securitylinkindia

Fujitsu Strengthens Cyber-Security with AI Technology to Protect Against Deception Attacks

Fujitsu Laboratories Ltd. recently announced the development of a technology to make AI models more robust against deception attacks. The technology protects against attempts to use forged attack data to trick AI models into making a deliberate misjudgment when AI is used for sequential data consisting of multiple elements. With the use of AI technologies progressing in various fields in recent years, the risk of attacks that intentionally interfere with AI’s ability to make correct judgements represents a source of growing concern. Many suitable conventional security resistance enhancement technologies exist for media data like images and sound. Their application to sequential data such as communication logs and service usage history remains insufficient, however, because of the challenges posed by preparing simulated attack data and the loss of accuracy. To overcome these challenges, Fujitsu has developed a robustness enhancement technology for AI models applicable to sequential data. This technology automatically generates a large amount of data simulating an attack and combines it with the original training data set to improve resistance to potential deception attacks while maintaining the accuracy of judgment. By applying this technology to an AI model developed by Fujitsu to judge the necessity of countermeasures against cyber-attacks, it was confirmed that misjudgment of about 88% can be prevented in our own attack test data. Details of this technology was announced at the Computer Security Symposium 2020 held from October 26 (Monday) to October 29 (Thursday). Background I n recent years, AI has been increasingly used to analyze a vast range of data in fields as varied as medicine, social infrastructure, and agriculture. Nevertheless, the existence of security threats peculiar to AI represent a growing threat. Examples include attaching small stickers to road signs to confuse recognition systems, and intentionally trying to trick AI models with slightly changed attack data in order to prevent correct judgment. To help avoid these types of threats, an adversarial training technique has emerged in which simulated attack data created in advance is added to training data so that the AI model is not fooled when it encounters malicious actors. Previous technologies remain insufficient for dealing with the challenges posed by sequential data, however. AI has a wide range of applications for this type of data, including for detection of cyber-attacks and credit card fraud, and so a growing need exists to develop technologies that can be applied to sequential data to strengthen resistance against deception attacks. Issues One way that cyber-attacks can be detected is through the analysis of communication log data. For instance, when an attacker logs in from the first terminal to another terminal, executes written malware, and performs a series of attack operations to spread infection, an AI model can detect the attack from the communication log of such operations. However, attackers disguise attacks by mixing them between legitimate administrative operations, such as collecting server logs or applying patches, which can lead to false negatives in the AI detection model. In order to apply the adversarial training techniques to such series of data, it is necessary to automatically generate a large amount of data simulating a deception attack as training data. In the case of media data such as images, it is possible to generate simulated attack data easily without damaging the characteristics of the original data by processing the data in units of pixels that cannot be discriminated by humans. However, in the case of sequential data, it is not clear which element affects the characteristics of the original data, so if you simply process a part of the data, the characteristics of the original data may be lost (Figure 1). For example, the communication log data used to detect a cyber-attack is a series of log lines consisting of various elements such as the source of communication, the destination of communication, the account used, the execution command, and the command arguments. In addition, even if simulated attack data can be generated, when it’s used to train AI, it is necessary to be careful not to decrease the judgment accuracy for the original attack data. Newly Developed Technology Fujitsu has developed a technology that can automatically generate simulated attack data for training, which can be applied to AI models that analyze sequential data and enable training with less deterioration in the accuracy of attack detection. The features of the developed technology are as follows: Automatic generation of simulated attack data When creating simulated attack data, we first prepare the original attack data as a base and the data used for impersonation. In the case of cyber-attacks, the attacker wants to disguise malicious operations as benign operations, so the base data is the communication log data of the malicious operation, and the data used for the disguise is the communication log data of the benign operation. Next, the communication log data of benign operations used for the impersonation is analyzed by the AI model before the countermeasure, and the data with the impersonation effect which is easy to be judged as the benign operation is extracted referring to the result. This extracted data is combined with the communication log data of the base malicious operation, and it is generated as simulated attack data. Since the communication log data of the base malicious operation remains unchanged, a large amount of simulated attack data can be generated automatically without losing its original characteristics (Figure 2). Ensemble adversarial training techniques Using the original learning data set and the simulated attack data set generated with the new technique described above, two kinds of AI models are constructed – an AI model which works accurately for the original learning data and an AI model which works accurately for deception attack data (Figure 3) and the decision results of the two AI models are integrated by ensemble learning using features indicative of possible deception attack data. In the case a cyber-attack is detected, it becomes possible to use ensemble learning to automatically and appropriately train AI models to decide which AI model’s decision should be…

