securitylinkindia

Delta TB150 Crash Rated Portable Bollard Stops 15,000 Pound (6,804kg) Vehicle Going 50mph (80.4kph)

Delta Scientific’s new patented crash rated TB150 portable bollard system lets law enforcement and other security providers promptly block access to temporary venues where vehicles can be used as weapons against large numbers of pedestrians. Individual portable bollards provide vehicle barricades in applications such as heavily traveled walkways and roadways, or any area that a vehicle can get through. They can also be used as substitutes until permanent bollard systems get installed. Ten TB150 portable bollards can be linked together with a cable system and placed on a road’s surface to create immediate protection for a span of 40 feet (12.2m). No other installation procedures, excavations or sub-surface preparations are required. Certified testing demonstrates that a TB150 portable bollard will stop and disable a 15,000 pound (6,804kg) vehicle traveling at 50mph (80.4kph), resulting in an ASTM M50, P3 rating. “Being able to stop a massive, high-speed attack vehicle is imperative to protecting crowds enjoying venues such as malls, theme parks, and public fairs,” emphasized David Dickinson, President of Delta Scientific, “The TB150 marks a new standard in crowd protection containing and stopping 1.2 million foot-pounds of attacking truck. The portable bollard array requires no foundation or site preparation and can be used for permanent or temporary vehicle control. The bollards can be set up on any stable surface such as concrete, asphalt, compacted soil or vegetation.” According to Dickinson, the TB150 temporary bollards can be used to close off streets, entrances, or wide expanses such as access to pedestrian areas or even airport runways. They can be installed in conjunction with Delta’s popular MP5000 portable barricade to fill in any gaps to protect people and critical infrastructures at public events such as parades, festivals, sporting weekends and any place that vehicles could attack transitory events. The combination of the portable barriers with the new portable bollards provides fast controlled vehicle access without the time and labor of installation. “From a purchasing standpoint, it can be easier to buy portable bollards and barricades than permanent solutions,” added Dickinson, “The latter are oftentimes placed into an organization’s real assets budget because they are permanently installed into the ground, becoming part of the property. Such budgets can often create complex purchasing scenarios for law enforcement or public safety departments. However, purchasing portable bollards and barricades is no different than buying protective vests for personnel or new sets of wrenches for the maintenance department.”  

Read More

Eagle Eye Networks Enhanced Eagle Eye Cloud VMS

Eagle Eye Networks unveiled enhancements to the Eagle Eye Cloud VMS supporting 15 additional third party mobile and body worn cameras. The Eagle Eye VMS provides simultaneous operations, search, and cloud storage for fixed and mobile cameras. Managing and retrieving body worn camera video have historically been a separate process from the primary video surveillance system. With Eagle Eye, this can now be an integrated and cohesive process that requires less training, and is more secure and reliable. The Eagle Eye mobile and body worn camera system includes: Viewing mobile and fixed camera footage in one cohesive interface eliminating the need for multiple applications. Archiving, storage and retrieval of time-stamped mobile footage with GPS coordinates and tracking. ● Secure sharing of video via mp4 files or via direct links to interested parties. Open platform that provides compatibility with a broad array of cameras. Today, Eagle Eye Networks provides support for over 3,500 mobile and fixed cameras. Access to a true cloud system meaning virtually unlimited scalability, triple redundant data center architecture, full encrypted video, and comprehensive cyber security. Eagle Eye Video API Platform delivers unlimited video analytics from partners. With video stored in the cloud and open API’s, new AI analysis is being continually developed and improved. “It’s been proven repeatedly that open systems architectures win over proprietary systems. Eagle Eye Networks believes in open architecture standards and our platform, Eagle Eye Cloud VMS, demonstrates this. Extending our platform to encompass mobile cameras is a logical extension of our open camera platform. Our open platform ability to integrate third party AI and analytics is delivering on a broad set of applications for our customers,” said Dean Drako, CEO of Eagle Eye Networks. Eagle Eye Networks customers have desired integration of mobile and fixed camera surveillance to reduce risk in commercial industries – in-home services, retail, guarding, commercial delivery services, real estate sales, and other service-oriented verticals. The mobile camera video and GPS data will be securely transferred to the Eagle Eye cloud data center where video footage can be reviewed, analyzed and stored.  

