The magazine with the inside story on security issue 33 SPRING 2018
Protecting habitats FLIR cameras secure goose habitats
06 INDUSTRY NEWS
20 A dedicated standard
24 Intelligent devices
32 Show must go on
Latest developments from the security industry
Improved building access control in the uk
A detailed look at the future of video security
Security tips for events this Summer
issue 26 sePtembeR 2016
Commentary
W
The magazine wiTh The inside sTory on securiTy issue 33 sPRiNG 2018
iN secuRity ThE mAgAzINE WITh ThE INSIDE SToRY oN SEcURITY
PRoTEcTINg hAbITATS FLIR cAmERAS SEcURE gooSE hAbITATS
www.iN-secuRity.eu
06 INDUSTRY NEWS
Latest developments from the security industry
20 A DEDIcATED STANDARD Improved building access control in the uk
24 INTELLIgENT DEvIcES A detailed look at the future of video security
32 ShoW mUST go oN
Security tips for events this Summer
Editor Chris Hewett editorial@mebmedia.co.uk Accounts Jay Kempisty accounts@mebmedia.co.uk Publisher Wayne Banks +44 (0)1622 201207 wayne.banks@mebmedia.co.uk Designer Mark Fisher production@mebmedia.co.uk Published by MEB Media Limited 13 Princes Street Maidstone Kent ME14 1UR United Kingdom
elcome to the February issue of In Security and with the Security and Counter Terror Expo and IFSEC rapidly approaching, we have spring full of exhibitions. This issue’s Product & Industry News section (starting on page 8) showcases the latest news from the industry. Our cover story this month showcases outdoor wildlife surveillance system from FLIR supported by ground patrolling units, that allow immediate action on wildlife crime (see page 2). Next, Police Authorities in the UK, through its Secured By Design (SBD) initiative, seek a dedicated standard for access control systems and equipment in buildings (see page 20). Bosch looks at how the Internet of
Things (IoT) is changing things for the better as we take a detailed look at the future of video security (see page 24). UK’s leading national security event SCTX18 returns to London with a programme created to help global experts fight the war on terror (see page 28). Every year, over 7,000 major outdoor events are held in the UK, with over 85 million people attending festivals and events, with an increase in attacks over recent years, it’s crucial that there are security measures in place (see page 36). Finally, seeking professional help in disposing of your data is a wise investment, but what exactly does it mean to be ‘GDPR compliant?’ James Kelly, CEO, British Security Industry Association answers the question (see page 40). Chris Hewett, Editor n
Tel: +44 (0)1622 201207, Fax: +44 (0)1622 210207 info@mebmedia.co.uk www.mebmedia.co.uk Articles and art may not be reproduced or reprinted without the express written permission of the publisher. Exclusion of Liability Although every effort will be made to ensure the accuracy of all materials published, the publisher takes no responsibility for errors or omissions.
02
06
20
Copyright © MEB Media Ltd – 2018, all rights reserved.
28 Contents 02 Cover Story – Protecting habitats BirdLife Greece uses FLIR PT-Series cameras to secure Lesser Whitefronted Goose habitats
24 Intelligent devices A detailed look at the future of video security
06 Product & Industry News The latest news and views from the security industry
28 Security and Counter Terror Expo 2018 Global experts gather at SCTX18 to fight war on terror
20 A dedicated standard Improved building access control in the United Kingdom
32 Show must go on Security tips for events this Summer
32 36
36 Data destruction BSIA asks “What exactly does it mean to be GDPR compliant?”
IN Security I February 2018 I 1
COVER STORY
Protecting habitats BirdLife Greece Uses FLIR PT-Series Cameras to Secure Lesser White-fronted Goose Habitats
2 I February 2018 I IN Security
The Lesser White-fronted Goose (LWFG) is the most endangered waterbird in Europe. The greatest concern surrounds the Fennoscandian population, a subgroup within the LWFG population. In the beginning of the twentieth century, there were more than 10,000 Fennoscandian LesserWhite fronts. By 2011, there were only 15-20 breeding pairs. Illegal hunting, accidental shooting, disturbance, habitat loss and habitat degradation are just some of the threats that have severely affected the LWFG population. To prevent the species from becoming extinct, the Hellenic Ornithological Society/ BirdLife Greece launched the Lesser Whitefronted Goose initiative, which is formally known as “Safeguarding the Lesser White-fronted Goose Fennoscandian population in key wintering and staging sites within
the European flyway”. The endeavor, financed and spearheaded by the European Union’s LIFE + Nature program, focused on reducing mortality rates for the Fennoscandian LWFG population at key wintering and staging sites in Greece. From September 2011 to April 2017, LIFE enacted a series of conservation actions, including implementing a state-of-the-art security system to deter wildlife crime, which was a significant milestone. “It is the first time that an outdoor wildlife surveillance system supported by ground patrolling unit operates in Europe, which allows immediate action on wildlife crime,” according to BirdLife Greece in a statement in its recent publication on the LWFG project. To obtain an advanced intrusion detection system for the video component of its security solution,
LIFE turned to FLIR Systems. FLIR provided its PT-Series cameras, which provide advanced dualsensor technology. The PT-Series combines a cooled or uncooled 640x480 resolution thermal sensor, a 1080p high-definition visiblelight imaging sensor, and a high speed, precision pan/tilt system for perimeter surveillance and tracking. The thermal sensor enables 24/7 monitoring and accurate detection in total darkness, light rain and smoke. The visible light sensor allows security operators to get a visual of the target for identification and verification. This dynamic technology duo provides unparalleled situational awareness of the area and allows staff to respond to any threat before it reaches the perimeter of the protected area. “Using FLIR’s technology, and especially the thermal sensor, wasg
IN Security I February 2018 I 3
particularly significant during the cold winter months the Lesser White-fronted Geese remained in Greece,” says LIFE Project Manager Manolia Vougioukalou. “The high temperature difference between the environment and the ‘warm’ targets, such as a human, car and/or animal, allowed immediate and accurate detection as well as assessment of potential threats to the Lesser White-fronted Geese and other wildlife.” FLIR’s cameras were part of the Remote Unit of the project’s Smart Patrol System (SPS). In addition to the Remote Unit, the SPS had a Control Center that managed the operation of the Remote Units and directed the vehicle patrol Mobile Unit to any
4 I February 2018 I IN Security
incident location using satellite maps. The Smart Patrol System (SPS) was implemented at two important feeding and roosting LWFG habitats in Northern Greece. As a result of implementing the SPS, there were just a small number of incidents that occurred in the Fennoscandian LWFG population’s wintering areas from 2011-2017. The presence of surveillance system deterred hunters from the region and allowed for target checks of passing vehicles in the area, which lowered patrol costs and mobile unit operation in adverse weather. The security technology improved efficiency for documenting incidents as they were automatically logged in the system. The SPS increased safety for patrols due to expanded
situational awareness through GPS tracking and mapping. The security system also identified other notable activities beyond illegal shooting such as a fire outbreak, a boat theft, illegal fishing, tourists who were too close to sensitive areas, and the presence of other endangered animals. All in all, utilizing a security solution with advanced thermal and visible light sensors for wildlife crime detection and deterrence was innovative and effective. As of January 2018, there were 101 LWFG individuals observed at Kerkini Lake in Greece. For more information about thermal imaging cameras or about this application, please visit: www. flir.com/security
PART OF
SCT
SECURITY & COUNTER
TERROR EXPO
CNI PROTECTION | BORDER SECURITY
6-7 March 2018 Olympia, London
OFFENDER MANAGEMENT | SERVICES
MAJOR EVENT SECURITY | CYBER SECURITY POLICING AND COUNTER TERRORISM
BOOK YOUR STAND FOR 2018 Meet face to face with over 9,500 security professionals
Engage with over 901 VIPs and arrange pre-booked meetings
Launch your products and services on an international platform
Connect with key decision makers across 114 different countries
WWW.SCTX.CO.UK/INSECURITY Part of UK Security Week WORLD COUNTER TERROR CONGRESS
Organised by
@SCTX18
Ambition THE EPRR EXPO
FORENSICS EUROPE EXPO
sctx.co.uk/linkedin
product and industry news
ASSA ABLOY supplies the security technology behind impressive architecture for new central library in Stuttgart London, January 2018 – The new city library in Stuttgart has been equipped with CLIQ® locking and access control systems by ASSA ABLOY. This cubeshaped 20,000-square-metre building is thus stateof-the-art in terms of both architecture and security technology. The central library is the first public building to be completed in the new Europaviertel (Europe Quarter) currently under development in Stuttgart. The Korean architect Eun Young Yi designed the building envelope to feature a double façade with glass bricks und entrances on all four sides, creating the new central library as an inspirational centre of knowledge and culture. ASSA ABLOY was awarded the contract for fitting the library with a security system. Specifications stated that the building entrances were to be equipped with electronic components that could be centrally managed and could integrate interior doors using mechatronic systems where required. The new central library in Stuttgart is housed over a total of eleven floors. On the inside, architect Young Yi has created bright, wide spaces linked by numerous walkways. The centre of the building features brightly lit atrium four storeys high with a skylight made of glass bricks, above which there is a funnel-shaped gallery space. The highest security
