components that are built around a central VMS software that runs on the main server. The key points to note are as follows: A central VMS component. A VMS that runs on a separate client-server. A VMS client software that runs on a separate client workstation. The above three components are well integrated with each other. An optional video analytics module that is tightly coupled with the main VMS, which analyzes each video frame from a camera and executes programmed video analytics. This constitutes the basis of actionable video intelligence (AVI). The ability to integrate other security software components into the main VMS software core. This is accomplished using application programming interfaces (API) and a software development kit (SDK). Popular video analytics algorithms Following is a capture of some popular video analytics algorithms: Motion detection Seamless integration of motion detection results available from cameras. Motion detection processing from application. Independent motion detection settings for every camera. ‘Motion detected’ and ‘No motion’ alarms to indicate start of motion and end of motion. Advanced motion detection algorithm with high accuracy and low resource utilization. ● Record on motion. Motion detection meta-data overlay on videos with configuration for overlay level – no overlay, only motion indicator, motion grids, full overlay. Option to exclude motion detection alarms from alarms database entries. Video analytics Video analytics on IR cameras and thermal cameras. Support for video analytics on PTZ cameras, while the camera is in ‘home’ position. Video analytics is automatically disabled when camera moves from the home position and video analytics is automatically started when camera is moved back to home position. Seamless integration of video analytics module as video analytics is not a separate software application. No manual synchronization and maintenance is needed. Dedicated video analytics screen to display analyzed videos from multiple cameras, with analytics meta-data overlay.Quick access to video analytics settings for each camera. Independent video analytics settings for every camera. Easy to manage, tightly integrated simple user interface. Enhanced algorithms which need only few parameters to be configured to get good results from video analytics in most of the deployment situations. Advanced parameters are available to handle special situations. Local or remote processing of video analytics. Availability of wide range of standard analytics features. Intrusion detection Wrong direction movement detection. Line crossing/ trip-wire. Camera tamper/ scene change detection. Crowd detection Un-attended object detection. Queue length detection. Asset protection. Loitering detection. Tailgating detection. Object stopped detection. People counting, Vehicles counting. Object trace/ travel path. Object speed calculation. Digital auto-tracking. Vibration removal. Flexible architecture to quickly support customized video analytics features. Option of project specific combined analytics on data generated by multiple external devices and video streams. Option to use 3rd party video analytics libraries using their SDKs. VMS integration techniques There are several challenges when it comes to integrating several diverse security components with one another such as integrating several diverse software stacks e.g., ALPR, FR, PIDS (including radar/ thermal cameras), ACS, IVAS, VMS, and others. VMS integration needs following points to take into consideration such as: Assess integration cost Integration is an expensive and time-consuming process. Establish performance and functionality metrics for all vendors. Establish due diligence process to assess impact to first deployment. Ensure seamless integration of all security components The integrated system should work seamlessly. No change to…

