In Security September 2019

Page 1

The magazine wiTh The inside sTory on securiTy ISSUE 41 SEptEmbEr 2019

campUS SURvEILLaNcE ESTaBLIShINg a BaLaNcE BETWEEN pERSoNaL fREEDomS aND SafETY IN UNIvERSITIES

06 INDUSTRY NEWS

20 DESIgNED To SUccEED

28 ThE NEED foR aWaRENESS

36 REDUcINg ThE RISk

Latest developments from the security industry

Why Secured by Design (SBD) improves security

The need for cybersecurity in smart buildings

minimising the exposure to digital sabotage


eCLIQ: The key to electronic locking eCLIQ is a durable and secure electronic locking system utilizing web-based software campaigns.assaabloyopeningsolutions.eu/ecliq

For small businesses

CLIQ® Go app enables you to manage your system on the run

For complex businesses

CLIQ® Web-Manager and CLIQ® Connect app help to manage access rights of mobile workforces using Bluetooth®

For all businesses

CLIQ® Web-Manager for small to medium sized businesses that want to manage access rights, anytime from anywhere


ISSUE 26 SEptEmbEr 2016

Commentary

W

The magazine wiTh The inside sTory on securiTy ISSUE 41 SEptEmbEr 2019

In SEcUrIty ThE magazINE WITh ThE INSIDE SToRY oN SEcURITY

campUS SURvEILLaNcE ESTaBLIShINg a BaLaNcE BETWEEN pERSoNaL fREEDomS aND SafETY IN UNIvERSITIES

www.In-SEcUrIty.EU

06 INDUSTRY NEWS Latest developments from the security industry

20 DESIgNED To SUccEED

Why Secured by Design (SBD) improves security

28 ThE NEED foR aWaRENESS The need for cybersecurity in smart buildings

36 REDUcINg ThE RISk

minimising the exposure to digital sabotage

Editor Chris Hewett editorial@mebmedia.co.uk Accounts Jay Kempisty accounts@mebmedia.co.uk Publisher Wayne Banks +44 (0)1622 201207 wayne.banks@mebmedia.co.uk Designer Mark Fisher production@mebmedia.co.uk Published by MEB Media Limited 13 Princes Street Maidstone Kent ME14 1UR United Kingdom

elcome to the September issue of In Security. With the glorious summer weather still fresh in our memories, the focus moves to the second half of the year where we can expect some exciting new developments. This issue’s Product & Industry News section (starting on page 8) showcases the latest headlines from the industry. Our cover story is from Richard Jenkins, Chief Executive at National Security Inspectorate (NSI) and takes a closer look at Campus surveillance, and the challenges of establishing a balance between personal freedoms and safety in universities (see page 2). James Gray, Projects Manager at Videx UK, a leading manufacturer and supplier of audio and video door entry intercoms and access control systems in the UK, explains why Secured by Design (SBD) accredited systems play an important role

in improving security (see page 20). Mimoto Parking has installed cutting edge access control and intrusion detection technology from PACOM across its facilities, so owners can keep their motorbikes safe and secure (see page 24). The intensifying need for cybersecurity in smart buildings By Mirel Sehic, Global Director Cybersecurity, Honeywell Building Solutions (see page 28). Manufacturer uniformity that embraces planning, implementation and maintenance, ensure project success and turnkey security systems (see page 32). Finally, a look how to minimise the exposure to digital sabotage of network connected equipment, software and systems used in electronic security systems (see page 36). Chris Hewett, Editor n

Tel: +44 (0)1622 201207, Fax: +44 (0)1622 210207 info@mebmedia.co.uk www.mebmedia.co.uk Articles and art may not be reproduced or reprinted without the express written permission of the publisher. Exclusion of Liability Although every effort will be made to ensure the accuracy of all materials published, the publisher takes no responsibility for errors or omissions.

02

06

20

Copyright © MEB Media Ltd – 2019, all rights reserved.

24 Contents 02 Cover Story – Campus surveillance Establishing a balance between personal freedoms and safety in universities

24 Secure parking PACOM helps Mimoto Parking keep Spain’s motorbikes safe and secure

06 Product & Industry News All the latest developments from the security industry

28 Manufacturer uniformity “Single Source” or “Best of Breed” for Video Security?

20 Designed to succeed Why Secured by Design (SBD) systems improve security

32 The need for awarenesss The intensifying need for cybersecurity in smart buildings

28 36

36 Reducing the risk Minimising the exposure to digital sabotage

IN Security I September 2019 I 1


Cover Story

Campus surveillance Establishing a balance between personal freedoms and safety in universities Richard Jenkins, Chief Executive at National Security Inspectorate (NSI). UKAS accredited NSI is the UK’s leading, independent third party certification body in the security systems, fire safety and guarding services sectors, helping to protect businesses, public organisations, homeowners and the general public through rigorous audit of more than 1800 security and fire safety providers nationwide. Most university campus’ are ‘open’ environments where in one way, shape or form, people are free to roam. This poses a number of significant security challenges. High volumes of people visiting daily include teaching and support staff, students and visitors, event delegates and others. Universities are increasingly considering security arrangements in light

2 I September 2019 I IN Security

of physical assaults, theft of equipment, and of course the constant vigil against potential terrorist threat. They are spaces where rightly, people should feel safe and able to trust measures are in place to counter these risks. Surveillance camera technologies are at the forefront of monitoring and managing digital video in security. The increased functionality of video analytic technology, ANPR (automatic number plate recognition) and facial recognition makes them increasingly powerful. Improving image resolution, data capture and intelligent retrieval apps continue to develop at a pace. Although excellent deterrents and means of data gathering, widening use means the scrutiny of personal data protection and privacy is all the more important.