6 I February 2018 I IN Security
level in the interior has been provided for the management, administration and data processing departments, for which the CLIQ® locking system has been used. Each battery-powered CLIQ® key features an integrated chip for the key and locking cylinder, thus making them unique. Keys can be programmed individually for each user. “System operators thus have control over their keys. CLIQ® excels thanks to its high flexibility when a key is lost or users require changes. Key access authorisations can be removed individually by reprogramming locking cylinders,” explains Andreas Wagener, Managing Director Sales and Marketing at ASSA ABLOY Germany. Access authorisations can also be enabled on a time-limited basis for external service providers such as tradesmen and cleaners. Since opening, 500,000 books, films, sound storage media, newspapers, magazines, sheets of music, graphics and software packages are available to library visitors. The opening week saw performances and readings from the likes of philosopher Wilhelm Schmid and writer Hatice Akyün. There are also two regular guided tours – one based on the architecture and the other on the library itself. Security is hardly noticeable for visitors during tours but is highly important for those who run the library. For more please visit www.assaabloy.com n
Redvision makes A and E specifications available for its X-SERIES and VOLANT, rugged PTZ cameras Redvision, the UK’s leading manufacturer of highperformance, rugged CCTV cameras has made Architectural and Engineering (A and E) specifications available for its X-SERIES and VOLANT, rugged PTZ cameras. Aimed at consultants, specifiers and engineers, the A and E specs cover both IP and analogue camera versions, highlighting many of their unique features. Stephen Lightfoot, technical director at Redvision, explains, “All Redvision VOLANT™ and VEGA™ cameras are popular with architects, specifiers and end users. They are successfully used in many outdoor and public space applications, from town centres, utilities and universities, to ports, prisons, industrial buildings and MoD sites. “The A and E specs emphasise many of the unique features of our products and can be requested by email at AandE@redvisioncctv.com and via our website. “All our rugged PTZs are made from durable, diecast aluminum with a marine-grade plating and tough, powder coating. They are available in light grey or black, as standard, but can be supplied in any other
RAL colour to order. They are IP67 weather-proof rated; IK10 shock and vandal-resistance rated, and pass IEC vibration, shock and salt spray requirements. They have super-efficient, LED illuminator options, for nighttime operation, and a flat, optically-correct, toughened glass, camera window with wiper for wet and adverse conditions.” “The X-SERIES™ is modular; configurable as a fully functional PTZ camera or dome; and has low power consumption to keep running costs and total cost of ownership to a minimum. The VOLANT™ is the fastest, quietest and most accurate, rugged PTZ camera in the industry, using direct-drive motors. It has an offset camera design to allow viewing vertically downwards, when mounted on a tower, whereas the X-SERIES uses a cantilever leg design to achieve the same thing.” Redvision rugged, PTZs camera models include Full HD, IP with 30x optical zoom and SD analogue with 20 or 30x optical zoom. Pendant or pedestal mounting options and a wide range of brackets are available. Visit www.redvisioncctv.com for more information. n
IN Security IN Security I February I June2018 2015II 7
product and industry news
Videalert upgrades digital video platform to further increase productivity and integrate with other enforcement providers PINNER, MIDDLESEX, 20 FEBRUARY 2018 – Videalert, one of the UK’s leading suppliers of intelligent traffic enforcement and management solutions, has announced the immediate availability of new functionality for its Digital Video Platform which simultaneously supports the enforcement of diverse civil traffic contraventions, traffic management and community safety applications. This includes integration with mobile enforcement vehicles from third party suppliers including TES and SEA, a new analytics engine and an upgraded Evidence Pack Review Suite – all of which will result in significant productivity improvements for councils. According to Tim Daniels, Sales and Marketing Director of Videalert: “Videalert is the first manufacturer to integrate its platform with other suppliers of civil traffic enforcement systems such as Mobile Enforcement Vehicles from SEA and TES. Using a single platform in this way allows councils
8 I February 2018 I IN Security
to take a phased approach to migrating from existing systems that are still operational. This will help to extend the ROI of existing assets and reduce support costs.” Videalert’s new analytics engine has been equipped with the latest algorithms that provide additional layers of intelligence to enhance the evidence capture process. It will further increase detection rates and reduce the incidence of false alerts to deliver industry-leading levels of productivity at the lowest operating cost. Videalert’s Evidence Pack Review Suite has also been upgraded with the addition of new fields to display more detailed DVLA data and allow reviewers to add notes explaining the reasons that PCNs have been issued in borderline cases. This will help to speed up the evidence pack review process. For further information, please visit www.videalert.com n
Upgrade your doors to Aperio® Increase your security – forget about keys – control more doors
Aperio® easy integration Access control system
Existing wired security door
�
No more keys
Online door
�
Save on maintenance costs
Offline door
�
Extended 2 year battery life
www.assaabloy.co.uk/aperiowirelesslocks
product and industry news
Brits welcome more armed police at public events Over a third of the British public want to see more armed police at public events to make them feel safer in light of recent terror events, according to new research. 36% of Brits are calling for more armed officers to patrol public events, such as music concerts, and 57% would like to see more security guards on duty around event locations. The survey of 1,000 people, conducted by ATG Access, found that although almost half of the public won’t let recent terror attacks stop them from enjoying organised events, 39% would feel more at ease if emergency services, like paramedics, were on site and easily visible. But it’s not just visible front line service personnel that will help alleviate fears this year. 44% of people would now like to see visible security measures, such as bollards and barriers to separate crowds from nearby traffic, put in place to prevent possible vehicle attacks. Almost half (48%) of the public would welcome bag searches and 33% think metal detectors should be used at event entrances to spot suspicious behaviour. And 41% would like to see more CCTV and flood-lighting to help monitor festive events and public areas. The study was conducted as part of ATG Access’ ‘Protecting the future of multifunctional cities’ report,
10 I February 2018 I IN Security
which looks at how cities in Britain are being transformed into bustling multi-functional spaces, and the obstacles that are preventing public events from taking place. Gavin Hepburn, director at ATG Access, said: “With the increasing number of terror attacks that have taken place across Europe, tensions have understandably been heightened – particularly as the Manchester Arena was targeted last year. The general consensus amongst the public seems to be that they’re not going to let the threat of terror ruin their spirit, but there are still some concerns around security and safety at public events. “Brits are now calling on authorities to implement more visible security measures, such as more armed police on our streets and physical solutions like bollards and barriers, to protect public events. But, the most important thing to bear in mind is that these measures must not create a ‘fortress mentality’. While the public may feel safer knowing that security is being improved, solutions shouldn’t incite more fear and should enable people to enjoy the event. There are robust physical solutions now available that can blend in with their surroundings so that they’re almost invisible.” For more please visit: https://www.atgaccess.com/ report-release-protecting-future n
Hanwha Techwin launches new VMS brandWisenet WAVE is simple to set up & easy to use
The new Wisenet WAVE video management software (VMS) from Hanwha Techwin makes it almost effortless to display up to 64 high definition video streams. Hanwha Techwin already offers an entry level free VMS called SSM and for sophisticated Enterprise level VMS projects, the company integrates with technology partners such as Genetec and Milestone. Wisenet WAVE has been launched to answer the needs of projects in the middle ground with an emphasis on simplified user experience. Uncomplicated and easy to use An intuitive ‘drag & drop’ tool makes it extremely easy for operators to set up a display of live and recorded images on a single screen or video wall, with customisable layouts and sizes. Other key features include a virtual PTZ which, with just simple clicks of a mouse, enables operators to zoom in to see close up detail of any suspicious activity, whilst motion detection and video analytics support can be configured to generate alerts when user defined incidents occur. A wide range of smart, keyword, calendar and time-slice search options facilitate rapid retrieval of recorded video. The ultimate in flexibility Wisenet WAVE offers a wide range of options to allow users to choose how and where they wish to manage their video surveillance systems with minimal hardware requirements.