Read More

Securing ATMs 24/7 with Intelligent Security Technology

ATMs have become a cornerstone for the day-to-day life of millions, but they are vulnerable to attacks. The global ATM Industry Association has reported a 12% increase in ATM crimes during 2017. Attacks often involve ATM users, potentially injuring them, and thereby causing them trauma. Since ATMs are mostly situated outside buildings and are made for use at all times of day and night, securing them is a challenge – and therefore banks are turning to more intelligent solutions. An outdoor vulnerability According to ATM Industry Association (ATMIA), there is an estimation of about 3.5 million ATMs in the world serving those in need of cash 24/7, 365 days a year. This, coupled with the fact that they hold hard cash, makes them an attractive target. Criminals target these machines, or more precisely, the people using them in numerous ways. They distract customers at ATMs in an attempt to take their cards or cash, or to steal their PINs for later use. At cases, they also install false card readers that sneak customer’s card details for reuse. On the other side of the story, banks need to deal with customers’ disputes. In the situation of a very small percentage of ATM transactions, customers question whether the transaction has been carried out as requested – or even dispute at all in real time for any error while making the withdrawal. Thus, security precautions for ATMs are an important part of an overall security solution for financial institutions. When deep learning technology steps in Inside an ATM machine, two covert cameras are installed – one trained on the user and the other on the ATM panel. Deep learning technology embedded in the ATM security system can detect any ‘abnormalities’ in the facial scenes in front of it, referring to the existing data patterns. So, if there is another face in the picture (for example someone looking over a user’s shoulder, or if the person wearing a mask), an alarm can be triggered in the security center. By using the same technology, the security system can also flag if the number pad is covered with a strip to steal PIN codes, or if a false card reader (or ‘skimmer’) is present to steal card details. All of these ‘smart’ alarms streamline the security monitoring processes, meaning that security personnel can react to real-time scenarios and would not waste time on false alarms. The footage can also provide evidence for any investigation. Hikvision solution Hikvision DeepinMind NVR – a robust deep learning ‘engine’ – takes information from the camera and analyses it using deep learning algorithms. This also ‘manages’ footage in conjunction with other NVRs and a video management system, providing a powerful tool set for security and business intelligence. Securing assets and mitigating risks through security solution is a lot easier with deep learning technology. Even ATMs outside a building can be safer, avoiding fraud and protecting customers every day.  

Read More

Minimizing Downtime in Critical Environments

At worst, unplanned downtime in a critical environment can cause a catastrophic event that negatively impacts public safety and/ or the environment on a mass scale. At best, it could mean production losses costing thousands, or even millions, of dollars. A predictive maintenance strategy that incorporates Axis technology can help companies minimize costly downtime and improve their bottom lines. At worst, unplanned downtime in a critical environment can cause a catastrophic event that negatively impacts public safety and/ or the environment on a mass scale. At best, it could mean production losses costing thousands, or even millions, of dollars. A predictive maintenance strategy that incorporates Axis technology can help companies minimize costly downtime and improve their bottom lines. Considering the stakes, it’s no wonder that companies are transitioning from a reactive to a preventive and even predictive maintenance strategy. But many of these companies are still relying on an ‘old-school’ route-based approach – sending technicians out at scheduled intervals to physically assess and record critical asset findings. For a typical commercial petroleum company with over 20,000 well sites, this represents a significant cost. And inevitably, critical assets will either be over-maintained or under-maintained as they rarely break-down on schedule. When the cost of oil is low every barrel counts. But operational efficiency is key to a healthy bottom line. That’s why progressive companies are adopting a predictive maintenance strategy that includes distributed online monitoring. With advancements in automation, wireless technology, SCADA systems and solar powered hardened devices, remote data collection from permanent sensors provides much better insight on the status of critical assets and helps keep operations flowing smoothly. Let’s look at how Axis technology is ‘fueling’ this trend Thermal imaging for better flare stack monitoring The controlled combustion of excess gases in the chemical and petrochemical industry is essential to eliminate pressure on critical assets. Should the flame go out, it poses a serious health and safety risk for workers – and carries a hefty fine from environmental authorities. Axis thermal cameras provide better flare stack monitoring, ensuring a stable thermal profile and proactively sending an alarm to operators if the flame decreases. Explosion protected cameras improve health & safety In hazardous environments, preventing injuries and fatalities is paramount – both for the safety and well-being of workers, as well as the associated downtime cost. Certified for explosion-prone applications according to all applicable international standards, Axis explosion-protected cameras allow HSE site engineers to monitor areas where accidents typically occur – such as the working of tubulars on drilling rigs. Additionally, their temperature alarm camera monitors for temperature deviations and leaks in critical assets – to prevent an incident before it occurs. A new and attractively priced alternative to traditional steel housings, the AXIS F101-A XF P1367 is specifically designed for hazardous environments. Its lightweight aluminum housing is Class I/II/III, Division 1, Zone 1, ATEX and IECEx certified, it’s easy to configure remotely, and it delivers clear images in challenging light conditions. The red color also helps workers locate it to signal operators in emergency situations. Real-time condition-based monitoring With the advancement of video imaging and processing power, network cameras are a valuable redundancy in condition-based monitoring systems – providing visual confirmation of sensor alerts and full situational awareness in an emergency. Edge-based video analytics enable the cameras themselves to serve as a primary sensor for HSE engineers  to detect e.g., occupancy levels on a drilling rig, PPE compliance, or obstructed evacuation routes. Better communication with network speakers With Axis network speakers, it’s easy to communicate both live and alert-based pre-recorded messages to workers in remote locations – to warn of a safety risk or instruct them to take action on a sensor alarm. With the introduction of Power-over-Ethernet (PoE) speakers, oil and gas companies also save on the maintenance and implementation cost of PA systems. What’s more, the system can scale without having to upgrade proprietary, bulky amplifier racks, and the integration of Axis speakers and cameras is a simple one-click configuration process. Connected technology Axis network I/O relay modules extend the functionality of any Axis device and integrate with other facility systems such as fire alarm, HVAC and BMS. This technology is particularly useful in extending the I/O signals from any field-based temperature sensor to the central SCADA system to trigger, for example, strobe lighting, loudspeaker messaging and camera recordings in an emergency. Reliable intrusion protection Any unauthorized physical intrusion can have a major impact on critical assets and cause downtime. With an Axis intrusion protection solution, one can safeguard the whole site – from perimeter to critical core. A combination of thermal, radar and PTZ technology detects, identifies and tracks intruders. Access control limits free movement in critical or hazardous areas, and audio capabilities with alarm-based pre-recorded messages deter any unauthorized entry. Getting more from your technology It all comes back to operational efficiency contributing to a healthy bottom line. A complete system of Axis video, intelligent analytics, access control and audio address all key aspects of critical infrastructure protection – intrusion, operational efficiency and health and safety – all of which present risks to unplanned downtime. By incorporating Axis solutions in the condition-based monitoring strategy, the user can more easily detect incidents before they happen and keep production up and running.  