Read More

How can SMBs Protect Their Data in the Cloud?

More and more small to medium sized businesses (SMBs) are using cloud storage. This is due to the huge benefits the cloud brings in terms of productivity and flexibility. However, most SMBs seem to still be suspicious about it. Actually, recent research shows that 61% are convinced that their data is unsafe in the cloud. Why, and what can be done about it? SMBs are worried about their data in the cloud SMBs are afraid to lose visibility and control over their data once they hand it over to a third-party cloud platform. Their first worry is that it’s harder to detect unauthorized access when data can be accessed from anywhere in the world and on any device. On the contrary, when data is stored on-premise, you need to be physically present in the office to access these files. So it creates a natural barrier against unauthorized access from outside the organization. Furthermore, access can be restricted to specific devices only. SMBs also worry about the fact that it’s harder to stop or prevent data theft from the leaving employees. For the same reasons, it is easier to spot an employee stealing data when it’s stored on the physical desktop computer. With cloud storage, it becomes pretty easy for leaving employees to steal information before they go. Finally, hybrid storage environment can be complex. Using a mixture of on-premise and cloud storage increases productivity. Though, managing the security of the data stored across multiple environments becomes very challenging. The attitude regarding cloud storage is not helping According to the same research, a lot of organizations believe their own data is more valuable than that of their clients. This is pretty disturbing to know that third-party and insider breaches are on the rise. Those who operate with large and complex supply chains will be concerned by this mentality given the lack of visibility and control over data security once it lives on third-party systems. Furthermore, as we said previously, organizations using a mixture of on-premises and cloud storage systems are having troubles managing the security of data – either their clients’ or their own.  Besides, almost half of SMBs are convinced that moving to the cloud has harmed their security and 59% assume that the native security of their cloud storage provider is not strong enough to protect their data. Knowing that, it is pretty worrying to see that 80% are only relying on the native security of the cloud storage provider they’re using and only 1 out of 10 organizations is using a third-party cloud file monitoring tool to prevent unauthorised access to sensitive data. SMBs clearly need a more efficient way to ensure their data in the cloud remains safe. Moving your data to the cloud does not reduce an organisation’s need to secure access to and usage of file data. SMBs’ solution to protect their data in the cloud The attitude regarding cloud storage needs to change. Nowadays, a majority of organisations share a big amount of valuable data with their clients over email or in the cloud. Knowing that supply chains attacks are on the rise, it only takes one mistake from one supplier to have your data compromised. Furthermore, most organisations today look into the cybersecurity of their partners before choosing to work with them. It is therefore of great importance that organisations can show that they can keep their clients’ data safe. To be able to protect your data both on-premise and in the cloud, you need to proactively track and audit on all access to files and folders. You need a solution in place that can provide a single consistent view of the security of your files and folders across all your storage servers – whether on-premises or on a third-party cloud system. It needs to be able to report and alert you in real-time to suspicious file activity the moment it occurs. That way, you are sure that if someone other than an authorized employee tries to access your data, you’ll be the first to know about it and therefore you can react quickly before any damage is done. By-  François Amigorena – Founder and CEO     

Read More

Matrix Showcases Innovative Security Solutions at Securexpo, East Africa, 2019

Matrix will participate in Securexpo East Africa during 24-26 September 2019 in Nairobi, Kenya, East Africa. The event is an ideal platform for different industries to network with their peers and showcase latest products. Matrix will showcase their revolutionary technologies in security, access control and time-attendance domains, as well as newly launched face recognition and palm vein reader technology for authentication. Both the devices offer contactless and highly secure solutions with precise and accurate authentication. They are also showcaseing another newly launched product – COSEC ARGO – which brings modern design to the access control market with an enhanced IPS LCD touchscreen for a visually splendid experience, and the gorilla glass providing enhanced toughness. As Mobile is the next generation tech nology in security domain, Matrix will showcase mobile based access control solution whereby a user can either scan QR code, or just twists his/ her phone for security authentication via bluetooth. Mobile application also helps users mark attendance automatically using GPS or Wi-Fi. Matrix will also demonstrate some extraordinary biometric door controllers useful for time-attendance, access control, visitor management, cafeteria management, and many more applications which allow you to generate 300+ customized reports. As the other wing, Matrix will showcase its video management solution SATATYA SAMAS, which addresses threats in a logical and sequential manner through its unique features like CREAM (cognitive responsive engine with automated monitoring). CREAM eliminates false alerts by conducting a multi-stage verification. To address the need for automation in medium, large and multi-location enterprises, they will demonstrate how SATATYA SAMAS can seamlessly automate the parallel working of various systems integrated in an organization. Alongside, they are going to exhibit the recently launched new range of network video recorders that are equipped with characteristics like cascading, camera-wise recording retention, database-level integration and plenty of other distinct features. In addition to this, the new range of IP cameras which sport SONY STARVIS series sensors with EXMOR technology will also be shown. These cameras have an edge over others in terms of exceptional low light performance, consistent image in varying light conditions (true WDR), better bandwidth optimization, and many other features.  