• Desktop: Wisenet WAVE is offered as software which can be installed onto a user’s desktop running Windows, Linux or Apple/Mac. 24 to 64 live high definition video streams can be managed on 32 and 64-bit operating systems. • Cloud: A cloud-based service which can be remotely accessed by an unlimited number of authorised users from anywhere in the world, offers a hardware free, cost saving method way to take advantage of all Wisenet WAVE functionality. • Server solutions: Wisenet WAVE is available as a preloaded out-of-box server or software downloadable from our website which enables operators to view up to 64 high definition streams of live video. A supporting web-based application enables each Wisenet WAVE platform to be managed as a stand alone system or as part of a larger, scalable video management solution. The application also provides an audit trail, real-time health monitoring and camera failover support, as well as reports on server health and storage status. • Mobile: A mobile app provides the opportunity to remotely access the key functions of Wisenet WAVE from a smart device to enable ‘on-the-road’ users to view and respond to any incidents captured by Wisenet cameras. www.hanwha-security.eu n
IN Security I February 2018 I 11
product and industry news
Idis and oprema sign distribution agreement The IDIS range to complement Oprema’s multi-brand portfolio to meet the surveillance needs of medium to large businesses IDIS, South Korea’s largest surveillance manufacturer, announces today that the company has signed a distribution agreement with Oprema, a leading UK multidiscipline security solution provider. Oprema, the UK’s fastest growing security provider that is also a Fast Growth 50 Company, has added the full IDIS Total Solution to its line-up. The range of products include the IDIS flagship offerings, including the truly plug-and-play DirectIP® as well as the advanced HD analogue over coax solution, DirectCX®, that both strengthen Oprema’s extensive portfolio of surveillance, access control, fire and other security brands. Founded in 1997 by experts in computer science and artificial intelligence, IDIS is a world-leading surveillance solution provider. With headquarters and manufacturing facilities based in South Korea and dedicated offices that offer training and technical support in the UK, Dubai and the USA, IDIS has grown to become a global security company that designs, develops, and manufactures surveillance solutions for a
12 I February 2018 I IN Security
wide range of commercial and public-sector markets. Gareth Williams, Sales Director at Oprema commented: “I am delighted to announce a new strategic partnership with IDIS. The IDIS product range perfectly complements our multi-brand security portfolio and opens up a whole new range of surveillance solutions and opportunities for our customers. The IDIS product range delivers innovation that is user-friendly, flexible, scalable, and is able to meet every surveillance need, especially in the mid to high-end space”. James Min, Managing Director, IDIS Europe, added: “The IDIS team is thrilled that we have signed a strategic distribution alliance with Oprema. Oprema shares our values of providing a complete end-to-end solution approach, that is consultative; with a passion for sales and technical support, training and reliable logistics, as well as professional services, such as pre-sales design, pre-configuration and on-site commissioning. We look forward to working closely with the Oprema team over the next year and beyond.” To find out more on IDIS solutions, go to www.idisglobal.com n
tss && ntts in dd &meeenn iinn loouuud yym m clo a e ccl ppaay thhee lyy p tth tthhhlly oonnnt m mo m
A A Aguard guard guard management management management solution solution solution boosting boosting boosting business business business development development development within within withinthe the the security security securitysector sector sector check check checkcalls calls calls
payroll payroll payrollcalculation calculation calculation
variance variance variancereporting reporting reporting
patrol patrol patrolmonitoring monitoring monitoring
holiday holiday holidayaccrual accrual accrual
inspections inspections inspections&&&audits audits audits
mobile mobile mobilepatrols patrols patrols
certifi certifi certifi cate cate catemanagement management management incident incident incidentcapture capture capture
intelligent intelligent intelligentrostering rostering rostering
invoice invoice invoicecalculation calculation calculation
proof proof proofof of ofpresence presence presence
SmartTask SmartTask SmartTask isisis an an an advanced advanced advanced easy easy easy to to to use use use employee employee employee scheduling scheduling scheduling and and and remote remote remote workforce workforce workforce management management management solution solution solutionthat that thatenables enables enablessecurity security securitycompanies companies companiesto to tomanage manage managecontract contract contractservice service servicedelivery, delivery, delivery,improve improve improve operational operational operational control control control and and and quality, quality, quality, raise raise raise customer customer customer satisfaction satisfaction satisfaction and and and support support support duty duty duty of of of care care care to to to staff staff staff .. .
Designed Designed Designedby by byindustry industry industryexperts experts expertsto totoencapsulate encapsulate encapsulate Net2 Entry Touch Briti Briti Briti sh sh shsecurity security securitybest best bestpracti practi practi ce ce ce Fast-track Fast-track Fast-tracksoft soft softservice service serviceset-up set-up set-upto totomatch match match
Minimise Minimise Minimisebreaches breaches breachesinininservice service servicecompliance compliance compliance
Smart, Simple contractual contractual contractual agreements agreements agreements
Door Entry with acontract Premium Touch Boost Boost Boost contract contractcompliance compliance compliance and and andincrease increase increase
Automate Automate Automatethe the theroster roster rostergenerati generati generati on on onprocess process processand and and
the the thescheduling scheduling schedulingof ofofshift shift shift sss Durable 7" colour touch screen
customer customer customersati sati sati sfacti sfacti sfacti on! on! on!
Supports Supports SupportsACS ACS ACSaccreditati accreditati accreditati on on on
Personalise with multiple theme options
Enables Enables Enablesdelivery delivery deliveryof ofofvalue value valueadded added addedservices services services
such such suchas; as; as;fifire, fire, re,safety, safety, safety,fifirst first rstaid aid aid&&&defi defi defi brillator brillator brillator equipment equipment equipmentchecks checks checks
Fully compatible with Net2 access control
Eff Eff Eff ortlessly ortlessly ortlesslydefi defi defi ne ne nein-shift in-shift in-shiftpatrols patrols patrolsusing using usingan an an
For more information:
intuiti intuiti intuiti ve ve veworkfl workfl workfl ow ow owcreati creati creati on on onmechanism mechanism mechanism
paxton.info/3004
Certi Certi Certi fyfyfyemployee employee employeeatt att att endance endance endanceusing using usingour our our
operati operati operati onal onal onalmonitoring monitoring monitoringtools tools tools
www smatrtask.co.uk/security smatrtask.co.uk/security smatrtask.co.uk/securitytt01494 t01494 01494444044 444044 444044eesmarttask@skillweb.co.uk esmarttask@skillweb.co.uk smarttask@skillweb.co.uk
product and industry news
STANLEY Product & Technology sets new standards in access control with its PACOM 8707 display card reader
8th January 2018 …. STANLEY Product & Technology, the leading provider of security and access control solutions, has announced the introduction of its next generation display card reader – PACOM 8707. Developed around the company’s highly successful PACOM Unison platform, PACOM 8707 will initially be available in the Nordics, with the intention to roll it out across other countries and regions in due course. PACOM 8707 has been specifically designed to meet the requirements of companies of all sizes that want the most secure access control solution possible. As the first line of defence against those wishing to infiltrate operational technology systems and information, PACOM 8707 incorporates state-ofthe-art card management and authentication, and supports all generations of the MIFARE protocol, including MIFARE Classic, MIFARE Plus (Levels 1 and 3), as well as MIFARE DESFire EV1 and MIFARE DESFire EV2. It also supports radio frequency identification (RFID) based cards and the Wiegand over the air protocol. In order to provide an enhanced level of protection against hackers, PACOM 8707 also supports the latest version of the Security Industry Association’s (SIA) Open Supervised Device Protocol (OSDP) to ensure that sniffing devices can’t be installed behind the reader or along the communications path. The use of OSDP also allows means the card reader can safely interface with control panels or other security management systems. When used in modern commercial buildings, display card readers not only have to offer a high level of security and performance – they have to look good and be user friendly too. These elements have been designed into PACOM 8707 with a timeless and user-friendly design that is based around a cutting
14 I February 2018 I IN Security
edge organic lighting emitting diode (OLED) display. This offers a solution that is much sharper than traditional liquid crystal displays (LCD) and can be read at wider angles and brighter light conditions, ensuring the information is readable in almost any environmental condition. The screen itself can be used to display both text and graphics, facilitating customisation and the opportunity to, for example, incorporate corporate logos or provide basic instructions to users on what action to take next. This is all made possible thanks to 16 backlit buttons, which are also designed to be accessible to people with disabilities. Remote and local programming and configuration couldn’t be easier. Programming cards or manual card reader programming devices are not required, as the downloading of encryption keys is carried out from PACOM Unison software, which then configures the card reader along with the rest of the security system. Alternatively, it can be locally configured through the OLED display when installed by an on-site systems integrator. Furthermore, the PACOM 8707 is highly flexible and its 10-30V DC range can accept a wider range of input voltages, ensuring that it can be installed in nearly any environment both indoors and outdoors. Gavin O’Keeffe, Global Technical Director at STANLEY Product & Technology, commented, ‘The PACOM 8707 sets a new standard in display card reader technology and elevates the functionality and performance capabilities of the PACOM Unison platform. The features we have introduced in PACOM 8707 make it the most secure, functional, flexible and user friendly device of its kind and it will meet the ever-growing demands of end users, as well cementing our leading market position.’ For more please visit www.pacom.com n
Paxton Ranks in Sunday Times 100 Best Companies to Work For Paxton, the global brand of electronic IP access control and door entry systems, has been named as one of the UK’s top employers with its 49th placed ranking in The Sunday Times 100 Best Companies to Work for 2018 list. The annual survey run by the ‘Best Companies’ organisation, recognises organisations and managers who genuinely value and respect their employees. The company was the only security manufacturer that made it onto the prestigious list. The ranking was achieved following direct feedback provided by Paxton employees, covering 8 key areas of leadership; my manager, my company, personal growth, my team, wellbeing, fair deal and giving something back. Highlights from the employee survey provided an excellent insight into what it’s like to work at the company: • 96% of staff believe they can make a valuable contribution to the success of the company • 93% agree the organisation is run on strong values & principles • 90% of people feel proud to work for Paxton Commenting on the news, Adam Stroud, Paxton’s Chief Executive said: “We’re absolutely delighted to feature on the best companies to work for list.