Read More

The Top Five Factors Driving Access Control Market Growth

It’s safe to say that both the perception and reality of growth in the access control market have certainly changed over the last few years. What was once known for its slow and conservative trajectory has now transformed into an industry that is seeing fast-paced development, with the latest forecasts predicting the global market will grow at a CAGR of 13.2% from 2018 to 2025, reaching a value of $16.66 billion by the end of that timeframe. As is common in any segment of the security industry, this growth can be attributed to a number of factors, with each one playing an important role in the overall evolution of the market. Here we take a look at the top five: Increasing threats Soft targets around the world such as educational facilities, venues, shopping centers, transportation hubs and more, are continuing to face the challenge of staying prepared for the increasing significance and frequency of threats. One of the first methods of protection that often comes to mind for these facilities is securing the perimeter of the building or campus, leading to an increase in the use of access control solutions that enhance safety and allow for swift lockdowns with the push of a button. Advanced technology The emergence of the cloud and Internet of Things (IoT) have positively impacted the entire security industry as a whole, and this undoubtedly includes the access control market. These intelligent technologies have opened up new possibilities for the traditional access control systems of the past such as remote monitoring, less cumbersome installments and central reporting/ management. Additionally, technology such as mobile credentials and biometrics offer exciting and innovative options for access control solutions, propelling market growth through interest in the convenience of these features. ACaaS One of the key benefits the cloud creates for the access control market is the access control-as-a-service (ACaaS) model, which we’re seeing a high adoption of – particularly in small to medium sized businesses (SMBs) – and is therefore facilitating market expansion. SMBs are taking advantage of the ability to turn over system management to an integrator, benefiting from cost savings, continued support and scalability. Integrations Open-platform technology has given rise to the seamless integration of access control systems with other solutions, encouraging market growth by allowing organizations to obtain added functionality from their technology investments. Enterprises can seamlessly converge their access control with surveillance cameras, video management systems (VMS), intrusion platforms and more, enabling them to invest in a solution that can address multiple needs. Added functionality Though access control is primarily used for security purposes, as these systems become more intelligent and capable of engaging with other operations outside of safety, their value increases and therefore leads to market growth. For example, an access control system can integrate with a building management system to lock/ unlock doors for an event, turn on/ off lights or control temperature. Over the next few years, as technology advances further and becomes smarter, we can expect to see these trends continue to push the access control market forward. It’s encouraging to see how far its come and we look forward to embracing new possibilities in an effort to help organizations keep people, assets and property safe.  

