Seclond16

Page 1

SECURITY LONDON

FEATURES

Cyber Security Access Control Biometrics Surveillance Dec 2016 www.securitylondonmagazine.com

04

Technology and data have completely transformed the power and utilities sector

11

Yahoo say one billion user accounts may have been affected in a hacking attack dating back to 2013. oo on user accounts may have been

18

Secured Alarm Systems has installed ACT’s Cloud-based access control system, ACT365at the new UK base


building intelligence access control • IP video management • building automation

We have been waiting for a product like net10 that offers an out of the box solution for the automation of daily tasks. An extremely versatile product. — Lucan Clift, Engineering supervisor at The Alarming Company Ltd

available to all net10 partners register for net10 installer training to become a partner and find out about the possibilities of net10 building intelligence net10system.com/training

net10system.com

from a brand you know and trust

Paxton


Introduction A warm welcome to our Security London edition which focuses on matters domestic in the UK and globally regarding security, fire, safety, construction and investment news. We cover the Yahoo security breach in detail and examine how this will effect the companies future and the wider impact on cyber security.

Sumnall Smith as our Operations Director. Jamie will be key in enhancing Security London Magazines global presence moving forward. Finally have a relaxing Christmas and New Year and we look forward to a peaceful and successful 2017.

Ronald Hermans – Product Manager Connexo Insight & Alliances (EMEA/APAC) at Honeywell takes an indepth look into Information security and how it will effect utilities companies in Europe. On a company note we would like to welcome our new sales manager Quella-Mae Cliff and we are also delighted to announce the appointment of Jamie

Judith Adele Editor

Managing Director Ben Charnley ben@securitylondonmagazine.com

Operations Director Jamie Sumnall-Smith jamie@securitylondonmagazine.com

Editorial & PR Judith Adele editor@securitylondonmagazine.com

Global Sales Manager Quella-Mae Cliff quella@securitylondonmagazine.com

SL Dec 2016

2


Features 04

11

13

3

SL Dec 16

Protecting Utilities - Technology and data have completely transformed the power and utilities sector, allowing companies to use information to improve and expand services, and better engage with customers. Smart meters have played a key part in this growth for utilities.

Yahoo has told Security London more than one billion user accounts may have been affected in a hacking attack dating back to 2013.

GJD, one of the world’s most innovative leaders in British manufacturing and design of professional external detector equipment, recently launched the LaserWatch®

15

18

Today’s evolving threat landscape, where the criminals are getting more and more sophisticated and cunning, is driving the need for total security solutions that protect all devices.

Secured Alarm Systems has installed ACT’s Cloud-based access control system, ACT365, at the new UK base of Dr Organic Advancements in biometrics will radically transform the driving experience, health wellness and wellbeing (HWW), and security of vehicles by 2025.


Protecting Utilities From Cyber Security

I

nformation security is a growing concern for utilities in Europe, as they deal with myriad data from their smart meters, operations, customers and the power grid.

Technology and data have completely transformed the power and utilities sector, allowing companies to use information to improve and expand services, and better engage with customers. Smart meters have played a key part in this growth for utilities. However, large data volumes also bring added and sometimes regulatory obligations around security and privacy — and the risk that sensitive data could be subject to increasingly clever cyber threats. Most utilities understand and recognise the potential cyber security risks smart meters present, but not all have the infrastructure in place to detect and respond to cyber security incidents effectively.

What are the potential threats? There are many different levels of potential threats that can arise from a number of different sources worldwide. These include threats from “typical� hackers outside the organisation, ethical or nonethical, who simply want to prove that smart metering is insecure, or have the motivation to exploit companies for monetary gain. Similarly, the utility itself can be at risk from a disgruntled employee or an unhappy customer. Some of the threats to meters include the potential to reverse engineer communications that occur between the meter and the utility, modifying the meter software or communication so that it reports incorrect energy usage, or the threat of having a

SL Dec 2016

> 4


meter remotely disconnected by someone other than the utility. From a security point of view, any of the above threats are equal in severity. There is no more or less, a company is either secure or not. They should be prepared to take measures - at any level and against any threat.