This is the first time we have entered, so to appear at number 49 is a fantastic achievement. This is a wonderful milestone in Paxton’s journey, it embodies our ambition to be world-class in all that we do, encompassing everything from our products and services, to our working environment. We’ve worked hard to develop a positive company culture and to support our staff on each step of their career with us. Due to the rapid expansion and year on year business growth, over the last two decades, three years has been the average time taken for Paxton to double in size. We’re now a sizeable company with over 300 employees and the incredible growth rate continues stronger than ever. However, while hard work, focus, investment and a good strategy are essential to the success of the company, most important by a long way are the people that work for Paxton. I’d like to thank all of the Paxton team, they have been responsible for our success to date, and will continue to determine the extent of our future successes.” For more information, please visit http://paxton. info/3147 n
IN Security I February 2018 I 15
WHERE INNOVATION MATTERS The Next-Generation Scalable Infotainment Platform DYNAMIC AND CUSTOMIZABLE WHILE ENHANCING SAFETY AND SECURITY. Meeting the steadily growing expectations of customers in a seamlessly connected world is one of the greatest tasks for the automotive industry. HARMAN’s Next-Generation Scalable Infotainment Platform offers a new, modular, multicore architecture and a fully open-standard software basis to ultimately fulfill the demands of digital natives.
THE PROBLEM: As modern cars become more and more connected, car hacking is becoming a serious threat. THE SOLUTION: HARMAN’s new platform offers unparalleled multi-layer security through features such as hypervisor-based domain separation and its hybrid architecture.
WWW.HARMAN.COM © 2014 HARMAN International Industries, Incorporated. All rights reserved. Features, specifications and appearance are subject to change without notice. All other company and product names used herein may be trademarks of their respective owners.
Nedap introduces slim mobile access control reader
Nedap Identification Systems launches MACE Smart: a slim multi-technology reader for mobile access control. This elegant reader is the newest addition to the MACE platform, which enables the use of smartphones in any access control system. The MACE Smart reader is able to read virtual credentials on smartphones, but also reads conventional smartcards. The MACE Smart reader will be revealed at the Intersec exhibition in Dubai, which takes place from the 21st until the 23rd of January. ”We are committed to unlocking the potential of smartphones as identification technology in access control systems,” says Maarten Mijwaart, General Manager of Nedap Identification Systems. “The release of our newest reader is proof of this commitment. In addition, we are also releasing a renewed version of the MACE Admin Portal that is used to distribute and revoke virtual access control cards. This renewed version now also has an API for seamless integration with any access control system. It is our firm belief that these innovations will help our partners to realize future proof access control solutions for their clients, whether it is for buildings, parking facilities or events.” Mobile access control With the introduction of the MACE platform last year, Nedap responded to the global shift of smartphone credentials replacing
physical cards. MACE readers support Bluetooth, NFC and QR-codes to identify people using virtual credentials, which are stored in a MACE app. MACE can be used in combination with any access control system or any other system that requires the swift identification of people, such as parking management systems or registration systems. Slim design Today Nedap introduces the MACE Smart. This mobile access control reader supports Bluetooth, NFC and smartcards and is small enough to be mullion mounted. It has a slim design, which makes this mobile access control reader the perfect solution for doors that require a combination of security and convenience. For further information please visit www.nedapidentification.com n
”We are committed to unlocking the potential of smartphones as identification technology in access control systems”
IN Security I February 2018 I 17
product and industry news
Wavestore launches version 6.10 of its Video Management Software (VMS) Wavestore, the British developer of innovative open-platform and highly secure Linux-based Video Management Software (VMS), has launched v6.10 enabling simplified camera setup alongside new features and performance enhancements. Automatic camera configuration has been introduced for ONVIF compatible cameras, greatly reducing the time it takes to set up systems on-site. Integrators can now simply discover all cameras on the network and apply common ONVIF stream settings for each camera as a Wavestore generated profile, without having to use the camera’s setup screens. For projects with a large number of servers, systems integrators can simply create a single customised configuration file and roll it out across all Wavestore units, greatly reducing the time spent when commissioning larger projects.
is time synchronised and can be played back with associated video from any selected camera.
Two-way audio Wavestore’s VMS already delivers lip-synchronised audio as standard but v6.10 fully integrates compatible ONVIF cameras with built-in microphones and speakers to be used as part of a cost-effective two-way audio system. Operators simply click the microphone button on the WaveView client for an individual camera, or a group of cameras, to converse with people or broadcast messages across a site quickly and easily. Audio is included in each channel license and recorded onto a separate track, which
Flexible “The success of Wavestore’s VMS depends more than ever on our flexibility, adaptability and responsiveness to the needs of our customers.” says Julian Inman, Head of Product Management. “Many of the enhancements we are delivering in v6.10 are in direct response to customer feedback as Wavestore’s VMS is used in an ever-increasing number of projects around the World.” For further information please visit www.wavestore.com n
18 I February 2018 I IN Security
Minimal joystick control latency In addition, major improvements have been made to minimise the latency when using joystick controls, a common problem for network-based security systems, providing users with accurate control of connected ONVIF PTZ cameras and Axis’ native HTTP PTZ protocol. Wavestore v6.10 also introduces a new ‘recording less than intended’ event rule that can be applied to individual cameras. If a configured recording period will exceed the available storage, and previous footage is in danger of being overwritten, then an event can be triggered, such as sending an e-mail to an administrator.
UNLOCK NEW MARKETS.
UL’s New European Testing Lab for Security and Access Control Devices. Your key to success in global markets combines speed with smooth efficiency. The new security testing laboratory in Frankfurt opens a portal to the market’s of Europe, Asia, the Americas and the Middle East – with comprehensive compliance solutions, cost-saving service bundles, expert European engineers, global regulatory expertise, and the advantage of a single-source provider. Test us.
UL.com/security-lab UL, the UL logo and UL certification marks are trademarks of UL LLC ©2017. All other marks are the property of their respective owners.
EU.BuildingLifeSafety@ul.com
ACCESS CONTROL
A dedicated standard Improved building access control in the United Kingdom
Building security for both commercial and multi-unit residential buildings comes in many forms and remains a top area of focus for building designers, contractors, and managers alike. The first line of security for any building often begins with basic physical attributes, including aspects such as low shrub lines, high fencing, and well-lit parking lots and property grounds, but the first line of defense for electronic security is typically a building’s access control system. By limiting building access based on a specific set of physical or electronically recognized and
20 I February 2018 I IN Security
restricted credentials, access control systems help ensure easy access for those who need it (residents, employees, etc.) while also helping to prevent potential bad actors from gaining unauthorized access. Though many of the basic principles of electronic access control apply regardless of region, some specific countries and regions have unique requirements or take an enhanced focus on building security, requiring a more dedicated approach to ensuring the proper operation of these devices. Such was the scenario in the United Kingdom (UK) when the UK Police Authorities, through its
Secured By Design (SBD) initiative, sought a dedicated standard for access control systems and equipment in the UK. To accomplish this goal and work to ensure a dedicated focus, SBD sought the partnership of UL (Underwriters Laboratories), a global safety company with a rich history of safety-science experience. Together, a dedicated UK standard – UL 293, Outline of Investigation for Access Control System Units Intended for Use in the UK - was developed to cover England, Scotland, Wales, and Northern Ireland to provide reliable guidelines to the industry.
Understanding the Basics of Access Control Access control systems provide electronic building security by using appropriate credentials – including access codes, security cards, and biometric scanners – to control and authorize access. At the authority having jurisdictions discretion, the systems support unrestricted egress from the building/dwelling to help ensure easy escape in the event of an emergency. Additionally, best practice typically requires the support of battery backup power so as to not inconveniently restrict access during power outages. As these systems rely on electronic components, such as keypads, card readers or biometric scanners, extra consideration must be given to both the functionality of the system and the physical and electronic security of the various components. Security is typically a tiered approach, involving several layers that work together to keep premises secure. The implementation of an access control system is a critical initial security layer.
Addressing the Unique Requirements of SBD Secured by Design is focused on the design and security of new and refurbished residential dwellings, commercial buildings and car parks. Through close collaboration with the industry and applicable test houses, SBD works to create and maintain high level security standards by responding to crime trends in the UK. This focus and attention to the country’s specific security needs is what led SBD to engage with UL on the development of a dedicated standard. With a century long history and depth of knowledge as a standards development organization (SDO), testing organization (TO), and certification organization (CO), UL’s experience complemented the efforts of SBD. Additionally, SBD was familiar with the benefits of the existing standard, UL 294, Standard for Access Control System Unit. The dedicated standard that resulted from this joint effort - UL 293 – was designed to complement “Secured by Design HOMES 2016” (published 2016), a crime prevention initiative specifically applied to the UK.