Principles and practice for CCTV operation The British Standard Code of Practice BS 7958 outlines the principles and practice involved in the management and operation of CCTV. Amongst other things it provides a framework for the detailing of clear policy and objectives in the use of a CCTV system, the secure storage of recorded images and the release of information - to statutory prosecuting bodies, including the Police and members of the public. It can then be used as a management framework for ensuring best practice in all aspects of management and operation of CCTV systems, including guidance on working conditions, appropriate use of equipment, the management of recorded information, and legal


considerations including privacy and disclosure. Installers can gain a Certificate of Approval from NSI against the full provisions of BS 7958 when they are able to demonstrate full compliance. It is an assurance of professionally and competently run operations, symbolised by the award and usage of the NSI medal and logo. By requiring contractors to hold NSI approval against specific Annexes to BS 7958, universities can rest assured they will be employing the services of fully trained and security screened contracted staff to work in their in-house control rooms and sub-contracted CCTV monitoring services in external control rooms. Whether outsourced or managed in-house, CCTV managed and operated in accordance with BS 7958 provides security managers with significant confidence that operations are fit for purpose. Installing and maintaining CCTV equipment NSI recently upgraded its own code of practice (NCP 104 Issue 3) for the design, installation and maintenance of CCTV systems. The newly revised code of practice is based on BS EN 62676-4 and provides installers with a structured

approach to determining user requirements through appropriate risk assessment and site survey. With modern digital camera systems providing high definition images, better accuracy in the recording and retrieval of information, and increasingly facial recognition, appropriate quality management and control systems must be in place. These ensure the correct use of CCTV surveillance and recording for the intended purpose, the security of recorded data, a guarantee that rights to privacy are protected, and that latest security software updates are rigorously applied to protect from cyber threats. Images and feeds from surveillance cameras Although it is commonly understood that CCTV operatives must be licensed, so also should their line management and executive. It can be the case that organisations running internal CCTV operations are unaware of these requirements and how they help to improve quality of operations. It can happen that organisations have contracted with partners to provide management and operation of CCTV and misread the importance and need for licensed staff. Organisations should

review the SIA website and guidance related to SIA licensing to ensure they are operating within the law for CCTV monitoring. www.sia. homeoffice.gov.uk/Pages/licensingcctv.aspx Public Space Surveillance The Surveillance Camera Commissioner‘s (SCC) surveillance camera strategy provides direction and leadership in the security community, and helps CCTV system operators understand good practice as well as their legal obligations (e.g. regarding Protection of Freedoms Act, Data Protection Act and Private Security Industry Act). The Surveillance Camera Code of Practice raises standards by enabling surveillance providers to benchmark themselves, encourage continual improvement, and ensure surveillance is robust and fit for purpose. This helps to deliver public confidence. The Code sets out 12 guiding principles, striking a balance between protecting the public and upholding civil liberties. The principles provide a coherent and comprehensive structure enabling sound, transparent decision-making in regard to the use of surveillance cameras. ➔

IN Security I September 2019 I 3


The 12 principles are as follows: • The purpose of the system • Privacy impact assessment • Transparency and access to information • Clear roles and responsibilities and good governance arrangements • Policies and procedures on the use of the system • Policies for the use and storage of images • Clearly defined rules for access to information Plans for maintaining standards in the use and • deployment of surveillance • Security of captured information • Effective review and audit mechanisms • Value of images as evidence for the criminal justice system Consideration of other surveillance • technologies that are in place Since being appointed, the SCC has also created a series of tools to support the operators of public space surveillance camera equipment. The first was a self-assessment tool. Now there are four selfassessment tools to choose from as well as a third party assessment scheme. CCTV • automatic number plate recognition (ANPR) • body worn video (BWV) • unmanned aerial vehicles (UAVs) and drones NSI approval CCTV companies can demonstrate commitment to good practice by way of the Certificates of Approval they hold issued by independent third party assessing bodies.

4 I September 2019 I IN Security

NSI Gold approval includes certification to BS EN ISO 9001 (for a company’s Quality Management System) as well as its adherence to the relevant product standards such as BS 7958 and/or NSI Code of Practice NCP 104. NSI is accredited by the United Kingdom Accreditation Service (UKAS), the UK’s sole National Accreditation Body, responsible for determining, in the public interest, the technical competence and integrity of organisations such as those offering certification services. UKAS accreditation signifies NSI’s impartiality, operation of its certification schemes and issue of Certificates of Approval in accordance with International Standards for Accredited Certification of Management Systems such as ISO 9001 and Product Standards pertinent to security and fire safety such as BS 7958 for CCTV. Companies that benchmark themselves against NSI approval schemes demonstrate commitment to the highest standards of competence in the delivery, operation, management and monitoring of CCTV and security services delivering protection of personal data for people on university campus’, deterrence of antisocial behaviour and unwanted intruders, and effective evidence sharing with law enforcement bodies when the need arises. NSI approval provides assurance to university facilities managers that installers, operators and the management of CCTV systems and control rooms deliver consistent best practice in surveillance to protect individual freedoms and help keep people safe. For further information please visit www.nsi.org.uk n