Read More

Honeywell Introduces Virtual Reality-Based Simulator to Optimize Training for Industrial Workers

Honeywell recently introduced an advanced industrial training solution that combines 3D immersive technology with industry-leading operator training simulation to create a collaborative learning environment for plant operators and field technicians. Honeywell’s Immersive Field Simulator is a virtual reality (VR) and mixed reality-based training tool that incorporates a digital twin of the physical plant to provide targeted, on-demand, skill-based training for workers. “Faced with increasingly complex technology and an experienced workforce nearing retirement, operators need robust technical training and development solutions that accurately depict real-world environments,” said Pramesh Maheshwari, Vice President and General Manager, Lifecycle Solutions and Services, Honeywell Process Solutions, “Traditional training approaches often fail to meet the mark when it comes to helping panel and field operators and maintenance technicians in process plants become better at their jobs. The result can be reliability issues and increased operational incidents.” The Immersive Field Simulator offers a smooth, virtual walk-through to familiarize workers with the plant. It includes avatars that represent virtual team members. The simulator’s cloud-hosted, device-agnostic platform, which incorporates flexible 3D models, grows with the user as plant operations change. The simulator is customizable to meet specific instructional needs and project team members and plant subject matter experts can easily create customized training modules. Honeywell’s Immersive Field Simulator transforms training for today’s digital-native workforce, enabling employees to learn by doing while increasing knowledge retention, minimizing situations that can result in operational downtime improving competencies across a variety of areas. “With our end-to-end solution, console and field operators can practice different operating and safety scenarios, including rare but critical situations, in a safe, simulated environment,” said Maheshwari, “This approach significantly improves upon current training tools and methods. VR-based training boosts confidence and retention while improving overall professional skills. Experience shows that students using VR can learn significantly faster than in the classroom.” Honeywell’s Competency Management program, which includes the simulator training, is built upon decades of workers’ experiences using integrated control and safety systems. Honeywell has incorporated this experience into state-of-the-art competency-based offerings that improve worker performance and safety.  

Read More

Rising to Meet the INTERPOL Digital Security Challenge

Imagine that a well-known company has been hit by a cyberattack – criminals have conducted a business email compromise (BEC) scam against the company, compromising the email of the CEO to trick an employee into making a payment of USD 100 million to an account controlled by the criminals. Now imagine you are a police officer working at the INTERPOL National Central Bureau (NCB) in your country, and you are asked to work with cybercrime investigators as well as other digital forensics examiners around the world to investigate the incident. Although this is a fictional scenario, BEC fraud is a very real crime threat which police worldwide face on an increasingly regular basis. Real-world investigation This BEC scam was the premise of the fourth INTERPOL Digital Security Challenge – where teams of experts pool their knowledge and expertise in a race against the clock to investigate a simulated real-world cybercrime incident and gather evidence to identify the perpetrators. For the first time, the event was held virtually due to the COVID-19 pandemic. During the challenge, the 100 participating cybercrime and digital forensics experts from 50 countries had to analyse infected computers and contents of the BEC email messages received by the fictional company to uncover evidence of the malware used and the email servers which had been compromised. After linking the malware to a command and control (C2) server, the teams identified clues that would help narrow down the whereabouts of the cybercriminals and takedown the server. Adding an additional layer to the scenario, the criminals filmed the police takedown using drones and compromised the personal details of the officers involved. But one of the drones was captured, so the teams conducted digital forensic examinations to gather data from the device which identified the criminals’ location. A computer seized at this location was also analysed for further information on the cybercriminals’ activities. Craig Jones, INTERPOL’s Director of Cybercrime, underscored the importance of providing hands-on experience in using the latest techniques and technological tools for investigating cybercrime. “In the ever-changing world of cybercrime, theoretical knowledge is only one component of a successful investigation,” said Mr Jones. “Practical exercises like the Digital Security Challenge, which replicate the situations investigators will face in the real world, are great opportunities to gain the critical technical capabilities necessary to follow the digital trails left by cybercriminals,” concluded Mr Jones. Cybercrime investigations are becoming more and more complex and operational exercises such as the Digital Security Challenge, which simulate some of the hurdles that investigators face every day, are vital for the development of our capacities. Public-private partnership The five-day (12-16 October) event was organized in close collaboration with private industry partners NEC Corporation and Cyber Defence Institute. Throughout the simulated investigation, virtual training sessions were conducted to develop participants’ practical knowledge on relevant topics including malware analysis, drone forensics and BEC fraud. For the first time, NEC and Cyber Defense Institute joined the Challenge. Isao Okada, General Manager said, “We strongly believe this kind of event can help attendees gain the technical capabilities required to fight the latest cyber crimes.” First held in 2016, the Digital Security Challenge helps police worldwide develop the skills necessary to tackle the latest cybercrime threats. Previous editions simulated cyber blackmail involving Bitcoin, a ransomware attack, and the hacking of ‘Internet of Things,’ or IoT, devices.  