Read More

Soft Target Hardening Named 2019 ASIS Security Industry Book of the Year

Award-winning book by Jennifer Hesterman, Ph.D. offers a comprehensive approach to increasing organizational security in addressing growing criminal, terrorist, and mass-casualty threats and vulnerabilities ASIS International has recently announced that Soft Target Hardening: Protecting People from Attack (Second Edition) by Jennifer Hesterman, Ph.D., was selected as the 2019 ASIS Security Industry Book of the Year. “Increasing instances of active shooter assaults underline a universal truth in security. It is easier to commit crime or terrorism when a facility has minimal security – otherwise known as soft targets. Author Jennifer Hesterman, a retired U.S. Air Force colonel, draws upon her experience securing military assets overseas and applies it to protecting soft targets in the domestic and civilian space,” stated A. Benjamin Mannes, CPP, Chief Compliance Officer for a Philadelphia-based financial firm and member of the ASIS Philadelphia Chapter, “By adopting the principles in this book, readers can take an important first step to recognizing and mitigating threats to their organizations.” The ASIS Security Industry Book of the Year is selected by a panel of ASIS members who review member-authored titles using criteria including relevancy to today’s security threats, importance of the subject in the field, and the uniqueness of the coverage of a new security concept, idea or technology. Runners-up for the 2019 award include Reawakening America: Leadership, Vigilance, and Collaboration (Vincent Bove, CPP), and Workplace Violence: Issues in Threat Management (Christine M. Holbrook, David E. Bixler, Eugene A. Rugala, Carri Casteel). “I am truly humbled by this award. Being recognized for a second time by the world’s leading organization in security management is an honor of a lifetime,” said Dr. Hesterman, “It is my sincere hope that organizations in both the private and public sectors gain new perspectives and knowledge in order to better protect their workplaces, public spaces and other assets.”  