OLYMPIA LONDON, 3 4 DECEMBER 2019 Co-located with

375+

13,500+

Exhibitors

Global Ve�ed Visitors

THE WORLD'S PREMIER GOVERNMENT & END USER EVENT

50+

Officially Hosted Country Delega�ons

STRATEGIC PARTNERS

NEW FOR 2019

Book your stand now www.interna onalsecurityexpo.com


product and industry news

Siemens to revamp luggage screening at Spain’s five busiest airports

Siemens will modernize the existing security systems for luggage control at Spain’s five busiest airports. The contract for the luggage inspection systems at the airports of Madrid, Barcelona, Malaga, Palma de Mallorca and Gran Canaria has a volume of around 164 million euros. The customer is AENA (Aeropuertos Españoles y Navegación Aérea), the Spanish semi-governmental airport operator. With 264 million passengers and more than one million tons of freight in 2018, AENA is one of the world’s largest airport operators. The new luggage inspection systems from Siemens will help to significantly increase traveler safety. At the same time, passengers can be handled more quickly and travel more comfortably. The Siemens solution can analyze up to 1800 pieces of luggage per hour automatically. Thanks to the modern scanner solutions for luggage screening with the Hi-SCAN 10080 XCT equipment, AENA will be able to comply with the recently tightened security regulations of the European Civil Aviation Conference (ECAC). Their new “Security Standard 3” requires, among other things, that computer tomography technology and video analysis software be used to automatically identify explosives when

6 I September 2019 I IN Security

scanning luggage. Depending on requirements, the HI-SCAN 10080 XBT CT scanner delivers twoor three-dimensional images in medical image quality. Suspicious bag content is specially marked on the screen, which facilitates the work of the surveillance personnel. AENA’s contract with Siemens will run for four years. In addition to the actual safety equipment, it also includes systems and software for operational management and remote monitoring. The Siemens company Tecosa, which specializes in security, will implement the project, which was awarded in a public tender, together with the device manufacturer Smith Detection. Once the systems are up and running, Siemens will maintain them for at least three years. “The security challenges for airports are constantly growing. They have to handle more and more people and their luggage safely, day after day. We are very pleased with the order from our longstanding customer AENA, who entrusts us with the modernization of their luggage control systems,” says Pedro Sanz, General Director at Siemens Tecosa. For further information on Siemens Smart Infrastructure, please see www.siemens.com/ smart-infrastructure n


Wavestore offers multiple video display areas

Wavestore has introduced an updated version of its open-platform and highly secure Linux-based Video Management Software (VMS). Wavestore v6.18 sees the introduction of several innovative features including new flexible display choices, enhanced audio support and additional file storage options, all of which are intended to deliver real-life practical benefits to users who wish to obtain maximum value from their video surveillance systems. Multiple Video Display Areas Wavestore is now able to provide up to 4 video display areas (VDAs) on a single client PC, greatly expanding the video workspace that is available to operators. A simple right-click on a mouse enables the adding or removal of a VDA, each of which can simultaneously display both live and recorded video. Connected cameras can be easily dragged from a device tree into one or more of the VDAs, with the option to configure Wavestore to auto-save the various displays for future use. Network File System Support v6.18 strengthens Wavestore’s compatibility with a wide range of third-party external storage devices, including those which support Network File System (NFS) protocols. “Wavestore has its own high-performance proprietary data storage system called Large Allocation Storage System (LASS), which enables a host of leading features such as lightning-fast search, HyperRAID™

and EcoStore™,” said Julian Inman, Head of Product Management for Wavestore. “However, we appreciate that some end-user clients may wish or need to continue to use existing file systems which use NFS protocols. The new functionality we have introduced in Wavestore v6.18 gives them the freedom to do so.” Audio-only IP Device Support Until now, Wavestore has only been able to provide two-way audio communication via suitably featured video surveillance cameras. Wavestore v6.18 enables the deliver of audio and talkback even if there is no related video available, which is perfect for the growth in use of network speakers. Users can choose to enable the audio input source and talkback independently. Other key features built into Wavestore v6.18 include: • On-Screen PTZ control with optical zoom in/out via a mouse wheel. • Multiple camera stream compatibility, e.g. the option for three separate streams, each at different frame rates or resolutions • Additional functionality when using Wavestore’s PTZ keyboard such as display area selection and camera wash & wipe control • Moxa Input/Output (IO) module support • Improved camera error reporting with clearer messages • Performance statistics gathering which can be downloaded as CSV For further information please visit www.wavestore.com n

IN Security IN Security I September I June 2015 2019 I 7


product and industry news

New shock sensors from Texecom take perimeter protection to the next level The new Impaq S Series shock sensors from Texecom take perimeter protection to the next level. They provide a step-change in shock detection performance, utilising VIBER™ Accelerometer Technology for class-leading – and standardsexceeding – intruder detection. Shock sensors are designed to detect and analyse a forcible shock and provide early warning of an attempted intrusion before a break-in occurs, ensuring the safety of people and property inside. The new EN50131-2-8 European Standard for vibration detectors mandates stringent performance criteria across a wide range of surface materials. The Impaq S Series exceeds these requirements and has been independently certified to Grade 2 by Kiwa Telefication. The new range features: • Impaq S (shock sensor) • Impaq SC (shock and contact sensor) • Impaq SC-W (wireless shock and contact sensor with Ricochet® mesh technology) With five digital sensitivity settings, the Impaq S Series is available in white, brown and anthracite grey, to match the most popular uPVC, wooden and aluminium frames. They can also be mounted on concrete. Impaq SC and SC-W also allow the