Read More

The MOBOTIX Partner Society Conquering New Markets Together

The leading manufacturer of intelligent IP video systems ‘Made in Germany’ is significantly expanding its existing successful partner program with the MOBOTIX Partner Society. Its goal is to develop secure complete solutions based on joint innovations with MOBOTIX partners that expand the MOBOTIX portfolio and open up new markets. With the combined expertise of two or more companies that know what the market needs through working with their customers, MOBOTIX is also able to solve special challenges and close market gaps. As a new platform, the MOBOTIX Partner Society bundles the entire spectrum of individual application solutions and makes them accessible to a wide market. “Thanks to the Partner Society, we are able to offer a unique platform that makes the search for intelligent components that have individual requirements much easier. The new platform creates new connections, generates synergies, and opens up new markets,” explained Thomas Lausten, CEO of MOBOTIX AG. Successful partnerships have long been a core element of MOBOTIX’s DNA. It’s already very successful global partner program is being expanded with the Partner Society, which offers numerous advantages for MOBOTIX, all partner companies, and above all, MOBOTIX customers worldwide. “Our products and solutions very often result in individual solutions for customers that can also be of great interest to other companies, thanks to the expertise and competence of our partners. By means of the Partner Society, we offer a platform through which our partners can distribute these innovations worldwide,” said Hartmut Sprave, CTO of MOBOTIX AG. Technology and solution partners: Integration and innovation with MOBOTIX Two Partner Society programs – technology partners and solution partners – have been created thus far. Technology partners are innovative manufacturers of complementary products who have integrated MOBOTIX in their own products. By cooperating with technology partners, MOBOTIX supports the market and cooperates exclusively with organizations that are leaders in their field. Quality standards that offer the best solutions together with MOBOTIX premium camera technology are therefore put in place. Solution partners are existing MOBOTIX channel partners who have already developed their own intelligent application solutions based on MOBOTIX technology. Demand for individual solutions is incredibly high. To this end, each solution partner has developed special solutions with enormous added value. MOBOTIX offers these companies marketing across the world via the new platform. “The Partner Society is another important step for MOBOTIX in its transformation process from a premium product manufacturer to a full-service provider of cyber secure solutions based on our strong German DNA,” explained CEO Lausten. After the initial successes of the MOBOTIX Partner Society on various markets, he is very confident that this new form of cooperation will be a ground-breaking success story.  

Read More

Business Losses to Cybercrime Data Breaches to Exceed $5 Trillion by 2024

A new report from Juniper Research found that the cost of data breaches will rise from $3 trillion each year to over $5 trillion in 2024, an average annual growth of 11%. This will primarily be driven by increasing fines for data breaches as regulation tightens, as well as a greater proportion of business lost as enterprises become more dependent on the digital realm. The new research, the Future of Cybercrime & Security: Threat Analysis, Impact Assessment & Mitigation Strategies 2019-2024 noted that while the cost per breach will steadily rise in the future, the levels of data disclosed will make headlines but not impact breach costs directly, as most fines and lost business are not directly related to breach sizes. The human element remains key, despite AI advances Cybercrime is increasingly sophisticated; the report anticipates that cybercriminals will use AI which will learn the behaviour of security systems in a similar way to how cybersecurity firms currently employ the technology to detect abnormal behaviour. The research also highlights that the evolution of deep fakes and other AI-based techniques is also likely to play a part in social media cybercrime in the future. In spite of cybersecurity becoming increasingly part of corporate culture, it is not necessarily gaining traction with system users. As a result, Juniper Research expects that security awareness training will become an increasingly important part of enterprise cybersecurity practice. The gains that can be made by increasing human awareness of cybersecurity can make more efficient use of cybersecurity spending, which Juniper Research expects to rise by only 8% per annum in the forecast period. “All businesses need to be aware of the holistic nature of cybercrime, and in turn, act holistically in their mitigation attempts,” remarked Research Author Susan Morrow, “As social engineering continues unabated, the use of human-centric security tactics needs to take hold in enterprise security.” “All businesses need to be aware of the holistic nature of cybercrime, and in turn, act holistically in their mitigation attempts,” remarked Research Author Susan Morrow, “As social engineering continues unabated, the use of human-centric security tactics needs to take hold in enterprise security.”  