Read More

People Do People Things: The Future of Security is Human

As 2020 comes to an end, the importance of understanding the relationship between humans and technology is at an all-time high. Widespread shifts in the fabric of our society, prompted by the ongoing pandemic, exposed weaknesses in security tools and protocols for remote workers, highlighted issues of network reliability and accessibility, and demanded that humans find innovative ways to keep organizations running. While the fallout from the pandemic is unignorable, the ability for people to respond to seemingly endless challenges has been nothing short of remarkable. The year 2021 will continue to reflect human resilience and ingenuity. It will be the year of workarounds and self-serving insider threats, where people find ways to accomplish their goals despite dealing with personal and professional adversity. Workarounds, shortcuts, and creative work strategies are simultaneously a celebration of human creativity and a risk for organizations who are desperately trying to maintain visibility of their assets. Ultimately, people sharing data and accessing corporate networks in new and potentially unsanctioned ways carries quite a bit of risk – especially for organizations that are new to managing remote workers. The result of these changes is that successful cybersecurity strategies will stop trying to use technology as a unilateral force to control human behavior. Rather, organizations will come to terms with the reality that adding more and more technology or security does not lead to behavioral conformity, especially not conformity that aligns with security principles and adequate cyber hygiene. In fact, additional layers of security may push more people outside of the guiderails due to increasingly aggravating security friction that blocks them from completing tasks or easily accessing critical organizational assets. Understanding precedes predicting In light of this, understanding how people adapt to, respond to, and inform their environments is critical for organizations heading into the new year. For far too long, the tech world has created products with the assumption that people will use them in an expected or uniform way, or that people would conform to the rules and constraints laid out by well-meaning engineering teams. If we’ve learned anything from 2020, it is that people are not always predictable, and making assumptions about human behavior is a dangerous game to play. What’s surfaced is that expectations, guidelines, best practices, and even commands will yield every type of behavioral response – from rigid compliance to retaliatory noncompliance. What can we do? We can learn more about what motivates behavior, and how people ultimately choose to behave. We can also commit to designing and implementing security practices and tools that work with humans instead of against them. To do this, however, we have to focus on measuring and understanding behavior instead of focusing exclusively on detecting compromises and vulnerabilities. For instance, we know that people’s immediate needs often outweigh potential negative consequences – especially when the consequences do not have a direct, individual, and immediate impact. This means that when we need to accomplish our goals we often take the easiest route. Unfortunately, the easiest route is often riskier than the ‘ideal’ route. When faced with frustrating, security-heavy file and data sharing tools, we may turn to sharing via personal cloud applications. Making rules to stop people from engaging in this type of behavior is not working – so rather, we have to better understand these behaviors to find ways to mitigate their risk to organizations and organizational assets. Building behavioral understanding into systems Within the cybersecurity industry, observing and understanding behaviors must come with context. What may appear at first glance like an obviously malicious act likely to lead to data loss – for example an engineer requesting access to multiple sensitive data repositories over the course of two days – could simply be a person getting their job done. Our engineer may be doing this because she’s been added to several new projects and needs to be able to collaborate with her new team. We want people to be able to do their jobs within the constraints of our corporate network and policies, so blocking them would only encourage the human tendency to find an easier (and less secure) route for getting their jobs done. With an interdisciplinary research team, pulling experts from security, counter-intelligence, IT, and behavioral sciences together, behavioral understanding can be built into cybersecurity systems. And this is the first important step for finally starting to move cybersecurity left of breach – designing security for the human element.  