8 I September 2019 I IN Security

magnet to be installed on either side of the device, increasing location flexibility. Impaq S and Impaq SC are compatible with Texecom and all popular industry standard panels, while the Impaq SC-W is compatible with Ricochet® enabled Texecom Premier Elite and Premier panels. VIBER™ Accelerometer Technology VIBER™ Accelerometer Technology provides a much higher level of accuracy for vibration detection compared to piezoelectric technology, as found in non-conforming products. It is highly sensitive to sub-surface shock transmissions resulting from attempted forced entry, and completely immune to airborne-based high frequency noise. The result is a shock sensing technology with unparalleled catch performance while actively discriminating against false alarm sources. Unlike piezo-based shock sensors, VIBER™ Accelerometer Technology detects in all three dimensions, increasing installation flexibility as the device can be mounted in any orientation. The Impaq S - setting the standard for shock sensor performance. For further information please visit www.texe.com n


Club ClubCar Cartakes takesto tothe thestreets streets

Club ClubCar Carisisnow nowstreet streetlegal legalininevery every country countryininthe theEU. EU. Club ClubCar’s Car’selectric electricutility utilityvehicles vehicles offer offerananattractive attractivealternative alternativetoto traditional traditionalpetrol-powered petrol-poweredvehicles. vehicles. For Fora astart startthere’s there’snonopetrol petrolcosts costs – –and andzero zeroemissions. emissions. Club ClubCar’s Car’svehicles vehicleshave havethe thepower power totoperform performnumerous numerouscampus campustasks, tasks, from frommail maildelivery deliverytotosecurity security and andmaintenance. maintenance. Want Wanttotoknow knowmore? more? Contact Contactyour yourClub ClubCar Car representative representativetoday. today.

STREET STREETLEGAL LEGAL www.clubcar.com www.clubcar.com info_esa@clubcar.com info_esa@clubcar.com (+44) (+44)777 777180 1805463 5463


product and industry news

Amthal locks up smart key management with Keyzapp

Electronic Fire and security company Amthal required a system to improve key management processes, especially as the business has seen significant growth with an increased number of customer keys being kept on site for property protection, maintenance and monitoring services. Keyzapp was selected due to its flexible design. This enabled Amthal to create a system that was easy for authorised engineers to operate, whilst management could rely on audit control capability for all key transactions, without the need for a dedicated member of staff 24/7 manually issuing and recording them. Says Simon Kendall, Amthal Supply Chain Leader: “Amthal has a growing network of dedicated engineers that work across the country, with varying access requirements for customer’s keys that are all kept at Amthal offices. Completing manual audits for keys taken had become increasingly time consuming to ensure awareness of allocations and traceability. “The implementation of Keyzapp’s system has made such a difference. It’s really automated our complete process and has proven to save the engineering team valuable time and resource, which they can dedicate to better serving our customers. It runs itself in the background and if there is an issue, it can be resolved quickly and efficiently.” Keyzapp’s simple management solutions are designed using latest technology to decrease downtime and improve work efficiencies. The ability to further add control to key access with smart credentials and audit capability ensures full visibility of keys at any time.

10 I September 2019 I IN Security

Tim Hill, Keyzapp Director added: “What Amthal demonstrates is the importance of attention to key control. We worked with the team to tailor our system around the business requirements for asset management, including allowing 24 / 7 access with no need for dedicated staff issuing keys. So impressed with Keyzapp, Amthal is now working on a bespoke system to manage the specialist loan equipment being booked in and out of its office stores and warehouse, to reflect the same level of traceability and visibility for valuable equipment. Jamie Allam, Commercial Director Amthal Fire & Security concluded: “Keyzapp had an instant impact on the whole team, with improved time and operational savings. Our engineers find it simple to use, and we’ve even recorded improved site attendance times. Plus the management capability is great from our perspective to help towards the efficient, operational running of our business.” Independently owned, Amthal Fire & Security is dedicated to satisfying end user needs for security safety and convenience offering design, installation, service and remote monitoring of advanced electronic fire & security solutions, including intruder, Fire, Access and CCTV systems. Amthal Fire & Security is accredited by the Security Systems and Alarm Inspection Board (SSAIB) United Kingdom Accreditation Services (UKAS) and British Approvals for Fire Equipment (BAFE.) For more information on Keyzapp, please visit www.keyzapp.com n


Videx enhances its MiAccess range Videx, a leading manufacturer and supplier in access control and door entry systems, has improved its standalone offline Mifare proximity access solution, MiAccess, by introducing a new handle to compliment the current range of readers. The handle, with a brushed aluminium finish, is a standalone and surface mount addition that includes an integrated offline MiFare proximity fob/card reader that is battery powered from an internal 6V lithium battery allowing up to 60,000 operations on average. Sian Luxton, Access Control Manager at Videx, said: “The AL500-MF door handle can provide access to an unlimited number of users and used to create a multiple door system, making it ideal for a range of buildings which require specific access control solutions and minimum disruption during install. Installation is simple as no wiring is required. It’s designed to mount onto internal wooden doors ranging from 35mm to 55mm thickness. The handle is reversible for mounting onto left-hand or right-hand opening doors.” The handle can be used standalone or as part of a

multiple entrance system comprising of both handles and MiAccess readers. It is compatible with both the free PROA MS and PROH MS MiAccess software, where programming, configuration settings and event logs can be transferred between the PC and the reader using micro-USB or Mifare cards. The programmed information is transferred from the card to the reader and from the reader to the card so there is no need for a connection between the readers and the PC. User cards are created via the software with the PROX-USB desktop enrolment reader where access rights are saved directly to the user’s card. Programming cards are also created in the same way to configure the reader’s settings. Other helpful features include the ability to collect events directly from the reader via the micro-USB port or from a programmed ‘events collect card’, ‘black list’ cards that have been lost or stolen (up to 500 cards) and personalise access rights for each user to restrict the users access to certain times, days and readers. For more information about the AL500-MF, please visit: www.videxuk.com n