What is the driving force? Data privacy and security are significant concerns for governments in the EU. Some of the larger smart meter roll-outs have been slowed down or halted for security reasons, for example in both The Netherlands and Germany where the governments have been implementing cyber security rules. The utility is a key life-line of the country and its economy. Security breaches can potentially be catastrophic and destabilize the operation of the utility, including the loss of revenue, damaged reputation, and diminished brand value. Security is vital for the stable operation of the economy and countries as a whole. ; Individual states seek to safeguard their “digital sovereignty and integrity” just 5

SL Dec 2016

as they do their territorial sovereignty and integrity.

Why are utilities hesitant to implement smart meter technology? Smart meters can add to the complexity utilities already face in protecting their organization’s systems and data from potential cyber threats. The additional data that smart meters collect and send to the utility needs to be protected from the time it’s created within the smart meter until it’s used by the utility. Communications have to be secure, the systems in which the data resides have to be secure and there need to be clear processes for handling that data in a secure fashion. Managing this cyber security risk is not just about adding a server, it is about changing the organisation culturally so that it thinks, acts and reacts in a more secure way. In order to secure meters, a security infrastructure needs to be in place. This is where a utility should count on its smart meter supplier to provide the necessary infrastructure components, such as


certificate policies, security baseline documents, how meters receive keys, how they are changed, and how they are destroyed.

protocol and system architecture and blue book on the interface classes and object identification…) or G3 PLC, which has detailed and specific sections on security,.

Can regulations help?

Lastly, there are supra-national initiatives, such as the European Network for Cyber Security (ENCS). Founded in 2012, ENCS is a non-profit organisation that brings together critical infrastructure stakeholders and security experts to deploy secure European-critical energy grids and infrastructure.

Yes. Security requirements and regulations are becoming more compulsory worldwide, similar to other aspects of utility operations, which are helping to drive better security practices. European, governments are very concerned about privacy and security. They will impose security to a fairly deep level of detail or will demand that the utility industry, vendor or standardization committee proves to which security standard they adhere. There are many examples of “security rulings”, such as the specification by the German Federal Office for Information Security, which has a major impact on the utility industry in Germany and throughout Europe. There are other standardization initiatives to which utilities will refer if a vendor wants to be compliant when tendering: such as DLMS standardization with its different “coloured books” (e.g. green book on

There is also the European Union Agency for Network and Information Security (ENISA), which issues recommendations on technical issues such as the validity of algorithms and key sizes.

Editorial Enquiries : editor@securitylondonmagazine.com

SL Dec 2016

6


An end-to-end security solution

keys, with certificates are used in asymmetric security

Looking at the different potential threats, cyber security needs a holistic approach. Utilities need to look at the complete solution and its processes, the overall system architecture and its system components, and sub-components.

and its algorithms to e.g. generate keys, or support digital signing.

There are two aspects of a holistic solution secrecy and trust. Secrecy is about ensuring that information cannot be retrieved or read by unauthorized parties. Trust is about being sure that the sender and the recipient of information are really the actor that you suppose them to be. This can be translated back to smart meters; for example, they need to be sure that when a breaker command is sent to a meter, it is being sent by an authorized sender. Also, they need to be sure that the metering data that’s retrieved, is not altered to reduce or increase the bill, or in the case of sub-station monitoring, data alteration to create a system or market imbalance. At the very core of today’s systems for smart meter security are secret keys (to encrypt and authenticate). These are used to verify identity and authenticity and protect confidentiality. Keys can be shared or be private/public, and they can have specific purposes such as key generation, authentication, encryption, storage, etc. Shared keys are used in symmetric security and its cryptographic algorithms; private/public 7

SL Dec 2016

Whether it’s private/public or shared, keys that are used extensively throughout the whole metering solution, can become complex to manage, or difficult to securely store. So utilities do have options to secure their operations, and Honeywell has developed solutions and methodologies together with their partner Worldline, to help utilities implement security of the smart meters. Essentially, you can’t talk measures without keys (shared or private/public). For more critical processes, like switching a meter on/off, load limiting it, or updating its firmware, most utilities will opt for asymmetric security, allowing digital signing of the commands to execute the critical process. Honeywell has teamed up with Worldline to provide a comprehensive, end-to-end (E2E) security solution for smart meters and their connections to utilities. Worldline is well-known for security solutions and is the market leader in Europe in securing transactions across many industries. Their solutions have millions of highly critical transactions running. With them, Honeywell has developed a solution that enables