Read More

Improved Alarm Accuracy with AcuSense Technology It Makes You Feel Safer

Video surveillance has evolved from a simple requirement for clear images to video content analysis (VCA) for improved management. Now, with deep learning, security solutions are enabled with sophisticated intelligence and efficiency at a whole new level. Prama Hikvision’s AcuSense is newly born out of this, which makes advanced VCA and deep learning capabilities available to small and medium businesses, and residential customers for the first time. Small and medium businesses have many of the same surveillance and security requirements as larger organizations. They need to identify and react to perimeter breaches in real time, and they need to automate footage searches to fast locate true events. Another example could be the security and protection for your residential area. Why you need accurate alarms? I magine, when you need to look into the security of your house, the first line you probably would consider is its perimeter. The idea is to prevent intruders from breaking in. However, conventional surveillance system may not do the job well enough. Why? Conventional surveillance systems provide certain detection features enabled by video content analysis (VCA) such as motion detection, line-crossing detection and intrusion detection, but they would simply compound all event detections, triggering frequent alarms when an object is detected. This could be an animal, a shadow, or other natural movements – we call them false alarms. As a result, you need to spend time to investigate each one, potentially delaying any necessary response and generally affecting efficiency. So being able to identify the real threats – the presence of a human or a vehicle – would greatly improve the accuracy of perimeter VCA functions. Prama Hikvision’s hassle-free AcuSense technology can help achieve this goal, and give you a cost-effective way to protect your locations and assets. Enhanced alarm accuracy saves time and worries Employed with advanced VCA and deep learning algorithms, Prama Hikvision AcuSense helps you maximize security with efficient human and vehicle detection by categorizing alarm information into human, vehicle, and other objects. With high accuracy, the system disregards alarms triggered by other objects such as rain or leaves, and delivers alarms that are associated with human or vehicle detection. With Prama Hikvision’s AcuSense, you also get a ‘quick target search’ feature that allows security personnel or local police to find footage quickly in the event of a security incident. This saves many hours rather than searching for footage manually. Efficient alerts and video clips help you in the know Now re-imagine your perimeter security system armed with Prama Hikvision’s AcuSense technology. Video surveillance is in operation when an intruder tries to sneak on a windy and rainy day. The intruder probably thought such bad weather would do him a favor, as there are no witnesses near your house. But this is not the case. The security camera incorporated with AcuSense precisely captures the intruder entering your front yard. At the same time, you receive a message on your smartphone and view the video feeds. With this verified alarm, action can be taken straight away. Prama Hikvision’s AcuSense prevents problems before they escalate into would-be emergencies. Our fully-integrated video surveillance makes it easy for you to see and capture important activity with video alerts, live feeds and 24/7 digital video recording – all easily viewed from your Hik-Connect app. Prama Hikvision AcuSense key features False alarm reduction: Reduces false alarms triggered by inanimate objects to a minimum, vastly improves alarm efficiency and saving costs; Quick target search: More efficient and effective file searching based on human and vehicle classification, preventing security personnel from having to search through footage manually; Strobe light and audio alarm: Wards off potential intruders by combing siren with flashing light. Prama Hikvision’s AcuSense technology can be found in our EasyIP and Turbo HD product ranges, which provide the ideal security solutions for small factories, residential estate and villas, small hotels, and gas stations, indoor and outdoor, to name a few.  