IN Security I September 2019 I 11


product and industry news

New antimicrobial-protected access control devices kill 99.9 per cent of prevalent bacteria

Contamination of clean environments could soon become a thing of the past, as Remsdaq launches its EntroPad range of access control readers, keypads and request to exit buttons with antimicrobial protection built in. Third party testing to ISO 22196:2011 proves the integral antimicrobial protection on the new EntroPad devices kills up to 99.99% of E. coli and Staphylococcus aureus bacteria over a 24-hour period. This makes the EntroPad range ideal for use in access-controlled areas in hospitals, laboratories, surgeries, food manufacturing & preparation companies. Robin Koffler, sales and marketing director at Remsdaq says: “Without antimicrobial protection, access control devices can become a breeding ground for a wide range of highly infectious bacteria.

12 I September 2019 I IN Security

“Every card reader, keypad or request to exit button touched by an infected person becomes a virtual petri dish, incubating and potentially distributing bacteria to anybody who comes into contact with the device next. The new EntroPad access control devices help to eliminate this issue, reducing sick days caused by bacteria transmission and preserving the integrity of secure environments.” System agnostic, the EntroPad range is designed to work with any Wiegand-compatible access control system, including the Remsdaq Entro range of 2-door and 8-door controllers. An OSDP version will be made available later in the year. Further information at: www.remsdaq.com/ solutions/integrated-security-systems n


UNLOCK NEW MARKETS.

UL’s New European Testing Lab for Security and Access Control Devices. Your key to success in global markets combines speed with smooth efficiency. The new security testing laboratory in Frankfurt opens a portal to the market’s of Europe, Asia, the Americas and the Middle East – with comprehensive compliance solutions, cost-saving service bundles, expert European engineers, global regulatory expertise, and the advantage of a single-source provider. Test us.

UL.com/security-lab UL, the UL logo and UL certification marks are trademarks of UL LLC ©2017. All other marks are the property of their respective owners.

EU.BuildingLifeSafety@ul.com


product and industry news

Advantage CLIQ®: key access control where the power is already in your pocket

London, September 2019 – In a world where many electronic access systems offer greater convenience and flexibility than mechanical keys, what can really make the difference? Instead of being tied to mains electricity, what if you could carry the power with you?. With a CLIQ® wireless access control system, a battery inside each key powers all your electromechanical CLIQ® cylinders and padlocks. Authorised key-holders carry a single batterypowered key programmed with only their pre-defined access permissions. Keeping the solution’s power source independent of the locks and padlocks makes CLIQ® management and operation more efficient. Keys have a typical battery life of 5 years. When it is time to change the battery, anyone can do it. No expert needed, and no need to visit all your CLIQ® locks to reprogram or check their power. With CLIQ®, all the power you need is in your key. CLIQ® locks have other advantages, too. Because CLIQ® devices are wireless and battery-powered, you do not need cabling around the door. There is no need for any invasive electrical wiring when you install CLIQ® key access control. And thanks to CLIQ®’s menu of software options, you decide how to manage your users’ access rights. CLIQ® Local Manager can administer your system via a local software installation; the CLIQ® Web

14 I September 2019 I IN Security

Manager runs securely in the cloud. ASSA ABLOY also offers a convenient Software as a Service solution option with round-the-clock support, maintenance and incident reporting as standard, and Service Level Agreements delivering data redundancy and up to 99.5% availability. eCLIQ, the fully electronic application of CLIQ® technology A fully electronic addition to the CLIQ® portfolio, the eCLIQ wireless access system is built around secure microelectronics with AES encryption. Robust and durable, eCLIQ electronic cylinders are available for doors, cabinets, lifts, alarm boxes, machines and entrance gates. An integrated lubricant reservoir ensures they remain maintenance-free for up to 200,000 cycles. “This evolution of our award-winning CLIQ® technology is already protecting businesses and public services across Europe,” says Stephan Schulz, CLIQ® Product Manager at ASSA ABLOY Opening Solutions EMEA. “Organizations in a range of sectors, and with differing building types — from Italy’s Creval Bank to University Hospital Frankfurt — have learned that eCLIQ provides the control and flexibility their premises need.” To learn how your buildings would benefit from an eCLIQ electronic key locking system, visit https:// assaabloyopeningsolutions.eu/ecliq n


New all-in-one licence plate reader is the simple and accessible solution for automatic vehicle identification

People and vehicle access control specialist Nortech is now offering Nedap’s ANPR Lumo, an advanced licence plate camera for vehicle access control. The ANPR Lumo is an all-in-one licence plate camera, including embedded software, analyser and IR illuminator. With a range of action of 2 to 10 metres, the advanced camera ensures a smooth recognition of vehicles. Typical applications include vehicle access control, automatic toll collection, free flow applications at parking facilities or other situations in which it not desirable to issue RFID tags. If vehicles need to be granted access temporarily or incidentally, the licence plate camera is the perfect solution. Features include: Standalone solution - The ANPR Lumo offers built-in vehicle access control features. The option to configure time-based access control lists (white list, black list, ignore list, etc.) in the web based software enables the camera to be used as a standalone solution. High accuracy – The deep learning algorithms enable a high accuracy with common license plate formats, like Europe, and regions with non-standardised license plate formats, such as the USA and Pacific. In addition, the ANPR Lumo is able to recognise ADR Hazard Identification Numbers (HIN), also known as Kemler Codes, which are used for the road transport of dangerous goods. Libraries - The ANPR Lumo covers a broad list of countries supporting a large range of IR-reflective license plates.