To help ensure recognition of and compliance with the UL 293 Standard, “HOMES 2016” references the standard directly, noting, “The technology by which the access control system operates is outlined within UL 293.” Additionally, the document outlines several requirements that access control systems must meet to be found suitable. More specifically, “HOMES 2016” requires more than the use of a restricted electronic key fob, card or other credential. The external door entry panel must be resistant to vandalism and, as an extra deterrent, should include an integral camera. Further, for resident security and convenience, the restricted access door must be connected to a remote release within the dwelling and audio/ visual communication between the occupant and the visitor is recommended. Finally, color images of those using the access system should be captured and all panel activities, visitor and resident, should be recorded and maintained for 30 days. g
IN Security I February 2018 I 21
Covered by UL 293 Testing to UL 293 must be completed by an authorized test lab and UL is the first test lab to offer such service. The standard is a performance only document that covers equipment as it is meant to be used, but it does not contain the same safety-related tests or construction requirements found in UL 294. In the EU, selfdeclaration is very common and the goal was to align with locally acceptable conformity assessment practices. Self-certification to IEC/ UL 60950-1, Information Technology Equipment - Safety - Part 1: General Requirements, is acceptable in the UK as most products fall under the Low Voltage Directive and IEC 60839-11-1, International Standard for Alarm and Electronic Security Systems, is considered a recommendation. Just as the “HOME 2016” document references UL 293, the standard also requires that installation of the access control system must be completed in accordance with the requirements set forth in “HOMES 2016.” Attack resistance is assessed based on attack performance in accordance with BS EN 1627/1630, Resistance Class 2 (RC2). Within these requirements, the product must be able to withstand a physical attack for a minimum of 3 minutes and a maximum of 23 different tools can be used during various attacks. For outdoor use equipment, water spray is addressed as part of the required ingress tests to help ensure
22 I February 2018 I IN Security
the system can withstand a 6.3 mm spray nozzle test in accordance with IEC 60529 and will not grant access as a result of ingress. Further, the standard adds requirements to address “door forced” and “door held open” trouble conditions along with the annunciation of loss of primary power to indicate the equipment is operating on standby power. Assuming normal operating conditions, requirements are also in place to address the use of industry defacto interface protocols such as Wiegand and Open Supervised Device Protocol (OSDP) formats. An overview of some additional requirements that align with international norms can be found below: • S upply-line Transients – Test performed in accordance to IEC 61000-4-12, with IEEE C62.41 noted as an alternate. • Input/Output Circuit Transients – Test performed in accordance to IEC 61000-4-5, with the legacy UL 294 access control system test noted as an alternate test method. • Variable Ambient Temperature – Products must withstand temperature exposure to 45°C, rather than 49°C as outlined in UL 294, to better reflect typical environmental conditions in the UK.
Finally, encrypted communication and line security requirements are detailed in the standard, but software cybersecurity is an everevolving challenge that is offered as a separate element of service through UL 2900 series standards. As the world becomes increasingly connected, with more products joining the internet of things (IoT) every day, guarding again a cyberattack is just as important as seeking to prevent access gained through physical means. In addition to UL 293, a third-party evaluation to a standard such as UL 29002-3, Outline of Investigation for Software Cybersecurity for NetworkConnectable Products, Part 2-3: Particular Requirements for Security and Life Safety Signaling Systems, can work in complement to assess software vulnerabilities that may be present in an access control system. Ensuring the reliable performance of an access control system is only a part of SBD’s larger focus, but it is a critical component of building security. As an element of tiered security of a building, access control panels provide much needed security and peace of mind to building owners and residents. Combining the dedicated, UK focus maintained by SBD with the standards development, testing, and certification services of UL proved to be the ideal solution to enhancing building security in a way that works to complement the efforts of the UK Police Authorities.
Access controlled… Future secured. www.automatic-systems.com
meet us at intertraffic 2016
Go Go Mobile Mobile Go Mobile with with Confidence Confidence with Confidence
April 5-8, 2016 • Stand 108, Hall 02
50 years of performance and reliability serving the highway, parking and traffic management markets
HID HIDMobile MobileAccess® Access® HID Mobile Access® Convenient, Convenient, smart smart and andsecure secure Convenient, smart and secure
sales.asgroup@automatic-systems.com
SURVEILLANCE
Intelligent devices Changing things for the better A detailed look at the future of video security
The Internet of Things (IoT) is changing the way we view video security, quite literally. Now, cameras need to be so much more than devices with which to simply capture images; they need to be far smarter than that. Today, cameras are becoming an integral part of the vast digital connectivity infrastructure, they need to be shaped into intelligent sensors that have the ability to extract invaluable data to help businesses make improvements in the area of video security, and beyond.
24 I February 2018 I IN Security
If we take the automotive industry as an example, cameras used as intelligent sensors give vehicles an incredible sense of environmental awareness, and enables them to proactively prepare for, and respond to, the surrounding driving conditions. And, because cameras can ‘see more’ with data, drivers know if it’s a person, object, or the kind of vehicle it is they’re about to encounter. In fact, Bosch has research and development located of both
automotive as well as security systems in Hildesheim, Germany. The base analytics algorithms developed for autonomous driving are also used for video analytics built-in to Bosch video security cameras. Creating limitless possibilities On a wider scale, the IoT has caused cities to transition into smart cities, whereby an existing video security infrastructure should be considered as a means to start collecting smart data to
help optimize energy consumption by controlling urban lighting according to footfall, or ensure public transport is following a timetable, or control a sequence of traffic lights to optimize traffic flow. From a business perspective, it means an initial investment in video security can also be used for other business purposes. Bosch wants to shape this change by offering intelligent cameras, combined with the expertise of industry partners such as Genetec (governmental projects), ISS (tunnels, bridges and highways), Qognify (airport projects) and Milestone (public safety). The camera is a fixture for the future Conventional sensors perform well, but they have their limitations. Whereas a motion detector can sense movement and trigger an alarm, a camera can scrutinize the whole scene in detail and provide vital information such as object type, direction, size, color and speed. Bosch has scrutinized and adapted the way we look at cameras in order for them to remain future-relevant, and end-users should too. The camera for the future is focused on information, not just imagery. Through constant innovation, Bosch
integrated an in-depth intelligence into its cameras, so they not only capture the image, but the backstory, too. With data analytics, you get the who, the what and the when. Cameras that see more are better for your privacy This may seem counterintuitive, but cameras that are more advanced, more intelligent, and deliver more information are also more effective when it comes to privacy, because these are the devices with the most progressive user management features for efficient monitoring of access to video data. Experience has taught us that the most detailed, informative data captured is virtually useless unless it has the highest level of protection to keep it secure from prying eyes. A connected device is a more secure device When a camera is connected to the internet it enables users to constantly check its operational status and push security updates when required. But as technology in a connected world gets smarter, so do the hackers, which is why cybercrime prevention is paramount. Bosch offers a full suite of data security measures. In addition to familiar steps to
gain access, such as a strong password, all communications between camera and network are encrypted (cryptographic keys are safely stored in a unique built-in Trusted Platform Module) and have advanced user management settings to control access to data. And, as an extra layer of security, the video security cameras only allow Bosch-signed firmware files to be uploaded. So, in the event of a file becoming infected or corrupted, it will no longer be recognized as the original and it will not be accepted by the camera. Defining the ‘i’ camera It’s not an understatement to say that cameras such as those by Bosch, with built-in video analytics as standard and at no additional cost, have rewritten the rules of video security. That’s not to say the basic requirements have been dismissed. On the contrary, optimum image quality, the latest ‘futureproof’ video encoding, efficient bitrate management (reductions by up to 80%) and trusted data security will always be a priority. But it’s the added information and connectivity that sets Bosch cameras apart from conventional cameras and makes them truly intelligent. The ‘i’ camera can seamlessly interact and share g
IN Security I February 2018 I 25
information with other smart devices, has the ability to perform tasks independently, and makes maximum situational awareness possible via detailed interpretation of data to ascertain the nature of an object (i.e. human or vehicular), its speed (average and maximum), direction of travel, color and size. Future-facing cameras making a difference today With partners like ISS (Intelligent Security Systems), Bosch has been able to optimize its regular camera portfolio to integrate seamlessly into the infrastructure of ‘Smart Cities’; specific examples being the development of ANPR (Automatic Number Plate Recognition) cameras, enabling real-time traffic control with an unrivalled degree of detailed information via the accurate capture of license plates, and the optimization of a city’s energy consumption via smart lighting that responds to crowd volume and movement. At airports, too, Bosch has partnered with AnyVision, NEC and ISS once again to offer complete facial recognition solutions in the security area. Another recent example that demonstrates how the relevance of these intelligent cameras is resonating with customers is
26 I February 2018 I IN Security
the Eurasia Tunnel in Turkey; an innovative, double-deck subterranean road link spanning 5km. Its unique construction and traffic configuration is quite an achievement, as is keeping that traffic flowing. By utilizing the built-in video analytics of selected cameras, the tunnel’s operators have detailed, reliable support when accidents need to be assessed immediately and accurately, not only to ensure swift dispatch of the emergency services, but also to provide the best level of information and assistance on their arrival at the scene. Essential Video Analytics or Intelligent Video Analytics? Bosch has developed smart video analytics in two formats, Essential Video Analytics and Intelligent Video Analytics, but which is best for you? Essential Video Analytics is ideal for regular applications, providing the ideal support for business intelligence (inter-network data transfer, for example), advanced intrusion detection for heightened safeguarding of commercial premises, quick and accurate retrieval of data, and bespoke control via alerts that can be set for specific locations or circumstances. Intelligent Video Analytics has
all the capabilities of Essential Video Analytics, but has additional features specifically developed to make a critical difference in extreme situations. For example, in more expansive areas, like an airport perimeter fence, the system is ideal as it has the range and capability to provide analysis over large distances such as this. With a moving camera it is also possible to capture data on objects in transit, thanks to its Intelligent Tracking. What’s more, for roadside use, Intelligent Video Analytics is resistant against the most thunderous of vibrations, whilst in certain extreme weather conditions it can still operate where others fail and continue to detect objects in heavy rain or snow. Imagery is only half the story Bosch’ intention is to capture data that is not only useful but gets used. It may surprise you to learn that, on average, only 10% of data captured gets used. Bosch aims to push that figure closer to 100%, by making intelligent cameras that are invaluable in making the streets safer, cars smarter, and businesses more profitable. Bosch believes the future of video security is more than just an image. For further information please visit https://www.boschsecurity.