Read More

Challenges and Solutions to Managing a Fire Detection System in a Hospital

There are over 1200 NHS hospitals across the UK, spread across 223 NHS trusts, ranging in age and complexity. Very few of them are single stand-alone buildings, instead the sites usually represent complicated infrastructure networks, that have grown and developed over a few decades. This in turn increases the complexity of the fire detection system across the whole site. The challenges in managing fire detection system in such structures can be associated with:   Cost of ownership: Management of aging system and replacement components availability. Contracts locked to a single supplier of the fire protection services. Structural challenges: Management of different detection systems within one hospital. Management of works and renovations in the hospital, while ensuring uninterrupted fire safety. Protection of temporary structures. Maintenance of challenging wards that do not allow for interruption of services. Management of full or partial fire system upgrades. Evacuation and fire strategy: Buildings cannot be fully evacuated. Complex fire safety strategies employed. Fire spread information is routinely used. System performance issues within specific environments: False alarms. HPV cleaning. COVID-19 nebulising spray. Contingency wards protection. Cost of ownership Many of the challenges associated with the management of an aging system and immutable maintenance contracts could quite often have been avoided if the new sites were delivered with consideration for future building evolution, system lifecycle and the total cost of ownership. Fire detection equipment is generally expected to last 10 years (FIA guidance on the life expectancy of a fire detection & alarm system issue 1). However, the same equipment will often remain in place for up to 25 years. In a national survey carried out with healthcare fire officers, 50% of respondents described their system as between 10-20 years old, with a further 13% saying it was over 20 years old. Old systems tend to be difficult to manage due to reduced system reliability. Varied faults can cause false alarms and unnecessary disruption to hospital operation, and this can result in fines. The biggest issues come when the system cannot be maintained any longer due to component obsolescence or due to becoming unsupported by the manufacturer. A system renovation often only replaces sections of the system. Equipment such as detector heads and the control panel are likely to be replaced only if proven to be troublesome or prone to false alarms. Ideally the fire detection system will have forward and backwards compatibility meaning that a modern control panel can replace the ageing one without changing the detectors and modern higher reliability detectors can be used in the current control panel to address false alarms. Thus, areas of the system can be updated and will work seamlessly with the original system. This gives the ability to manage specific issues and to be able to renovate the system in phases, spreading the cost and minimising disruption. It also ensures that even if some components have been made obsolete, there is a modern replacement available, that will work reliably on the old infrastructure. Otherwise, it is possible that the whole system will require a full and immediate overhaul due to an unforeseen component obsolescence or non-compliance. The cost and complexity of renovation itself can vary dramatically depending on the type of system installed. Some NHS sites in the past have experienced very high cost of ownership for closed protocol systems. Closed protocol can be described as a system where only a single supplier of installation and maintenance services is authorised to work with the fire system. The ownership of systems like this means that the building owner is locked into a contract and the only way out is a full system replacement. The cost of replacement usually deters end users from changing a manufacturer and therefore they usually don’t have a choice but to carry on managing a system that is expensive to run and limited in choice of service suppliers. By avoiding closed protocol solutions, a competitive tendering process can be encouraged between different fire protection service providers. A fire system that allows the customer to choose between any qualified engineer to service/ install a system is known as Open Protocol. The original cost for these systems can be higher than the closed alternative, but once the total cost of ownership is considered, over the lifetime of a system, open protocol solutions tend to be more cost effective and flexible, allowing the building owner to choose between service providers that suits their requirements and quite often between control panel manufacturers. The total cost of ownership is often overlooked due to differences in managing capital and operational expenditure within NHS trusts, nevertheless, it is paramount to ensuring the best system is chosen for the building and is future-proofed, as well as the best possible financial outcome for the NHS. Structural challenges There are usually a number of construction and renovation works happening across a hospital complex at any one time, which often creates additional challenges for the fire system. Any works being carried out must be done without any downtime and minimal disruption as hospitals are operational 24 hours a day 365 days a year. Contractors can create copious amounts of dust that can set off smoke detectors, causing false alarms. This combined with maintenance work being carried out at night can cause a headache for healthcare estates staff as personnel must be called out of hours to correct it. One option to prevent these false alarms while ensuring fire safety is to temporarily replace smoke detectors for heat detectors in the area being worked in. Heat detectors or CO/ heat detectors are not prone to contamination and therefore are less likely to falsely activate due to dust. It is important to consider that smoke detectors’ coverage area is larger than a heat detectors and therefore a point for point replacement will result in a loss of coverage. Another option is to use a multisensor with multiple modes of sensitivity such as Apollo Soteria, this detector is much more resilient to false alarms due to its advanced chamber…