utilities to use and manage keys and certificates in a performant and scalable manner. This solution spans the complete lifecycle of typical utility components, such as meters, data concentrators and backend systems, and it covers all processes involved, from manufacturer to utility to customer. From installation, read-out and remote and local troubleshooting to recycling and destruction of the meters. The solution is not communication technologyspecific, and is wireless through GPRS or G3 PLC. However, it goes well beyond technology and code; the Honeywell solution supports the utility in shaping and implementing proper security processes for implementing their smart meters, laying the foundation in a security baseline document with detailed process mapping, organisation structure, repair and replacement, such as key custodians, etc. The solution has specific key storage components, also known as Hardware Security Modules, for securely storing keys, and specific key management software guaranteeing secure business operation, using private/ public and shared keys in encryption, authentication, digital signing of commands and files, or generating and exchanging keys. It also supports and includes a Public Key Infrastructure (PKI) offering, to securely manage certificates; covering e.g. a certification authority (CA), registration authority

As such, the solution manages trust relationships for operations between all system components: in the backend, between and amongst backend and field components like gas and electricity meters, meters and concentrators, concentrators and servers, servers and meters. It manages trust relationships for onsite operations, between customers, technicians and system components, including laptops, hand-held units and meters, concentrators, and technicians. Lastly it also supports trust relationships in factory operations, between the factory, meters, concentrators and their firmware e.g. The Honeywell solution is compliant with DLMS security suites 0, 1 and 2, and therefore supports for example HLS6 and 7 mechanisms. DLMS Suite 0 is used at a major customer in the Netherlands, and Honeywell also has a couple of new implementations ongoing where Suite 1 & 2 are applied, or prepared to be used in the near future The benefits of the solution are: Less complexity: the system manages and uses keys and certificates, allows for high levels of automation in key management. Performance and scalability, About 6900 decryption operations (AES-256, GCM) per second 2.9 million smart meter communication sessions securely served in 3600 seconds in practice. The solution can be retrofitted to an existing system, it is ll enhance a company’s defences against potential cyber-attacks and help protect it from potential reputational damage.

SL Dec 2016

8


Yahoo Security Breach

Y

ahoo has told Security London more than one billion user accounts may have been affected in a hacking attack dating back to 2013. The internet giant said it appeared separate from a 2014 breach disclosed in September, when Yahoo revealed 500 million accounts had been accessed. Yahoo said names, phone numbers, passwords and email addresses were stolen, but not bank and payment data. Yahoo said it “believes an unauthorised third party, in August 2013, stole data associated with more than one billion user accounts”. The breach “is likely distinct from the incident the company disclosed on September 22, 2016”. However, the three-year-old hack was uncovered as part of continuing investigations by authorities and security experts into the 2014 breach, Yahoo said. Account users were urged to change their passwords and security questions.

9

The California-based company has more than a billion monthly active users, although many people have multiple accounts. There are also many accounts that are little used or dormant.

SL Dec 2016

Cyber security expert Troy Hunt told the BBC: “This would be far and away the largest data breach we’ve ever seen. In fact, the 500 million they reported a few months ago would have been, and to see that number now double is unprecedented.” Yahoo said some of the breach could be linked to statesponsored activity, as with the previous attack. Prof Peter Sommer, a specialist in digital forensics at Birmingham City University, told Security London he could be persuaded it was a state-sponsored hack, “but at the moment I’m not”. “What on earth is a state going to do with one billion accounts of ordinary users? That’s the difficulty I have,” he said. In September, when Yahoo disclosed the 2014 data breach, the company said information had been “stolen by what we believe is a state-sponsored actor”, but it did not say which country it held responsible. The latest disclosure raises fresh questions about Verizon’s $4.8bn proposed acquisition of Yahoo, and whether the US mobile carrier will try to modify or abandon its bid. If the hacks cause a user backlash against Yahoo,


the company’s services would not be as valuable to Verizon. Verizon said that it would evaluate the situation as Yahoo investigates and would review the “new development before reaching any final conclusions”. Mr Hunt said that Verizon allegedly cut its valuation of Yahoo by $1bn - almost 20% of the original bid’s value - after the news emerged of the 2014 attack. The latest revelations “will surely impact that valuation even further, not just because of the scale of it, but because it shows a pattern of serious failures on Yahoo’s behalf”, he said. It is a further embarrassment to a company that was once one of the biggest names of the internet but which has failed to keep up with rising stars such as Google and Facebook. Yahoo was once deemed to be worth $125bn during the dotcom boom. Various attempts to revive its fortunes have failed to stem its decline. Bruce Schneier, a cryptologist and one of the world’s most respected security experts, said: “Yahoo badly screwed up. They weren’t taking security seriously and that’s now very clear. I would have trouble trusting Yahoo going forward.”