Read More

XProtect Corporate Obtains GDPR-ready Certification

Milestone XProtect Corporate 2019 R2 is one of the first major video management software products to obtain a GDPR-ready certification covering all core VMS functions from EuroPriSe. XProtect Corporate 2019 R2 video management software obtains the highly sought-after EuroPriSe (European Privacy Seal) GDPR-ready certification. With the GDPR-ready certification from the independent and recognized institute EuroPriSe, end-users can be confident that they have the right foundation to build a GDPR compliant video surveillance installation. The certification covers all core capabilities of Milestone XProtect Corporate, building on the native XProtect cyber security features. To help system integrators and end-users design, implement and operate GDPR-compliant video management installations, Milestone Systems provides a holistic set of tools including an extensive GDPR privacy guide with ready-to-use templates, as well as privacy awareness training for end-users. “While GDPR is an EU-centric regulation, data privacy is a concern in many parts of the world where we see similar regulations coming into force. GDPR is on par with, or in many cases tougher than these domestic regulations, so the EuroPriSe GDPR-ready certification is of great importance to us. System integrators and end-users can rest assured that they have the right foundation on which to build GDPR-compliant solutions,” says Chief Technology Officer Bjørn Skou Eilertsen, Milestone Systems, “With the continuous technology evolution, video management products have become very powerful, which calls for a responsible use by end-customers. In 2017, Milestone Systems leaders joined more than 150 representatives from tech companies around the world in signing the Copenhagen Letter, a declaration that calls on tech companies to use technology in a responsible, human-centered way. Enabling our customers to protect personal data captured and processed by XProtect VMS systems is a natural extension of this commitment.” The GDPR-ready certification covers Milestone Systems’ top range product XProtect Corporate. The ambition is to certify the entire XProtect VMS product range, to allow all sizes of installations to build their video management installations on a proven GDPR-ready base. Seamless access to test licenses, audio improvements, and increased cyber security Other updates in the new XProtect 2019 R2 release include a simplified process of working with and getting test licenses, as they can now be obtained directly from the Milestone customer dashboard, allowing partners to evaluate, test, and demo XProtect for one year without having to purchase the software upfront. The 2019 R2 release also extends the capability of the existing audio support in the XProtect Web Client by adding support for broadcasting announcements to multiple camera-connected speakers at once, allowing personnel to use the XProtect Web Client to do mass communication when they want to warn a crowd or do promotional announcements. Also, the 2019 R2 release includes enhancements to XProtect Mobile by adding audio support to the innovative video push functionality. With the addition of supporting audio, this completes the solution and allows users to create even stronger documentation of incidents, even as they happen. With the 2019 R2 release, it is possible to manage device passwords per device or per group of devices, directly from the XProtect Management Client. This provides an easier and faster way of securing the device security system and addressing potential vulnerabilities. Milestone Systems is taking yet another step forward in ensuring the best possible end-to-end security of XProtect by removing the ability to generate self-signed certificates in the XProtect mobile server and eliminating the option to use self-signed certificates in the XProtect mobile client. This means that users can rest assured that XProtect mobile complies with the highest security standard in the industry, with support for CA-signed certificates only.  