BUSINESS DATA SURVEILLANCE CAMERA
TRAFFIC CAMERA
REMOTE INTERACTION REMOTE NETWORK
Smarter visualization Networked visualization leading to smarter decision making A reliable networked visualization solution is indispensable to monitor, analyze, and share an ever increasing number of video and data sources all over the world. That is why Barco designed its networked visualization solution, the simplest and most flexible way to securely distribute any information to any location. The result: faster and smarter decision-making.
Learn more about networked visualization at www.barco.com/netviz
EXHIBITION
SCTX18 Global experts gather at SCTX18 to fight war on terror
Since the breakup of the caliphate in Syria, the terrorist threat has evolved as extremists now remain in their home countries and look to launch attacks from inside their borders. This has presented those tasked with protecting nations, businesses and the public with new challenges as security forces constantly fight to stay one step ahead of the threat. Covering over 13,000 sqm, the show is the largest national security event in the UK, enabling 304 companies to showcase their latest products, technologies and services alongside 10 conferences, 2 live demo areas and the world-renowned, World Counter Terror Congress. David Thompson, Event Director at UK Security Week, commented: “The threat posed by terrorists has never been more diverse from the simplicity of knives and hire vehicles to technologicallyadvanced cybercriminals. It’s vital that nations, security professionals and the public are fully informed of the most effective methods of
28 I February 2018 I IN Security
protection to mitigate these threats – we specifically tailored this year’s programme to respond to these challenges.” The World Counter Terror Congress The showpiece of this year’s event was the World Counter Terror Congress, which was attended by over 700 VIPs, delegates and highranking police officers and chaired by Richard Barrett, Coordinator of the Al-Qaeda/Taliban monitoring team of the United Nations Security Council. The event featured worldrenowned speakers such as the Metropolitan Police’s Assistant Commissioner, Mark Rowley; Sir Julian King, European Commissioner for the Security Union and Michael McGarrity, Assistant Director of Counterterrorism Division at the Federal Bureau of Investigations (FBI). In Mark Rowley’s final public appearance before retiring, the UK’s national lead for counter terrorism policing, delivered a strategic
overview of operations under his command, heavily criticising technology companies for their lack of proactivity in working with the police having failed to make a single direct referral to them about terrorist activity on their sites. As part of the most international line-up the conference has ever featured, Michael McGarrity, reviewed FBI operations on detecting, deterring and disrupting threats to the United States while Christian Rousseau from the Government of Canda’s Integrated Terrorist Assessment Centre discussed the Canadian approach to the evolving terrorist threat. Richard Walton, former Head of the Counter Terrorism Command for the Metropolitan Police Service added: “Extremist propaganda has changed course over the past year, encouraging attacks to be launched from home nations with terrorists opting for crude methods utilising everyday services such as hire vehicles. This has led to a whole
new set of challenges for security professionals to address in order to prevent attacks and protect the public. “Terrorism is a global challenge and it is vital that nations collaborate and work together on a global scale with events such as the World Counter Terror Congress which provides a vital platform for the sharing of best practice and the most effective counter terrorist strategies.” In addition, SCTX provided a series of free-to-attend conferences focussing on the ever-growing cyber threat, infrastructure, border and transport security. Located on the show floor, the sessions were at full capacity on both days, with visitors keen to hear the latest thinking from the industry’s foremost experts. Countering the cyber threat The cyber industry, now worth an estimated £3.4bn, is one of the most rapidly evolving threats facing security professionals today. This
year’s Cyber Threat Intelligence Conference, run in association with techUK and sponsored by Genetec and Darktrace, gathered cyber experts from all over the world to discuss how best to protect against cyberattacks whether on individuals, businesses, or governments. Key speakers included: Sir Julian King, European Commissioner for the Security Union for the European Commission and NATO’s Merle Maigre, Director at the Cooperative Cyber Defence Centre of Excellence. Chairing the conference again this year, Talal Rajab, techUK’s Head of Programme, Cyber, National Security, added: “Every year, we face new and innovative attacks as cybercriminals look to exploit gaps in cyber protection. Now, we’re facing a new challenge in the fight against the dissemination of extremist propaganda online. “Additionally, organisations must adhere to specific requirements with GDPR and the NIS Directive coming into force in May or face
serious ramifications. SCTX is the best place to stay on top of the latest developments in the industry and learn about the most effective levels of protection for you and your organisation.” Infrastructure and business protection The Critical National Infrastructure & Business Reliance conference, sponsored by Surelock McGill and Pelco, brought together security experts in protecting businesses and assets essential for the protection of everyday life. Key speakers included Mr Chris Flynn, Security Operations Lead, Data Security Centre - NHS Digital and Dr Anja von Wulffen, Desk Office, Directorate II Risk Management; International Affairs Federal Office of Civil Protection and Disaster Assistance (BBK). A platform for innovation SCTX saw a record number of product launches at the show this year with companies showcasing the latest, cutting-edge products from across the sector. On day one, g
IN Security I February 2018 I 29
SCTX18 Review
SCTX18 suppliers and experts working in protective security and this helps our understanding of the important innovations taking place in the sector. We look forward to attending again in 2019.”
Chemring Technology Solutions announced LORIS, the world’s highest energy radio initiator while BrainChip exhibited its AI video analysis software that find faces and objects 20 times more quickly than a human operator. Catherine Pouret, Project Officer, EU Commission remarked: “We are delighted to be at the show which has been a great experience for us and our beneficiaries. It’s a really productive way of meeting such a diverse mix of people – all in one place. We’ve had some very good leads so far and look forward to doing more at the show next year.” Integrating security solutions The evolution of recent attacks has led the industry towards a more integrated approach combining capabilities across multiple security verticals. This type of multi-layered solution was demonstrated in action for the first time at SCTX’s Integrated Security Showcase. Public and private sector buyers, influencers and government delegations from across the globe
30 I February 2018 I IN Security
were guided through the feature to see how different technologies such as facial recognition scanners, blast doors and perimeter fences all work together into an operations control centre. The showcase featured leading suppliers such as: Custom Consoles, Warrior Doors, Chemring Technology Solutions, Technocover. Bosch, BlokNmesh, Hill and Smith, Integrated Design Limited and Harp Visual Systems. Detective Chief Superintendent Scott Wilson, National Coordinator for Protective Security, commented: “The current threat from terrorism, both in the UK and internationally, means it is vital police work closely with commercial organisations to improve our collective security. “Events like SCTX give us chance to showcase the tools we have available to help companies increase their understanding of the issues and measures they should be taking. “This year senior officers had the opportunity to meet many leading
Award-winning products This year also played host to the inaugural Counter Terror Awards, run in association with Counter Terror Business magazine and hosted by Sir Michael Fallon. The awards were staged to recognise the efforts of both public and private sector organisations and their contributions to counter terror strategies in the UK and abroad. Director of award-winner, Audax, Adam Liardet commented: “Having hosted The European Commissioner for Security Union, Sir Julian King, at our stand we were then thrilled to receive the Communications Systems Award at the Counter Terror Awards presented by Sir Michael Fallon. “For an SME to be able to engage at this level, is evidence enough that the Security & Counter Terror Expo provides opportunities and delivers where other events just don’t come close, it will come as no surprise we have already booked for next year.” Planning for the 2019 event Clarion Events announced that the next edition of SCTX will return to London on 5-6 March 2019 for UK Security Week. Event Director, David Thompson, added: “The 2018 show was our most successful yet and we’re looking to take 2019 to the next stage. We introduced many new features this year to ensure that the show remains the UK’s leading national security and counter terror event and at the forefront of strategic discussion and product innovation. This raised the bar yet again and we’re looking forward to working with our key partners over the coming months to maintain that success into next year’s show.” For more please visit https: www.counterterrorexpo.com/welcome
EVENT SECURITY
Show must go on Security tips for events this Summer
Every year, over 7,000 major outdoor events are held in the UK, with over 85 million people attending festivals and events. However, with an increase in attacks over recent years, it’s crucial that there are security measures in place to keep all attendees, workers and acts safe. Here, First Fence, a leading supplier of security measures, discuss what security steps you can take, to minimise any risks.
32 I February 2018 I IN Security
Metal Detectors & Bag Searches Following last year’s devastating atrocities in Manchester and London, festivals have upped their security to reduce the terrorist threats that are ever-looming. One of the main problems with such attacks is the non-sophisticated and random nature of them. Festival workers have received additional training to carry out more comprehensive bag searches, whilst ensuring that festival goers
aren’t held up too much. Last year, organisers at Leeds Festival only allowed people to take bags into the arena that were smaller than an A4 sheet of paper. It’s recommended that all festival goers minimise their luggage so as not to slow queues down; or take multiple trips through the barriers, as opposed to carrying all bags through in one go. With Coachella taking place in April in California, workers have recently received emergency
training to specifically deal with mass shootings; in addition to the standard metal detectors. Whilst it’s sad that we should even have to consider these eventualities, it’s important that everyone stays safe. By planning for all possible scenarios, it means that everyone can enjoy the festival, and feel safe.