John Madelin, CEO at RelianceACSN and a former vice president responsible for the Verizon Data Breach Investigations Report, said: “We thought the previous breach of 500 million user accounts was huge, but 1 billion is monumental.” Tyler Moffitt, senior threat research analyst at Webroot, said: “All of the data stolen, including emails, passwords and security questions, make a potent package for identify theft. The main email account has links to other online logins and the average user likely has password overlap with multiple accounts.” Kevin Cunningham, president and founder at identify firm SailPoint said hacks of this nature, particularly of firms with weak security but obvious data stores such, will likely feature heavily in 2017

www.securitylondonmagazine.com

SL Dec 2016

10


GJD Laser-Watch:

GJD, one of the world’s most innovative leaders in British manufacturing and design of professional external detector equipment, recently launched the Laser-Watch®, a long range IP connected laser surveillance sensor. The Laser-Watch® is a powerful sensor for detecting objects and humans with great accuracy up to 500 metres away and without the need for lights, reflectors or separate transmitters/receivers as used by other systems. Mark Tibbenham, Managing Director at GJD commented: “The Laser-Watch® uses innovative technology to ensure utmost precision, regardless of lighting or weather conditions for a wide range of sectors.”

System design At the core of the Laser-Watch’s design is functionality and ease of use. With this approach, the customer will find many advantages including quick and easy installation, effective outdoor surveillance for a variety of sectors and adjustable settings such as programmable detection range and twenty fully adaptable alarm zones.

11

SL Dec 2016

One of the major benefits is that it can be used as a standalone unit or as part of a security system with multiple IP surveillance sensors and IP cameras connected to a server. Another benefit is the twenty fully adjustable alarm zones each with their own sensitivity settings and alarm actions. Additionally, the Laser-Watch® has an intuitive web based user interface for fine tuning sensor settings and configuring network alarms for integration with all network based surveillance software. GJD is offering free practical hands-on Laser-Watch® training to give users a real-life experience of this unique detector.

High performance Designed from the ground up with high accuracy detection in mind, the Laser-Watch® delivers unrivalled levels of performance as it not only detects an intrusion, but it also knows the exact position of an object or human. Its reliability and accuracy ensures


that false alarms are kept to near zero and only genuine detection threats are captured. Another key benefit is pinpoint precision. For example, the sensor can be set to react only to cars in a specific lane, to alarm only if an object has stopped or if a door opens, whilst all other activities are ignored.

areas and large freight terminals. For more information about the Laser-Watch or to book product training, please email info@gjd.co.uk.

Wide range of applications Typical applications include perimeter control as the sensor can detect all objects crossing a virtual fence, which is especially useful when a physical fence is not desirable. The Laser-WatchÂŽ is also perfect for spot surveillance in an exact area, for example an entrance to a house or along a wall. The innovative sensor can be used to detect if an object moves, as it can be located anywhere with a clear line of sight to the object. It is also the perfect solution for police stakeout operations and other temporary perimeter security systems including harbours, airports, large industrial SL Dec 2016

12


Bit defender 2017 - the ultimate protection

T

oday’s evolving threat landscape, where the criminals are getting more and more sophisticated and cunning, is driving the need for total security solutions that protect all devices, irrespective of operating system or manufacturer. With this in mind, Bitdefender has unveiled Total Security Multi-Device 2017, the company’s full-strength, no-compromise security suite. According to Lutz Blaeser, MD of Intact Security, a Bitdefender distributor, Total Security Multi-Device 2017 has the same key features as Bitdefender Internet Security: A solid mix of antivirus, firewall, browsing protection, parental controls, anti-theft system, encryption and password manager. “However, the new suite takes this to the next level by providing protection for Mac OS and Android devices as well as PCs, and adding in some fantastic extras like anti-theft tools and the performance-enhancing feature, 1-click Optimizer.” The 2017 product also features far more effective ransomware protection, says Blaeser. “It has become very apparent that ransomware is a local as well as a global problem. Also, that just about everybody has a dog in this fight. It has become one of the fastest growing threats in cybersecurity today, and is a popular means for hackers to make money.” 13