User-friendly configuration - The web based software enables easy configuration of the ANPR Lumo. It allows for configuration of the output messages for RS485, Wiegand or Ethernet. In addition, digital I/O, region of interest and network settings can be defined. REST interface - The ANPR Lumo is equipped with a REST API that allows third parties to easily integrate the camera. The REST interface enables third party systems to request the last read licence plate and add licence plates to the white list. Easy installation - A mounting bracket is included as standard with the ANPR Lumo to ensure easy installation. With this bracket, the licence plate camera can be mounted onto a wall or pole and allows the camera to be adjusted to ensure reliable reading. Communication interfaces - The ANPR Lumo supports the industry-standard communication interfaces: RS485, Wiegand and Ethernet. This enables seamless integration into any existing or new access control/parking system. Wiegand interface - Most access control panels support Wiegand. The ANPR Lumo converts licence plate numbers into Wiegand ID strings and the built-in Wiegand option ensures easy and seamless integration into any new or existing access control panel. Further information is available from visiting the company’s website at www.nortechcontrol.com n

IN Security I September 2019 I 15


Access controlled… Future secured. www.automatic-systems.com

meet us at intertraffic 2016

Go Mobile with Confidence

April 5-8, 2016 • Stand 108, Hall 02

50 years of performance and reliability serving the highway, parking and traffic management markets

HID Mobile Access®

Convenient, smart and secure

sales.asgroup@automatic-systems.com


Technology convergence creating integrated building security solutions within commercial residential sector

Building security for the commercial residential property marketplace is rapidly changing with the convergence of technology according to Julian Synett, CEO of Interphone Limited. Speaking at the company’s recent product exhibition and training day in central London, he said that many security solutions now combine different connected systems – such as door entry, access control, CCTV and home automation – with a number of key drivers helping to deliver enhanced building protection, resident safety and property management. Biometrics is increasingly being deployed in access control solutions, with more traditional fob-and card-based systems being replaced and beginning to disappear. In fact, there is a surprisingly long list of applications, which means the technology is being used in a few different ways within the commercial residential sector. In particular, facial recognition is now beginning to enter the marketplace, so moving forward it will have a greater presence alongside the more established fingerprint solutions. Smartphones can now be used to open doors, or activate a wide range of actions, with keys rapidly being consigned to history. Perhaps the next breakthrough will be microchipping under the skin, although there is a long way to go before it overcomes ethical and privacy concerns. However, a report last year in Sweden showed that 3,000 people have already been microchipped to gain access to homes and offices. Cloud technology has been around for a long time and is now used in the commercial residential sector in far reaching ways. Software and data are being more

and more hosted and stored online, while software as a service (SaaS) solutions can provide alternative pricing models to outright purchase such as pay-as you-go or rental. However, property managers need to be mindful of broadband quality and capacity when selecting an option, with Synett suggesting that hybrid solutions – combining both on-premise and cloud technology – might currently be the best way of achieving the necessary security, performance and peace of mind. Meanwhile, machine learning and artificial intelligence (AI) is going to have a growing influence on security technology, especially CCTV where there are six million cameras already operational in the UK. The annual product exhibition and training day was attended by managing agents, facilities managers and other property-related professionals. Interphone teamed up with several key partners to showcase the latest building technology developments for the commercial residential sector. This ran alongside a programme of seminars including Gate Safety by leading charity Gate Safe and GDPR for property management businesses by Woolven and Brown, a professional training specialist on data protection legislation. Interphone’s next CPD training seminar is on Health & Safety and Fire Safety Awareness. It takes place on 6th November 2019 at the company’s head office in Harrow and will be supported by specialist consultants Safety Delivery Limited. Further details about the practical learning session can be found at http://interphone.co.uk n

IN Security I September 2019 I 17


product and industry news

Fast and reliable detection of smoke and flames

Video-based fire detection AVIOTEC from Bosch optimized for tunnels • Early and reliable detection of smoke and flames in dark environments • Parallel traffic surveillance minimizes the risk of accidents • Additional lenses increase detection range Munich – Bosch’s video-based fire detection solution AVIOTEC IP starlight 8000 can now also be used in tunnels to ensure reliable and early detection of smoke and flames. Therefore, it is a quick and cost-effective addition to the linear heat detectors commonly used, which react only to noticeable increases in temperature and are unable to detect smoke either. In addition, the viewing of incidents also enables immediate verification of alarms and is a valuable aid for the emergency services. Reliable fire detection even in challenging lighting conditions The new version of AVIOTEC is based on smoke and flames detection algorithms specially developed for use in tunnels, which have been optimized in comprehensive tests in real environments. The cameras require only seven lux ambient light to reliably detect smoke and flames using the integrated intelligent video analysis. For use in tunnels, Bosch has also more than doubled the detection range from 50 to over 100 meters by using new lenses. This corresponds to the usual distance between cameras for video surveillance in such environments. Thus, AVIOTEC allows the same cameras to be used for video surveillance as well as fire detection and thereby reduces investments and operating expenses.