Read More

Olymbec Chooses Hanwha to Secure its Properties and Improve Rentability

Olymbec, one of the largest, privately owned industrial real estate holders on the East Coast has chosen Hanwha cameras to help secure its properties and improve rentability. Managing upwards of 300 properties in Quebec and 15 different States in the US, Olymbec owns more than 30 million square feet of property. Managing this much real estate means that Olymbec has to balance a variety of concerns, including providing positive tenant experiences, generating revenue, and protecting assets. When it comes to security, the company is faced with everything from accidental damage and theft to vandalism and refuse dumping both inside and outside their buildings. However, Olymbec’s existing analog-based camera systems were not meeting the company’s needs. After looking at a number of different options, the company chose Hanwha Techwin because of the range of products, the modularity of the solutions the excellent training and customer support, and the cost, which allows Olymbec to add components easily. Today, Olymbec has deployed over 700 operational cameras and carries stock for both replacement purposes and new systems. The deployed cameras are connected to either a Wisenet WAVE VMS system in their larger installations or to NVRs in their smaller installations. Through their VPN, everyone at Olymbec, from the CTO to security personnel and property managers, can access video footage from every security camera remotely from their phones and tablets. This allows them to view footage from anywhere at any time and gives them the flexibility to react quickly and appropriately when an incident occurs. Hanwha cameras have the capability to trigger alerts and alert security personnel, based on a variety of rules such as detecting motion after hours. The company has spent ¾ of a million dollars on equipment from Hanwha to deploy its new security infrastructure. The result is a robust, homogenous environment that makes it easy to manage and add new camera systems to its properties. The cameras are used as a deterrent or after-the-fact for investigative purposes. This means that Olymbec relies heavily on the quality of the video feed. To capture the best possible video, Olymbec decided to go with multi-sensor, multi-directional cameras, which are deployed across the company’s properties allowing them to cover a very wide area with just a single device. The multi-sensor cameras also work very well when it is time to pull footage. This is especially helpful because Olymbec’s security department receives video requests from law enforcement 4-5 times each month. “Using our new security system, we are able to ensure the integrity of our video evidence. This is important when local law enforcement asks us for footage to help with an investigation,” said Jack Ross, Chief Technology Officer, Olymbec USA & Canada. Olymbec remains enthusiastic about their decision to install Hanwha cameras. “It was important for us to choose a platform that is both complex enough to meet our needs and reliable enough to set up and simply let run. When it comes to reliability, as well as flexibility and ease-of-use, I think Hanwha really shines,” concluded Ross.  

Read More

Gazprom Arena St. Petersburg

Since its completion in 2017, the Gazprom Arena has served as the home ground stadium for the Russian football club Zenit St. Petersburg. And as one of the host stadiums for the 2018 FIFA World Cup and the 2021 Euro Football Championship, the Gazprom Arena must also satisfy the strict security regulations of FIFA, UEFA and ESSMA. When selecting the video security system, the managers responsible at Zenit therefore opted for a solution from the German manufacturer Dallmeier. With its patented Panomera® multifocal-sensor system, Dallmeier guarantees the security of many stadiums all over the world The objective was providing coverage with video security technology for the entire area surrounding the stadium, the entrance gate approaches, the rooms below grand stands, and the grand stands themselves in one of the largest video security projects ever undertaken in a football stadium. Under enormous time pressure, a high-performance system had to be implemented in the stadium with a capacity of 60,000 fans and yet had to remain adaptable and flexible in response to changing customer wishes as the project progressed. Traceability of offenders through minimum resolution throughout the terrace area One requirement which from time to time presented the greatest challenge was capturing all areas of all the grand stands all of the time, so that unequivocal identification offenders could be assured in all circumstances. In order to achieve this, the Russian Interior Ministry stipulated two key requirements for the video security system. Firstly, it must capture the entire grand stand area with a ‘minimum resolution density’ of 250 pixels per metre (px/m). This also corresponds to the performance criterion defined in the globally valid standard DIN EN 62676-4 for video security systems for purposes of enabling identification of an unknown person. And secondly, the image frequency must not fall below a frame rate of 25 frames per second (fps). Because it is typically only the combination of the specified minimum resolution density and a fluid representation of events that can ensure incontestable evidence that is usable in a court of law. Thanks to Panomera®: The stadium solution from Dallmeier satisfies all criteria In order to meet these stringent requirements, the security managers invited a number of vendors to present their solutions in advance at Zenit’s former home ground – the Petrovsky Stadium – to enable them to choose the right solution for the Gazprom Arena. A Dallmeier video security system has already been operating in the Petrovsky Stadium since 2012, and after a thorough evaluation of all the solutions, the operators decided to install a stadium solution from Dallmeier in the Gazprom Arena as well. Because compared with conventional camera technologies such as megapixel or PTZ cameras for example, the patented Panomera® multifocal-sensor system from Dallmeier can guarantee coverage of even the largest expanses with the stipulated minimum resolution density and frame rate. Panomera® systems continuously capture everything that is happening in full resolution and allow high-resolution zooms – both live and in the recording and by several operators at the same time. This enables stadium operators to track and reconstruct relevant occurrences in detail both live and after the fact. Dallmeier’s 3D planning guarantees the objective will be met with maximum cost efficiency Besides the technical superiority of the Panomera® technologies, another decisive advantage of the Dallmeier stadium solution was the innovative 3D planning approach, with which a digital reproduction of the Gazprom Arena was created. This makes it very easy to fulfil the requirement according to which at least 250px/m must be assured literally ‘in every last corner.’ Colour coding in the 3D simulation makes it possible to see exactly where the value has been reached and where a correction should be made, perhaps by setting up in another position or using a different camera model. A further major advantage of this planning approach is the extreme co-efficiency of the solution. For example, Zenit St. Petersburg is able to provide security on the terraces throughout the Gazprom Arena with way less than 100 Panomera® camera systems, covering all areas with at least 250px/m and 25fps. An alternative solution would have required a substantial four figure number of conventional single-sensor cameras. Apart from enormously high infrastructure costs (masts, cables etc.) this would also have generated a practically unmanageable deluge of images for the video system operators. Another benefit of Dallmeier’s 3D planning programme is the automatic generation of ‘CamCards’ – exact configuration documents for every single camera. Armed with this information, installers on site know exactly which camera must be mounted where, how high and at what angle. The big advantage besides the immense amount of time saved consists in the planning reliability. It can be predicted with great accuracy how much labour the installation of the total solution with entail, because this approach minimises uncertainty factors. Thanks to Dallmeier’s unwavering assistance throughout the project, testing by the state technical personnel in Russia was also successful in the subsequent project phases, with the result that the stadium operators were able to begin operating the video security system after final project commissioning in good time for the 2018 FIFA World Cup. Today, over 1,000 single-sensor cameras have been installed in the Gazprom Arena in addition to the Panomera® systems – these safeguard the remaining areas of the stadium. Due to the large number of cameras, the total storage capacity for the video security system amounts to more than six petabytes (equivalent to about 6,000TB). High-performance recording appliances from Dallmeier are used to process this information. Authorised personnel from various departments and stakeholders can access the system at 80 workstations. The Gazprom Arena is a thoroughly secure stadium – also thanks to Dallmeier The video security system from Dallmeier has provided ample evidence of its performance capabilities and reliability in the running of the Gazprom Arena, not least during the seven matches of the 2018 FIFA World Cup. On this subject, Karlheinz Biersack, Director Sales Eastern Europe/ RUS/ GUS at Dallmeier explained, “Of course we were delighted that the security managers of…