SL Dec 2016

He says as ransomware explodes with new malware variants and increasingly ingenious ways of scamming targets, businesses can no longer afford to shrug it off it as a user-only problem. “This is why the new product can now store the user’s most important files in special folders which trusted applications will be able to access as usual, with everything else getting solidly locked out.” Bitdefender 2017 also features the newly introduced Wifi Security Advisor, a one-click tool which checks all available wireless networks quickly and identifies any security vulnerabilities. “Another improved feature is the firewall and parental controls, boosting family oriented protection, and privacy protection across all platforms,” Blaeser adds. “There’s no point in using many different security products when you can have the perfect all-in-one solution. Bitdefender Total Security Multi-Device 2017 is the perfect choice when you want to protect your Windows, Mac OS and Android devices all at once, delivering ironclad protection against even the most sophisticated threats.” He says it employs the most advanced security technology available today, yet it’s easy and intuitive. “Users need one account to protect up to 10 different PCs, Macs, and Android smartphones and tablets.”


THE PERFECT MATCH

FEATURE

Why stop at software? Combining its award-winning video management software with high-performance hardware, Milestone Systems now offers the Milestone Husky™ Series, available in three models – use one as a simple standalone or connect multiple models and choose from more than 50 options for a truly customizable and scalable solution. The series is compatible with thousands of cameras and supports Milestone services such as Customer Dashboard to enable your installer to monitor the health of your system and proactively resolve technical issues. Milestone Husky appliances make it easy to find a configuration to meet the needs of any surveillance solution! Learn more: www.milestonehusky.com

Milestone Systems Southern Africa Email: huskyza@milestonesys.com SA February 2016

14


DVtel SDM A5_EMEA 1215.indd 1

Despite forking out for expensive data, mobile camera surveillance systems were still only as effective as the local mobile signal, and the high bandwidth demands of video feeds meant that they relied upon only the best mobile data coverage to deliver adequate video quality for. Mobile video surveillance was only possible, then, in metropolitan areas, but as soon as the vehicle left coverage, poor signal impeded video transmission. and the high bandwidth demands of video feeds meant that they relied upon only the best mobile data coverage to deliver adequate video quality for. Mobile video surveillance was only possible, then, in metropolitan areas, but as soon as the vehicle left coverage, poor signal impeded video transmission. Today, the price of mobile data makes using it much more cost effective. Coverage has also improved and mobile networks have expanded to cover virtually anywhere in South Africa. That said, there are still many areas, particularly on cross-country roads, where signal

15

SL Dec 2016

is weak and users receive only EDGE or GPRS coverage. Due to this, surveillance equipment manufacturers have had to find a way to enable video transmission of a reasonable quality to be possible from low coverage areas.

01/02/16 16:03

Through the use of sophisticated compression technology, useable video feeds transmitted from moving vehicles in low coverage areas is finally possible. Still, organisations need to know what to look for to ensure they receive a solution that will not fail them when they need it most. To ensure they receive maximum benefit from live monitoring and surveillance solutions, security and logistics companies should ensure they find one that meets specific criteria. Firstly, the system must be able to transmit high quality video footage from low coverage areas.


ACT 365 INSTALLED AT DR ORGANIC

S

ecured Alarm Systems has installed ACT’s Cloudbased access control system, ACT365, at the new UK base of Dr Organic, a natural skincare and beauty product company. Dr Organic created a production, design and distribution centre within the 18-acre Swansea Enterprise Park to consolidate its operations in Europe . ACT365 gives users simple but powerful management of access points both locally and remotely. It allows the operator to analyse door status and activate doors from any major web browser or ACT’s own App. ACT365 also unifies VMS with access control, enabling users to control cameras from the same platform. The software is allowing Dr Organic to make immediate remote adjustments to a user’s privileges including disabling a card after any breach of access protocol even if it is an innocent error. (A common occurrence might be a contractor forgetting to hand in their card or fob after finishing an assignment.)