18 I September 2019 I IN Security

Minimizing of accident risks through simultaneous video surveillance In such scenarios, video surveillance also benefits from the intelligent video analysis in the cameras. By continuously tracking movement curves, they can automatically detect stationary vehicles as well as drivers driving the wrong way or people on the road. As with the detection of smoke or flames, a message is also generated in these cases so that the safety personnel can immediately take appropriate measures and minimize the risk of an accident. Intelligent video analysis is implemented in the cameras themselves and therefore does not require a central server, which could represent a so-called “single point of failure”. AVIOTEC also records machine-searchable metadata of all scenes, thus enabling very rapid forensics when investigating the cause of a fire or an accident. Even before this update, AVIOTEC was the first solution for video-based fire detection to pass the demanding test procedure of German VdS Schadenverhütung GmbH. VdS had conducted the test procedure in accordance with the VdS guidelines 2203 “Requirements for fire protection software” and the “Specifications for testing flame detectors”. In April 2019, AVIOTEC IP starlight also received certification according to the Australian standard CSIRO TS010 for video-based fire detection systems. Apart from tunnels, as a VdS and CSIRO certified solution, AVIOTEC is suitable to improve early fire and flame detection in almost every building with large dimensions as it avoids the need of smoke or heat to migrate to the sensor. AVIOTEC can thus be used in large warehouses, hangars, extensive shopping centers, generator halls and similar structures. Operators who are already using an AVIOTEC solution can upgrade to the new version with a free firmware update. In existing applications where a longer range is required, an upgrade can also include a purchasing of the new lens. Additional information is available online at www.bosch.com n



ACCESS CONTROL

Designed to succeed James Gray, Projects Manager at Videx UK, a leading manufacturer and supplier of audio and video door entry intercoms and access control systems in the UK, explains why Secured by Design (SBD) accredited systems play an important role in improving security and reducing anti-social behaviour for local authorities and housing associations. He also discusses why local authority and housing association contractors, specifiers and developers need to know about SBD and the role it plays in crime prevention.

20 I September 2019 I IN Security


“Secured by Design (SBD) is the UK police initiative for designing out crime by physical security, that aims to reduce crime through effective environmental design. The scheme calls for the installation of security products within local authority and housing association developments, that meet police approved standards. The principles of Secured by Design have been proven to achieve a reduction of crime risk by up to 75% and significant reductions in anti-social behaviour, which is why it’s such an important recognition in the local authority and housing sector. All door entry, access control and associated physical security products should carry the SBD accreditation, whether this is housing association property, assisted living, high rise flats or apartment blocks - the standard should always be followed to assure maximum security as well as meeting the specific entry needs. Crime prevention within the local authority and housing association sector is a key priority. The aim of ‘Designing Out Crime’ is to reduce the vulnerability of people and property to crime by removing opportunities that may be unintentionally provided by the surrounding environment. Many high-rise social housing blocks are

used as shortcuts and hangouts by non-residents especially estates that have a multiple entrance layout. Residential developments without adequate security are potential magnets for disruptive and criminal behaviour. This, in turn, can affect the quality of life for residents and often results in buildings becoming a popular place for criminal behaviour such as drug use and associated crime. Access control and door entry systems are now available to help overcome common issues including anti-social behaviour (such as noise, intimidation and assault) and benefit fraud, often key challenges facing local authorities and housing associations. Reports can be prepared showing fob activity and logging which flats visitors call at, when a conversation starts and ends, and when exit buttons are pressed to leave the building. When used in conjunction with CCTV, these reports can provide useful information which can aid in any investigations helping to improve resident’s safety and security as well as bolster crime prevention. Without adequate access control, vandals can easily access a building often resulting in ongoing repair costs and an unpleasant environment for residents to live in, making them feel unsafe and

less likely to respect the property themselves. As a member SBD company, Videx has taken the principles of designing out crime and applied them to the specification and development of Police Preferred Specification’ products. It means we work regularly with local authority and housing association specifiers, developers and contractors, explaining the role of regulated, crime-reducing door entry systems that are cost-effective too. Investment in Secured by Design accredited and bespoke door entry systems that are flexible to meet current and ongoing specific entry needs should they evolve is vital. One popular system that we provide is the Secured by Design accredited VX2200 system, which is a popular choice amongst local authorities and housing associations, which can be tailored to meet specific entry needs. It is an extremely flexible system which can accommodate individual houses through to large blocks with multiple entrances, such as housing association accommodation. Concierge facilities are also available for this system allowing a concierge to be used either on site or remotely via an IP or ethernet connection. Videx offers a range of door ➔

IN Security I September 2019 I 21


panel styles ranging from modular through to vandal resistant and several different styles of apartment video monitors and telephones. An important feature of the VX2200 system is the ability to monitor events that are happening within the building or property in real time, to keep track of calls and access within the building because it helps to reduce anti-social behaviour. Events can be filtered to find specific incidents that have occurred within the property and can be viewed on any device such as a tablet, mobile phone, laptop or PC. Additionally, email alerts can be set up when important events take place during certain times or days. For example, an alert can be set to send an email should a door or gate be opened excessively during the night or when access is not permitted. SBD has recently updated its legalisation and there now exists a Secured by Design National

22 I September 2019 I IN Security

Building Approval that provides installers, specifiers, contractors and developers with a more efficient and simplified route to compliance. New SBD guidelines state that any residential or commercial developments that provide over 25 dwellings must capture and record colour images of those who use the property’s door entry system. The Videx memory videophone, for example, offers this feature and is a popular choice for local authorities and housing associations. Critically, on board memory can store up to 100 pictures and it provides the capability of recording images onto an SD Card. The key to manufacturing and providing a good access control system is to ensure its bespoke to the entry needs it meets. This is not just limited to the look, size and feel of the external door panel. Videx can, for example, also fully adapt the system’s software to meet the end user’s needs. For instance, we have provided bespoke software options which allow multiple doors to open upon authorisation and remain open following very specific commands from the user, often a great benefit for local authority and housing association developments.