Educate the Public Festival organisers have been encouraged to advise members of the public to educate themselves on what they should do, should they find themselves in the horrific situation of a terrorist attack. The government has produced a handy leaflet, detailing what to do if people find themselves in the midst of a weapons attack, and have also created a stay safe video. It’s important that you give this information to your staff in advance and ensure everyone is on the same page. This year, to help keep your security tight at your upcoming festival, educate attendees on how they can stay safe should such
an incident happen. Hopefully it will never come to that, but it’s better to be safe than sorry.
Crowd Control Security measures need to be put in place before your event even starts: get an idea of numbers attending, and carry out a risk assessment. Ensure there are plenty of entrances and exits, and create a clear concourse for people to walk through. Consider any temporary structures that could collapse, and the eventuality that people may try climbing on structures and equipment. Having barriers in place can be beneficial for crowds, especially due to an increase in the number of vehicles being driven into large crowds (something which the Edinburgh Fringe advocated last year). However, the other thing to consider with barriers and fences, is the possibility (however slight), that a crowd surge could result in people being crushed. To help keep festival goers secure, ensure all of your workers are 100% clear on their roles
and responsibilities. You can’t go wrong with hiring several stewards, as they can show people around, and monitor crowds for any suspicious behaviour.
Work with Local Authorities Doing risk assessments and having backup plans for all eventualities is a great way to up security at your festival, but you can help to make attendees even safer by working with local authorities, emergency services and the police. Once you’ve developed an emergency plan, share it with them, and they can advise you on anything you may have missed, or let you know if there’s a better, more effective way of doing something. In your plan, don’t forget to include key members of the emergency services such as the nearest police station and fire rescue services. Try and obtain one or two key contact names at each of these so someone is then aware of your event. g
IN Security I February 2018 I 33
Ultimately, festivals are a place to have fun, enjoy the many live acts and spend time with friends Other security considerations There are additional steps and measures you can take to ensure your event or festival is secure and runs smooth. Remember, preparation is the key:
Security staff budget? Set your stall out early with a budget for your security measures. This is not a time to cut corners however, so you’ll need a robust budget that is realistic. You will need basic security staff covering all exits and entrances, a few dotted around the venue and a room or cordoned off area for security HQ.
Plan for the worst Hopefully you won’t need it but having a plan of action should the worst occur is vital. Ensure all your staff are aware of the emergency evacuation procedure
34 I February 2018 I IN Security
for guests, VIP’s or performers and themselves too. Have a contact list and a safe route to the nearest hospital available and put together a robust plan for locking down the venue should a major incident occur.
through walkie talkies or radios. However, for larger events, why not invest in temporary CCTV? You can then have a member of the team keeping a birdseye view on your event and prevent problems before they occur.
Size judgements
Ultimately, festivals are a place to have fun, enjoy the many live acts and spend time with friends; and whilst chance of an attack is unlikely, it’s something that you need to consider, should the unthinkable happen. By planning ahead with these four tips, you can help to ensure your festival runs smoothly, whilst knowing that everyone is as safe as they can possibly be.
You can’t be everywhere at once, so depending on the size of your event or festival, you may want to put together silo teams who can handle security. If you have hired an external security team, their should be a team manager or supervisor that you can consult with and make sure you’re on the same page with event policies.
Invest in technology Again, this comes down to the size of your event. As a minimum, all your security staff should have direct communications
Club ClubCar Cartakes takesto tothe thestreets streets
Club ClubCar Carisisnow nowstreet streetlegal legalininevery every country countryininthe theEU. EU. Club ClubCar’s Car’selectric electricutility utilityvehicles vehicles offer offerananattractive attractivealternative alternativetoto traditional traditionalpetrol-powered petrol-poweredvehicles. vehicles. For Fora astart startthere’s there’snonopetrol petrolcosts costs – –and andzero zeroemissions. emissions. Club ClubCar’s Car’svehicles vehicleshave havethe thepower power totoperform performnumerous numerouscampus campustasks, tasks, from frommail maildelivery deliverytotosecurity security and andmaintenance. maintenance. Want Wanttotoknow knowmore? more? Contact Contactyour yourClub ClubCar Car representative representativetoday. today.
STREET STREETLEGAL LEGAL www.clubcar.com www.clubcar.com info_esa@clubcar.com info_esa@clubcar.com (+44) (+44)777 777180 1805463 5463
BRITISH SECURITY INDUSTRY ASSOCIATION
Data destruction Seeking professional help in disposing of your data is a wise investment, but what exactly does it mean to be ‘GDPR compliant?’ James Kelly, CEO, British Security Industry Association As the deadline to data changes under the General Data Protection Regulation (GDPR) looms nearer, companies and organisations across the UK will have been taking steps to ensure that they fall in line with the new procedures. A crucial part of this process will have been in procuring the right services to ensure their data storage adheres to the changes. From May, organisations will not only have to prove that they have taken an audit on their data but also prove that that they have taken the right steps to destroy data that is no longer relevant. After this date any company seen to not be in compliance with the new rules are at risk of compromising their business.
36 I February 2018 I IN Security
So what are the tangible risks? Top of the list of will be a raft of financial penalties being issued by the Information Commissioner’s Office (ICO), or even prosecution of those who commit criminal offences under the Act. The ICO can currently issue businesses that display poor data management in breach of the Data Protection Act with fines of up to £500,000. The largest of these fines so far was £400,000, issued to two separate companies (Keurboom Communications Ltd and TalkTalk Telecom Group PLC). In addition, there have been 19 prosecutions for criminal offences committed under the Data Protection Act during the same time period. Under GDPR fines
can be up to 4 percent of annual global turnover or 20 million Euros. The other most common risk will be reputational damage leading to potential lost business; as customers are becoming increasingly aware and concerned about how businesses collect and use their personal information, businesses run the risk of losing customer confidence in the brand where they feel that their privacy is not being protected or respected. A loss in customer confidence ultimately leads to financial loss. When it comes to information destruction, the seventh principle of the Data Protection Act stipulates that appropriate measures must
be taken against accidental loss, destruction or damage to personal data and against unlawful processing of the data. So when the new GDPR legislation comes into force at the end of May, companies in both the private and public sectors will need to prove that data is securely erased in line with the new guidelines, and show that they are fully accountable for monitoring, reviewing and assessing relevant processing procedures. How do we mitigate against these potentially expensive and reputational hazards when it comes to disposing of data no longer needed? Shredding confidential material is costly and time consuming, which for some firms means in-house data shredding is not a viable option, and this is true for those handling vast amounts of data across a variety of sites. In these situations outsourcing to a regulated information destruction (ID) organisation is the most practical alternative. By engaging a company who specialises in this service, either on or off site at a high-security shredding facility gives organisations the reassurance that it is being done
to the highest standard. Registered data shredders have to comply to the highest industry standards which are regularly updated and providing this service has to be able to demonstrate that they are certified to EN15713 – the European standard for data destruction. This standard sets out the measures that organisations should take to maintain the security of confidential data and provides recommendations relating to the management and control of collection, transportation and destruction of confidential material to ensure such material is disposed of safely and securely. GDPR represents a great opportunity for information destruction companies. In the current climate there has been increased demand for these services from both new and existing customers, asking about GDPR and how information destruction can assist. But even with all this help at hand there is still confusion around what it means to be fully ‘GDPR compliant’; not just from the point of view of the customer - but also, how does it affect the industry itself as holders of their own data? Industry feedback from customers
shows varying levels of concern, from companies looking for accreditation to others happy with a downloaded template data policy or standard T&C’s to others simply ignoring the deadline. From an industry standpoint there are three elements that could affect information destruction as a business; their own data responsibilities, the shredding services provided for the destruction of data as a data processor, and marketing to opted-in existing and prospective clients. These elements are all currently open to interpretation (both by experts and customers) and are most likely common across all industries, so it is arguable that even with all this information at hand companies are still not fully aware of their obligations, no matter how robustly laid out by the ISO. Of course some of these issues opens up opportunities for companies dealing with data to create new services from these companies but it shows that even at this late date there is still work to do in communicating what companies need to do and so close to a major data milestone. g
g IN Security I February 2018 I 37
What is data destruction? Secure data destruction is the process of destroying confidential materials to the point that they cannot be reconstituted. These materials can take many forms, including paper, computer harddrives, branded products and uniforms, but crucially, they all hold the potential to cause problems for business, employees or customers if they fall into the wrong hands. Information Destruction companies provide a range of services to help businesses of all sizes to protect themselves from the risks associated with data loss or theft. Shredding of materials can take place at business premises using a mobile shredding vehicle, or materials can be collected and shredded at a high-security shredding facility. Whether confidential materials are shredded on-site or at a high-security shredding facility, businesses that outsource their shredding to a professional service provider can be assured that the data will be completely destroyed. Additionally, the services provided by an information destruction company extend far beyond the
38 I February 2018 I IN Security
actual destruction of confidential material. These services can also include secure document storage, data security advice and guidance, office clearance and recycling. Every business will collect and generate confidential information relating to its operations, its employees or its customers. When this information is no longer required, there can be severe consequences for the data subjects if the information is not correctly disposed of and subsequently falls into the wrong hands. Therefore, any business that collects, holds, processes or disposes of a person’s personal information has a responsibility to ensure that it is protected from loss or theft. In fact, since the Data Protection Act was passed in 1998, there has been a legal obligation for businesses to act responsibly with regards to how they use personal information. Under the Data Protection Act 1998, everyone responsible for using data has to follow the data protection principles. These include ensuring that data is used fairly and lawfully; for limited, specifically stated purposes; used in a way that is
adequate, relevant and not excessive; accurate; kept for no longer than is absolutely necessary; handled according to people’s data protection rights; kept safe and secure; and is not transferred outside the European Economic Area without adequate protection. This is all set to change as of 25th May 2018, when the General Data Protection Regulation (GDPR) comes into effect in the UK. The GDPR will have potentially significant impacts on the ways in which UK businesses collect and process the personal data of individuals. All organisations globally are obligated to provide evidence of compliance and can be fined for any data breach. Failure to comply could lead to tough financial penalties. The definition of personal data is now broader there will be stricter rules for obtaining consent as a legal basis for processing personal data. As a data controller a company must have a legal basis for processing and collecting personal data and must ensure adequate contracts are in place to govern data processors. For further information, please visit www.bsia.co.uk
Multifocal sensor technology
The ultimate solution for stadium safety & security
Video surveillance without limits – unprecedented resolution in minute detail Dallmeier UK Phone +44(0) 117 3039303 dallmeieruk@dallmeier.com
www.dallmeier.com DallmeierPanomeraStadien_186x129_UK.indd 1
23.10.2017 15:04:20
The Pioneer in Key-Centric Access Control Solutions
SECURE ALL ACCESS POINTS
› › › › ›
Retrofits into existing hardware No hardwiring required Cost effective Receive audit trails and denied access alerts Local representation
Electronic Access Control MARKETS WE REACH:
› › › › ›
Utilities Water Power Churches
› › › ›
EMS Critical Facilities Traffic Vending
Schools
AND MORE!