Rapid installation using structured cabling Secured Alarm Systems worked with the client’s IT consultant, SA1 Solutions, to exploit existing Cat6 infrastructure and assign IP addresses to the ACT hardware. Dr Organic is using ACTpro 1040e 125kHz proximity readers and also opted for another recent innovation, ACTpro 1520e single-door controllers. Matthew Giffard, managing director of Secured Alarm Systems, said: “The installation at Dr Organic was rapid and hassle-free. An outstanding feature of ACT365 is that if the client reports a fault on their access control system we’ve got the ability to assess the situation via the Cloud from our own office and make modifications without necessarily visiting site. This enhances our offering to clients and of course end-users also appreciate the remote visibility of their premises.” Matthew continued: “ACT365 is showing exceptional

SL Dec 2016

16


the system was illustrated recently when a Dr Organic member of staff had a highly unusual but legitimate access control request involving external doors. We were able to adjust the privileges on their fob from our office promptly and with no disruption to the system.� ACT365 removes the need for extensive PC equipment on site. It operates from a compact unit involving minimal capital cost and is provided to installers by ACT and its distribution partners on an ‘as-a-service’ model. Clients are able to focus on their core operations without being potentially distracted by technical concerns such as firewalls, router settings, patches and firmware upgrades. Sustainability consistent with client ethics By minimising both miles driven during installer site visits and fossil fuel usage in manufacture of unnecessary components, ACT365 is environmentally friendly. This is particularly appropriate for a client such as Dr Organic who employ organic ingredients wherever possible and avoid petro-chemicals such as paraffin and petroleum in their products.

17

SL Dec 2016

Dr Organic exports to the US and to do this it must meet strict regulations from the United States Department of Homeland Security. The ACT system is contributing to this compliance. Swansea-based Secured Alarm Systems operate across access control, CCTV and fire protection. The company works in many sectors including civil infrastructure, retail, social housing, student accommodation and local NHS. Secured Alarm Systems cover the whole of the south west of the UK. The company is a member of the National Security Inspectorate and BAFE; their staff are fully trained in the Construction Skills Certification Scheme.


Biometric Wearables to Disrupt the Automotive Industry

Advancements in biometrics will radically transform the driving experience, health wellness and wellbeing (HWW), and security of vehicles by 2025. As one in three new passenger vehicles begin to feature fingerprint recognition, iris recognition, voice recognition, gesture recognition, heart beat monitoring, brain wave monitoring, stress detection, fatigue monitoring, eyelid monitoring, facial monitoring, and pulse detection. These will be driven by built-in, brought-in and cloud enabled technologies, the automotive biometrics ecosystem will surge ahead. Major automotive original equipment manufacturers (OEMs) and Tier 1 suppliers must stay abreast of technologies, business models, and regulations shaping this dynamic space. “Partnerships between automotive OEMs and wearable companies will result in faster penetration of biometrics within the automotive industry, allowing OEMs to save on biometrics related R&D expenditure, while creating growth avenues for wearables companies,” said Frost & Sullivan Intelligent Mobility Industry Analyst Joe

device as a service and health as a service will also emerge.” The Biometrics in the Global Automotive Industry, 2016–2025 analysis, a part of Frost & Sullivan’s Automotive & Transportation Growth Partnership Service program, finds that OEMs and suppliers are investing in advanced biometrics based on human machine interaction (HMI) concepts such as natural language and gesture recognition. They are also vertically integrating and funding relevant start-ups to build a stronger portfolio. “Urbanisation will continue to fuel emphasis on biometrics-driven advanced driver assistance system (ADAS) features to navigate heavy traffic while ensuring, safety and comfort,” noted Praveen. “However, customer concerns surrounding the safety of the sensitive data collected through biometrics will compel suppliers to also invest in cybersecurity measures to build credibility and increase growth.”

SL Dec 2016

18


The Standard in Fire Systems Advanced is a British success story. We design and manufacture worldbeating fire alarm systems in the UK, exporting them to over 60 countries. Where quality and performance are priorities, you’ll find Advanced, including in The Shard.

Our innovations continually challenge the industry. AlarmCalm, our complete false alarm management solution tackles one of the biggest issues in Fire today and gives Advanced customers more options, more confidence and more peace of mind.