Read More

BOSCH Protects University in Turin with Public Address and Voice Alarm System

With a history dating back to the year 1859, the Polytechnic University of Turin is Italy’s oldest technical university. The expansive historic campus includes landmarks such as Valentino Castle as well as the completely renovated Cittadella Politecnica complex, offering over 170,000 square meters of modern facilities. Attended by over 33,500 students, Politecnico di Torino provides degree courses in the fields of Engineering, Architecture and Industrial Design.Over the past years, the Politecnico saw rapid expansion due to growing demand for degrees in Engineering and related fields. Latest additions to the university include three off-site buildings outside campus areas one and two – the design and sustainable mobility Citadel, plus the newly re-modeled Lingotto building and Fiat manufacturing facility. To ensure the safety of students and staff in these buildings, officials in Turin needed to expand existing safety infrastructure. This proved challenging not only because of the complexity of the architecture and vast distances between buildings, but the additional need to comply with EN54-16 voice evacuation regulations. For this, the Politecnico needed to implement a certified public address and voice alarm system. As a satisfied customer for almost 20 years – the first ever PRAESIDEO system in Italy was installed at the Politecnico in 2001 – the university called on Bosch to secure the new additions with the PRAESIDEO digital public address and voice alarm system. Certified by security standards such as EN 54-16 and ISO 7240-16, PRAESIDEO provides a scalable solution for safety applications spanning several locations including campuses. It handles message routing, emergency voice evacuation, local amplification for lecture halls and other functions on a single platform. The system’s daisy-chain network topology also supports expansions in a flexible and highly scalable manner. The experts needed to accommodate for the complex architecture on campus – a mix of new construction and historic remodels – and integrate the three new locations with the existing Bosch solution. The result is a PRAESIDEO public address and voice alarm solution featuring eight network controllers, 80 basic amplifiers (a variation of 500W, 2x 250W, and 4x 125W amplifiers) and ten call stations. The two PRAESIDEO call stations at the main entrances of campus areas one and two work together with the PRAESIDEO PC call station client software; the other eight PRAESIDEO call stations are distributed among the other campus buildings. From a safety operator’s point of view, this integration provides a big picture perspective of the entire campus and the ability to address a variety of loudspeaker zonesseparately in each building. For clear audio, installers added 1,500 Bosch loudspeakers plus sound projectors that match the interior design of the modern Politecnico campus. All selected loudspeakers are EN 54-24-certified, making the solution fully EN 54-compliant. Inside the facility buildings, the loudspeakers are a mix of water-protected wall mount metal cabinet speakers (LBC3018/0) and LC1 modular ceiling loudspeakers (WM06E8, UM06E8 and UM12E8) for speech and music reproduction. Outdoor campus areas, sheltered or not, are covered by water- and dust-protected horn speakers (LH1-10M10E and LBC3482/00), as well as bidirectional (LP1-BC10E-1) and unidirectional (LP1-UC10E-1) sound projectors. The installed PRAESIDEO network controllers allow staff to manage the public address and voice alarm functions on a centralized platform. In emergencies, the system supports voice evacu ations. The efficient evacuation starts with occupants closest to the threat – addressed by pre-recorded voice messages – then moves on to adjacent floors and areas. The voice evacuation instructions achieve time savings of up to 30 percent for emergency responders. Having passed inspection in early 2019, the PRAESIDEO solution safeguards the campus expansion in Turin with a fully EN 54-certified safety solution. “We are very happy with the system, especially thinking about the complexity of the university and its expansion,” said Andrea Carbonatto, Facility and Security Manager at Politecnico di Torino. As a fully scalable, upgradable and expandable system, the Bosch solution is ready to accommodate the university’s future growth and has proven an important reference project in Turin and beyond.  

Read More

HID Global Announces Support for Student IDs in Apple Wallet

HID Global® has recently announced support for Seos® enabled student IDs in Apple Wallet. Beginning this fall, students, faculty and staff at Clemson University will be able to add their IDs to Apple Wallet and use their iPhone and Apple Watch to access buildings on campus, purchase meals and much more. “HID Global is excited to play an important role in creating transformative connected university experiences that make it easy for students to simply use their iPhone or Apple Watch to enjoy all that daily campus life has to offer,” said Stefan Widing, President and CEO with HID Global, “HID’s broad range of technology and electronic locks from our parent company ASSA ABLOY are helping Clemson University students, faculty and staff take full advantage of convenient mobility applications. This fall, their Apple devices can be used for everything from entering buildings – such as residence halls and individual rooms – to buying meals, accessing the gym, and using secure print services and numerous other university resources.” To support student IDs in Apple Wallet on iPhone and Apple Watch, HID provides Seos-enabled credentials, HID iCLASS SE® and HID OMNIKEY® readers, embedded HID iCLASS SE reader modules, and Corbin Russwin and SARGENT® electronic locks from ASSA ABLOY. Through HID’s support of student IDs in Apple Wallet, Clemson students will be able to seamlessly access residence halls, libraries and fitness centers, buy lunch, make purchases at the university store, print documents and more by placing their iPhone or Apple Watch near a reader where contactless student ID cards are accepted. Contactless student IDs are supported on iPhone 6 and later, and iPhone SE. On iPhone XS, iPhone XS Max, and iPhone XR, student IDs may still be used for up to five hours in power reserve mode when the iPhone battery needs to be charged. Student IDs in Apple Wallet are not only convenient, they also provide an extra level of security as students no longer have to worry about misplacing their physical card. School credential provisioning is protected by two factor authentication.  

Read More

Elbit’s Subsidiary Selected to Supply a Cyber Intelligence System to Dutch Police

Following an extensive and competitive evaluation process Cyber Intelligence Ltd, a subsidiary of Elbit Systems, was selected to provide the Dutch National Police with a cyber intelligence system. Part of Elbit Systems’ Intelligence 360 suite of cyber capabilities, the solution to be supplied is designed to provide high-availability and scalability and enable customization with work-flow, legislation and other custom requirements of the Dutch National Police. Haim Delmar, General Manager of Elbit Systems C4I & Cyber, commented, “The Netherlands continues to be an important market for us and we are proud to be in a position to contribute to national security and public safety. I believe that our operational experience and technological edge enable us to offer superior solutions to our customers and partners.”  