Read More

Reliable Bosch Systems give Naresuan University a Sense of Safety and Security

Naresuan University is a government university located in Phitsanulok province. It was established in 1990 following the upgrading of Srinakharinwirot University. Naresuan University is today the primary choice for education in the lower north and upper central areas of Thailand. Its campus is centred around a newly built four-storey university library and also features a newly built eight-storey multi-purpose domed building (the NU Dome), which caters to indoor sports competitions, graduation ceremonies and is home to a fabric museum, the student affairs division and various student clubs. The renovated Faculty of Medicine building housing Naresuan University Hospital is also on campus. With these new builds and renovations, the University needed to consider new fire alarm, video surveillance and conference systems to ensure the security and safety of its students and faculty on campus. A fire alarm fit for purpose Reviewing the fire alarm system that had been installed in the Faculty of Medicine, the building auditor had concluded that the previous system was not compliant to fire safety regulations and had even resulted in some false alarms in the past. To protect the reputation and credibility of the University and to safeguard the lives of its students and faculty, a new, reputable fire alarm system was needed. The new library also required a reliable fire alarm system that could detect a fire quickly to protect the high volume of books within its walls, and the new NU Dome, a multi-purpose building that is used as a venue to host large scale events with more than 3,000 people and consists of many breakout rooms, needed a robust system that could cater to its many spaces and separate zones. The Bosch FPA-5000 was the system of choice, selected for its reliability and ability to support the future expansion of the Faculty of Medicine. The system was specially designed to meet the building’s customised requirements, and thanks to the clever design by the Bosch team, the project was delivered under budget. Bosch Fire Monitoring System software is installed at the Faculty of Medicine which integrates all buildings and allows central monitoring of the fire alarm systems. The officers now have a full overview of the entire area, they can zoom in to check equipment and receive notifications by email. In addition, Bosch saved further on the budget by recommending a remote keypad instead of installing a new control panel. The system was also ideal to cater to the NU Dome’s multipurpose spaces, which required the installation of a total of 764 fire detectors. Adding faultless security with a robust video surveillance system The University was looking for a video surveillance system that would integrate with its existing Milestone software and Bosch Video Surveillance System fit the bill. The system is installed in the library and outdoor car park around the library to provide an added sense of security to the multiple spaces. Enhancing connectivity through an easy-to-use and a beautifully designed conference system The Bosch DCN Conference System was selected to support the meetings of professors, facilitate remote discussions between professors and students and support the University executives in their communications with partners and vendors. The conference system is user friendly and delivers high speech intelligibility with low susceptibility to mobile phones. It was used in most meeting rooms in the NU Dome. A sense of safety and security The three Bosch systems installed in the key buildings in Naresuan University and Naresuan University Hospital streamline communications within and beyond campus, provide an enhanced sense of security in surveillance and early fire detection, make it easy for officers to monitor the grounds and ensure that false fire alarms are no longer an issue on campus.  