Tel: Tel:+44 +44(0)1670 (0)1670707 707111 111 Fax: Fax: +44 +44 (0)1670 (0)1670 707 707 222 222 Email: www.advancedco.com Email:sales@advancedco.com sales@advancedco.com Web: Web: www.advancedco.com


Baldwin Boxall’s Umnicare EVC System

B

aldwin Boxall has announced that its popular Omnicare EVC system can now be extended to include up to an incredible 8,064 outstations! The company admits that it is extremely unlikely that a system on this scale would be needed, but it does mean that previous limitations no longer exist.

For those not familiar with Omnicare – it is a well-established, high quality system which is designed and manufactured in the UK by Baldwin Boxall. Outstation options for the system include: disabled refuge, Advance disabled refuge, fire telephones, steward telephones, combined unit (disabled refuge and fire telephone) and disabled toilet alarms.

Known as ‘OmnicarePLUS’, the system provides a touchscreen interface as the master point of control, with local areas taken care of via standard style panels. Should a site require it, additional touchscreen control points can be added to the system; enabling placement in alternative control or security rooms. These will be ‘slave’ or ‘mimic’ panels unless full control is transferred due to comprise of the master control point or as required by the user(s). Each local area control panel can handle up to 64 outstations and these can be any combination of any of the outstation types available for the Omnicare system. Site network cabling can be via copper, single mode fibre or multi-mode fibre. Features include multi-layer graphical touchscreen control, automatic call queuing, multiple touchscreen control locations with optional mimicking of status, incoming call logging, audio recording and more

SL Dec 2016

>

20



Fire and explosions testing at HSL By Nick Warburton

D

avid Johnson heads up the HSE’s Health and Safety Laboratory (HSL) Centre for Large-scale Testing and Evaluation. He speaks to Nick Warburton about its work and how it is supporting industry to enable new technologies. David Johnson explains that it was the ground-breaking work undertaken by the Centre for Energy Innovation on hydrogen, energy storage and batteries that prompted HSL to forge ahead with the centre he heads up, which has diversified to cover key sectors like aerospace, defence, and security and transport. “The Centre for Large-Scale Testing and Evaluation has really come out of that. The understanding that we can help across the piece – different sectors and a huge breadth of facilities and technical expertise,” he explains. “We can help clients understand their problems and provide robust information and data so that they have an evidence base to make informed decisions with regard to their assets, structures and products.” Recent experimental work certainly supports his assertions, with examples including: impact and fire testing of a nuclear transportation package; empirical work to validate the use of a computational fluid dynamics model for predicting the behaviour of LNG pool fires; comparative performance testing of fibre-

reinforced plastic and metallic pipework for refinery applications; and carrying out a range of gas releases to verify and benchmark commercially available gas detector systems. The Centre for Large-Scale Testing and Evaluation’s modus operandi ranges from testing to existing standards to more cutting-edge, bespoke solutions. With 400 technical experts spanning a multitude of disciplines and a wealth of testing facilities on its 550-acre site, HSL has the skill-base, space and capability to provide the whole piece from designing a test from scratch, through to testing and finally detailed evaluation. This integrated offering is a key differentiator for HSL. “A sizeable proportion of the work that we do can be complex and it needs to be thought about in a holistic way,” he explains. “There can be value in having a range of technical discussions upfront. The output of those discussions is a testing protocol and we’ll work with the client to get the data that they require. Our technical diversity allows us to look at things in a multi-disciplinary way.” Explosives testing and new technologies The centre covers a wide range of themes: fire and explosion; impact and crashworthiness; explosives testing; batteries and energy storage.

SL Dec 2016

22


Axis Communications’ Academy

Building your strengths in network video

Your customers and your success depend on you having the most up-to-date, comprehensive knowledge in the industry. Axis Communications’ Academy makes it easy to stay one step ahead — putting network video knowledge right at your fingertips. The Academy gives you a wealth of information to help you build your strengths through every part of your chain — from interactive system design tools, practical “how-to” guides and

specialized webinars to registration for classroom-based training and certification. And it’s available anytime, anywhere, in your language from Axis’ own highly-trained Academy staff. When your knowledge source is the company that invented network video and continually sets the standard for innovation in the industry, rest assured customers will recognize your expertise — driving more business to your door. Get the Axis picture. Stay one step ahead. Visit www.axis.com/academy

Axis Communications’ Academy - the global learning center for network video


www.airlive.com



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.