Read More

Senstar LM100 Helps US Electrical Utility Company Simplify Security

Senstar, a world leading provider of perimeter intrusion detection systems and video management solutions, has published a case study detailing how the Senstar LM100 hybrid perimeter intrusion detection and intelligent lighting system is simplifying security for a US electrical utility company. For many years the utility company has integrated its perimeter intrusion detection and lighting systems. Recently the company has begun installing the Senstar LM100 which provides detection and lighting in one product, and saves them over $80,000 per site. The savings are a result of the reduction of electrical requirements, conduit, grounding and associated labor, as well as the removal of certain equipment from project scope that are required for the two-system integration. “The LM100 combines all of the functions the two systems provide and it saves us a lot of money,” said the utility company’s security administrator, “It is also simpler to integrate and has better functionality.” The Senstar LM100’s perimeter LED-based lighting acts as an initial deterrent. If an intruder persists and an attempt to cut, climb or otherwise break through the fence is detected, the closest luminaire begins to strobe and an alert is sent via a security management system. The intruder knows immediately they have been detected and that their exact location is known by security and others in the vicinity. The Senstar LM100 is now installed at three of the utility company’s sites, with an additional 43 other sites planned.  

Read More

Videonetics Launches Industrial Security & Safety Solution

Videonetics, the world leading visual computing platform development company, has launched one of the world’s first safety and security solutions for safer workforce, safer workplace and industrial township monitoring, powered by its patented DeeperLook™ – artificial intelligence and deep learning platform for critical infrastructure, heavy industries, manufacturing plants, factories, construction sites, and warehouses etc. Indigenously developed on AI & DL DeeperLook™ platform, Videonetics industrial solution is designed with emphasis on preventive security, centralized visibility, along with efficiently complying to occupational safety and health (OSH) and safety, health and environment (SHE) standard. The industrial security and safety solution ensures safer workforce and workplace, and helps optimize business operations. As per the International Labour Organization (ILO), nearly 2.8 million workers die each year from occupational hazards and work-related diseases. An additional 374 million workers suffer from non-fatal occupational accidents. The workdays lost because of accidents cost as much as 4% of the world’s GDP. Apart from the OSH related concerns, organizations are facing other challenges such as violence, terrorism, worker agitations, disgruntled employees, theft and pilferage. It is the moral and legal responsibility of businesses to provide safe and secure workplaces. The solution suite includes personal protection equipment (PPE) detection such as safety helmets, safety jackets/ aprons, safety glasses, safety boots etc. It has manifold applications such as production/ manufacturing floor area monitoring, worker behavior monitoring, person slip & fall detection, oil/ water spillage detection, worker head count and zone monitoring, person occupancy and heat-map, fire & smoke detection, graffiti and vandalism detection, property cleanliness detection and garbage management, crowd formation detection, perimeter protection, object classification, theft & pilferage detection, movement of fork lifts or other machinery inside shop floors, vehicle entry-exit monitoring using ANPR for effective gate management, vehicle movement inside plant area monitoring using ANPR, parking zone monitoring, and speed detection, facial recognition, employee management etc., to name a few. There are many other use cases which can be developed to meet specific needs of an industry vertical. The solution also supports open framework for integration with 3rd party systems such as SCADA, IBMS, HRMS, ERP, emergency evacuation systems, fire alarm and access control systems etc. The platform can also integrate and communicate with external law enforcement and emergency service management systems like Dial 100, 102, medical services etc. Expressing on the launch, Dr. Tinku Acharya, Fellow IEEE, Founder & MD stated, “I am proud to announce that Videonetics is the first company to introduce end-to-end AI & DL powered safety & security solution for industries. Field-proven and tested with real-time video data of varied environments, our solutions are well competent to solve industry’s day-to-day challenges as well as address critical needs such as mitigating safety and security risks, improving work environment, reducing production loss and improving profitability, improving workers/ employees occupational safety, creating situational awareness, maintaining business continuity, and optimizing operations for organizations, assets and infrastructure.  

Read More