Contact Us cyberlock.com | 541.738.5500 support@cyberlock.com sales@cyberlock.com [GCO 4031]
product Listings
Astute Electronics
DSX manufactures integrated
Barco
Falken At Falken, we are a fully
Astute Electronics promises to deliver customers the best Quality, Service and Reliability. Astute is both an Electronic Components distributor and a global and UK parts supplier. The company’s highly-qualified team is experienced in procurement, engineering, logistics, finance, program management and QA. www.astute.co.uk
BUSINESS DATA SURVEILLANCE CAMERA
Barco designs and develops visualization solutions for the security market. With its own facilities for Sales & Marketing, Customer Support, R&D and Manufacturing in Europe, North America and Asia Pacific, Barco is active in more than 90 countries with 4,000 employees worldwide. Barco posted sales of 1.158 billion euro in 2013. www.barco.com/references
TRAFFIC CAMERA
REMOTE INTERACTION REMOTE NETWORK
Smarter visualization Networked visualization leading to smarter decision making
solutions for the access control and security industries. Based in Dallas, DSX designs all software and hardware in house. The company motto is: ‘Integrated Solutions and real world applications are what we do best.’ DSX products are sold worldwide through a network of factory-trained dealers. Dealers are located in the US, Canada, Mexico, Latin and South America, Europe, Middle East, Australia and the Pacific Rim, and Nigeria amongst others. www.dsxinc.com
licensed, registered, and insured professional service, equipment, manufacturing and retail supply firm. Founded and staffed by former law enforcement officers and retired military personnel, we have grown to become a trusted and secure global provider. www.falken.us
A reliable networked visualization solution is indispensable to monitor, analyze, and share an ever increasing number of video and data sources all over the world. That is why Barco designed its networked visualization solution, the simplest and most flexible way to securely distribute any information to any location. The result: faster and smarter decision-making.
Bosch Security Systems
Learn more about networked visualization at www.barco.com/netviz
14090.BARCO.resize.ad.in security.netviz.indd 1
24/04/14 15:43
Offer an extensive portfolio of innovative, high-quality, ergonomic products and systems for security, safety and communication. Our product range includes video surveillance systems with state-of-the-art IP-solutions, access control systems, intrusion detection systems, fire detection and evacuation systems, security management systems, paging and personal security systems and public address and conference solutions. www.boschsecuritysystems.com
FLIR FLIR Systems, Inc. is the global leader in Infrared cameras, night vision and thermal imaging systems. Our products play pivotal roles in a wide range of industrial, commercial and government activities in more than 60 countries. www.flir.com
pt
Dallmeier One of the world
leading providers of products for network-based video surveillance solutions, already has more than 30 years experience in the development and manufacture of high quality components and complete solutions for the CCTV/IP sector. www.dallmeier-electronic.com
grated
mm
hall 4, stand D80
06.02.2012 11:05:55
40 I February 2018 I IN Security
Safeotronic SAFE-O-TRONIC is a smart and keyless locking solution for doors, cabinets, lockers and furniture. Its advanced access control features provide facilities managers with the flexibility and management control required in today’s demanding workplace environments. SAFE-O-TRONIC can be used in numerous applications – Hotels, Hospitals, Spas, Gyms, Office Furniture, Cabinets, Lockers. The list is endless... www.safeotronic.com
To have your company included in this listing contact Wayne Banks on +44 (0) 1622 201207
Honeywell Security Group
Paxton Access Ltd is a leading manufacturer of electronic access control systems. From its inception Paxton has aimed for engineering excellence. This means designing and manufacturing intelligent and innovative products that are fit for their purpose. We have become a market leader through our constant efforts to exceed the expectations of installers and system users. www.paxton.co.uk
Keytracker Ltd
Samsung Security
delivers the newest innovations, technologies and products. Honeywell is driven to maintain its position as an innovator and leading manufacturer, and invests continuously in R&D. Each of the product ranges regularly delivers new features and technological advancements, while maintaining a familiar user interface and backwards compatibility for ease of installation. Honeywell is a world leading security business. www.security.honeywell.com
Secure Storage & Management for all Keys & Equipment Mechanical & electronic tracking to suit all budgets & applications, low spec to high tech – the world’s largest range of tracking systems for keys & equipment. Keytracker Ltd, Keyper House, Unit 3, Station Road, Rowley Regis, West Midlands, B65 0JY sales@keytracker.co.uk www.keytracker.com
Samsung Techwin is one of the fastest growing professional security brands in Europe. Providing a complete range of security solutions that are suitable for a wide range of applications, the company is dedicated to developing technology and products that its clients demand. www.samsungsecurity.com
The leading global M2M managed services provider
It’s good to be well connected.
Dual vision, Real time. Keysure
ULISSE COMPACT THERMAL The positioning unit offers an integrated solution for total darkness, fog, rain or smoke.
KEYSURE’s patented Key Control container is a pilfer proof, tamper evident key safe. This is the only non-electronic security device that will control and audit the use of a key, password or any other content. Once an item is secured inside the Key Control, it must be physically broken to access the contents. www.keysure.net CCTV PRODUCTS
Your M2M solution is more than just data connectivity. We understand that.
Videotec Dual vision, Real time.
So we not only built the world’s most advanced global M2M platform, we also built our business upon the most important connections of all – our relationships with our partners, carriers and customers.in-house Videotec manufactures
ULISSE COMPACT THERMAL a wide CCTV products That’s why Wyless is the trusted M2Mrange partnerof of Fortune 500 companies
The positioning unit offalike. ers an integrated and startups We’re the easiest company to work with. We listen to our solution for total darkness, fog, rain or smoke. customers and take pride in every connection.
recognized for high performances, flexibility and style. Our mission to Wyless offers truly uncompromising M2M solutions, delivering worldwide lead the field in the development wireless connectivity via the most secure and resilient network infrastructure. We provide unrivaled management tools and empower with end-to-end of robust, reliable andyou high managed services, technical expertise and dedicated support. performances mechanical and So connect with the experts and together we’ll take your to the electronic products forapplications surveillance next level. You have found your true M2M partner. applications is the driving force We can’t wait to discuss the possibilities. behind our success. www.videotec.com
www.videotec.com
CCTV PRODUCTS www.videotec.com
Wyless Systems
Luminite Luminite have been designing and manufacturing PIR detection systems for 35 years and have extensive expertise in the security market. Their flagship Genesis wireless security range provides rapid, flexible and robust solutions to minimise installation costs and maximise profits. www.luminite.co.uk
+1 617 949 8900
Our award-winning M2M platform, delivered in partnership with the world’s largest mobile network operators, provides secure, reliable wireless connectivity to mobile and fixed devices in nearly every country in the world. Our unique products and services help our customers deploy robust, scalable and secure applications. +44 1895M2M 454 699 info@wyless.com www.wyless.com www.wyless.com
The leading global M2M managed services provider
It’s good to be well connected. Your M2M solution is more than just data connectivity. We understand that. So we not only built the world’s most advanced global M2M platform, we also built our business upon the most important connections of all – our relationships with our partners, carriers and customers. That’s why Wyless is the trusted M2M partner of Fortune 500 companies and startups alike. We’re the easiest company to work with. We listen to our customers and take pride in every connection.