Read More

BCDVideo Makes to CRN’s 2019 Fast Growth 150 List For Second Straight Year

BCDVideo, the global security industry provider of purpose-built video surveillance recording appliances and infrastructure, has been named to CRN’s 2019 Fast Growth list for the second consecutive year. CRN, a brand of the channel company, bestows this recognition to the top 150 fastest-growing technology solutions providers in North America. BCDVideo, which has experienced an average two-year growth rate of 49.2 percent, currently has more than 95,000 systems recording video in 75 countries and throughout all verticals. Earlier this year, BCDVideo also was named to CRN’s 2019 Solutions Provider 500 list, which is regarded as the industry standard for recognizing the highest-performing technology companies and strategic solution providers. A technology provider since 1999, BCDVideo has always delivered high-availability solutions with a purpose. Now a 10-year veteran in the surveillance market, BCDVideo is generally considered the industry leader in purpose-built video surveillance recording systems and continues to be the only video surveillance system manufacturer in the world that guarantees its calculations, bandwidth capabilities, and performance, removing the mitigation of risk away from the security integrators.  

Read More

IDIS 5Mp Fisheye & Dynamic Privacy Masking Reach psi Premier Award Finals

Two of IDIS’s most popular new video technology launches have been selected for the 2019 PSI Premier Awards. The Direct IP 5MP Super Fisheye Compact camera (DC-Y6513RX), was launched as an extension of IDIS’s best-selling super fisheye range which offers exceptional triple-side dewarping and smart UX controls, allowing for smooth and intuitive panning, tracking, and zooming with ease and accuracy. The popularity of the DC-Y6513RX reflects IDIS’s focus on developing technology that installers and end-users really want, and in this case, a high-specification 360º camera in a compact form. It captures high-definition images in all lighting conditions, without blind spots, and offers the benefits of heat mapping without the hassle and cost of additional appliances or analytics software. Users also have the ability and convenience to de-warp onboard the camera, via client software as well as on mobile devices. Meanwhile IDIS Dynamic Privacy Masking (IDPM), also through to the finals, offers a simple answer to the previously labour-intensive – or prohibitively expensive – problem of de-identification in video footage. Last year GDPR gave the right to any person captured by a video surveillance camera to access a copy of their personal recorded data. Whilst complying with this law companies are also required to protect the identity of any other individuals who feature in the recorded video, with anonymisation and masking. The same de-identification also needs to be applied when providing video clips to the police and courts for use as evidence. Since its launch and its availability as a download from the IDIS partner portal, IDPM has proved popular with small to medium companies – for example, retailers and eating-out chains – who are struggling to manage their recorded video footage. “IDIS Dynamic Privacy Masking has really impressed users since we unveiled it earlier this year as it delivers significant cost and labour savings,” said James Min, Managing Director, IDIS Europe, “We’re delighted that it’s been chosen by security integrators for these important industry awards alongside our 5MP super fisheye which is already popular with our retail, education and healthcare customers.”  

Read More

GJD Sponsors Meltham Golf Professional Jamie Bower

GJD, an award-winning British manufacturer, is sponsoring Meltham Golf Club’s Jamie Bower for 2019 PGA EuroPro Tour. Jamie, born and raised in Huddersfield, turned professional in 2016 after reaching a world-high of Number 12 in the amateur ranks and winning the Brabazon Trophy in the same year. In 2019, Jamie has finished in the top 10 twice in six events and is currently fighting for a top 5 spot that will see him play on the Challenge Tour next season. GJD’s sponsorship will provide financial support to Jamie as he embarks on a quest to progress to the European Tour as a winning professional. Mark Tibbenham, GJD’s Managing Director, commented, “We are really happy to sponsor Jamie. Having shared a round of golf with him, it was clear to see his potential. Being from the local area, it is imperative we help our youngsters achieve their dreams and we hope Jamie benefits from the support provided by GJD.” Jamie also expressed his delight, “The support from GJD will help me greatly during the 2019 season. It also gives me an added impetus to win tournaments and progress onto the Challenge Tour as I know I’ve got the backing of everybody at GJD.”  

Read More