Read More

How Logistics Parks can Improve Efficiency and Site Security with Smart Video

Global supply chains, the booming online retail market, and rising demand for manufactured goods have driven growth in the logistics industry. An array of materials and goods are constantly on the move by truck – arriving at logistics parks before the last miles of their journey to stores or customers’ addresses. With goods moving 24/ 7/ 365, logistics parks need to work extremely efficiently to stay ahead of demand, and to ensure that goods are delivered on time. Additionally, security is a top concern for operators – from the moment shipments arrive, to the moment they are delivered to their final destinations. When it comes to achieving these goals, security cameras are critical – helping operators to monitor vehicles and people entering facilities, and to track goods leaving the premises. However, next-generation smart video solutions provide a number of additional benefits that help operators to operate more efficiently and securely than ever before. These include: 1. Enhanced personnel management With the latest smart video solutions, such as Prama Hikvision’s Smart Logistics Park Solution, site operators can protect staff more effectively against accident and injury. This is achieved with automatic detection of personal protective equipment (PPE) including eye wear, gloves, ear protectors and more. One example of this is Prama Hikvision’s embedded hard hat detection technology, which triggers automated alerts when team members enter restricted areas without their hard hats on. This enables logistics park operators to significantly improve health and safety, without deploying additional team members to supervise hard hat compliance. As an additional benefit, operators can improve security with facial recognition technology, which ensures that only authorized personnel enter restricted areas. Facial recognition can also make it faster and easier for employees to move around the logistics park, helping them work more productively and reducing waiting times at park entrances and exits. 2. Improved site management and safety Apart from the access control facilities with face recognition technology to prevent unauthorized visitors entering in the premise, logistics parks need more intelligent perimeter protection to improve security. This is now possible with Prama Hikvision’s thermal cameras, which provide crystal-clear video footage, even in zero-light environments. Radar and dome cameras can also be combined to detect any unauthorized people or vehicles entering the site, to trigger automated alerts for any suspicious movements, and to record clear video evidence of any incidents that occur. With high-definition and low-light smart cameras, logistics parks can also replace manual security patrols with ‘remote’ patrols. In this scenario, security teams check images from strategically placed, high-definition cameras based on a patrol ‘schedule’ and raise alerts if any suspicious movements are observed. To further increase efficiency, remote patrols can be enhanced with AI technology, which enables regular security checks with no need to review video footage manually. In this case, only video images that identify a potential security threat are sent to site security teams, dramatically reducing staffing requirements and costs. 3. Optimized vehicle and dock management With smart video, site operators can create an optimized vehicle and load management workflow – from truck entry to docking and cargo pickup. The Prama Hikvision Smart Logistics Park Solution achieves this with a dashboard that displays the status of each loading dock, allowing vehicles to be directed efficiently as soon as they register at the park’s security checkpoint. Based on simple red, yellow and green indicators, vehicles can be processed more efficiently and queuing can be reduced. As well as improving the vehicle processing workflow, park operators can improve access security based on vehicle license plate recognition technology. Smart cameras can also be used to monitor the speed of vehicles entering the logistics park, to detect illegal parking, and to send automated alerts to security teams when rules are breached. 4. Secure and efficient goods management With smart video, logistics parks can create an automated, secure, and fully trackable goods management process. This supports the secure flow of goods at one site or across multiple sites and includes solutions for accurate, secure goods scanning, tracking and delivery. One example of this the Prama Hikvision Smart Logistics Park Solution, which incorporates all the infrastructure needed for effective goods management, from monitoring cameras to smart code readers and scanners. Using embedded software tools, site operators can allocate an ID to every pallet or parcel and track it through to final delivery, easily search and view video footage relating to specific pallets or parcels, and generate daily inventory reports quickly and easily. Finally, logistics park operators can dramatically reduce fire risks in the warehouse with Prama Hikvision. This is achieved by combining thermal cameras and smoke detectors, which alert security teams of potential fires before any damage is done.  

Read More