Engraving a system is also part of this bespoke service. As well as featuring engraving for apartment numbers, we can also provide a specific logo, company name or block name on the panel, which is especially useful in local authority and housing association buildings. Whether it’s high rise flats or supported living accommodation, engraving is extremely useful because it enables call buttons to be specifically named or labelled, helping the caller to speak to the right person or department when they visit. Engraving can also be used to highlight an out-ofhours or emergency contact or reception / concierge service for example. Videx works with several local authority and housing association developers, specifiers and contractors across the UK, to help provide the most appropriate access control system that meets specific entry needs of end users. If you would like to discuss how we can assist you on your current or future development projects to meet door entry and access control Secured by Design standards, Please visit: www.videxuk.com n



parking

Secure parking PACOM helps Mimoto Parking keep Spain’s motorbikes safe and secure

24 I September 2019 I IN Security


With the use of motorbikes on the rise all over Spain, Mimoto Parking has installed cutting edge access control and intrusion detection technology from PACOM across its facilities, so owners can keep their motorbikes safe and secure. It’s no surprise that a growing number of people are turning to motorbikes as their primary method of transport due to Spanish cities becoming increasingly congested. In fact, according to a 2016 study by the Institute of Environmental Science and Technology (ICTAUAB) and the UAB Department of Geography, Barcelona is now the European city with the highest number of motorbikes per inhabitant. The research found that 372,278 trips are made on motorbikes every day in the city. Motorbikes began to experience a boom in 2004 when the Spanish government enacted a regulatory measure that allowed car drivers with three years of experience to switch to motorbikes with capacity up to 125cc. The ability to avoid congestion and complete journeys more quickly promoted exponential growth. Although this has brought many benefits, it has also created a significant

problem for users – where to park their motorbikes. Unattended motorbikes are vulnerable to theft and vandalism, so protecting them has become a key concern. Similarly, city councils are cracking down on illegally parked motorbikes that obstruct access, and are removing them from pavements and other areas. It’s this situation that prompted Alicante-based motorcyclist, Alejandro Martin, to create Mimoto Parking, along with two other biking friends. As the company’s managing director, he takes up the story and explains, ‘We want our customers to be able to keep their motorbikes secure and avoid the fines associated with illegal parking. By creating conveniently located facilities that can be accessed at street level, without the need to negotiate dangerous ramps, we have reinvented the parking concept. We offer a revolutionary service where owners can safely park and also store belongings such as helmets, jackets and gloves in lockers. Users can access our parking lots on a 24/7 basis and go about their business without worrying about their motorbike’s security.’

User experience Although it only operates a few sites at the moment, the response has been incredible and Mimoto Parking has plans to operate over 40 facilities by 2021 and, in order to finance this rapid expansion, Alejandro Martin and his team are looking to attract additional funding from interested parties. The company’s success is down to the fact that Mimoto Parking has simplicity at its heart. By registering online for free, a user is sent a six digit personal and non-transferable access code to obtain a parking space. They then identify the facility that is most convenient, key in the six-digit code via a keypad when they arrive, and enter and park. Utilising a ‘pay as you go’ concept, when leaving users simply reenter the same six digit code at which point Mimoto Parking automatically charges them for the duration of their stay. Each facility is remotely monitored at all times via Ralset’s alarm receiving centre (ARC) and a full intercom system offers users assistance when they need it. Alejandro Martin says, ‘When developing Mimoto Parking we knew that our success would hinge on our ability to implement ➔

IN Security I September 2019 I 25


access control and intrusion detection technology that could not only guarantee the highest levels of security but also be intuitive, straightforward to roll-out across multiple sites, and be as reliable as possible. In order to find out more about what we could do, we invited leading security integrator and PACOM approved partner, Cettec Seguridad, to come in and hear about our requirements.’ Put into practice Cettec Seguridad configured a solution based around the PACOM 8002 integrated access and alarm controller – an allin-one platform that integrates the functionality required for a remote security system. PACOM 8002 supports auto-discovery of peripheral devices for simplified installation and all doors can be individually configured to operate via card only, PIN only, or card and PIN, with access schedules providing additional control. Furthermore, doors and alarm points can be partitioned into different areas of security and controlled by multiple keypads. The PACOM 8002 system would have to integrate seamlessly with Mimoto Parking’s mobile app and allow the ARC to monitor

26 I September 2019 I IN Security

events at all times. Alfonso Lorenzo Robledano, business development director for Southern Europe at PACOM, states, ‘Cettec Seguridad asked us to make some adaptations to the PACOM Graphical Management System (GMS), which is based on a data communications platform that successfully integrates access control, alarm monitoring, video surveillance and many other building services into a single, remotely accessible system. PACOM’s technical experts were able to modify the software’s algorithms and design new schematics to meet Mimoto Parking’s exact requirements and, in addition, deliver uninterrupted system operation, intelligent selftesting and multiple back-ups.’ As well as allowing customers to communicate directly with personnel at the ARC, the modified PACOM GMS can also manage the parking occupancy status at each site. Signs can be operated to indicate availability and the system can even be remotely reset when necessary. This level of scalability also means that new technologies can simply be added to as they are developed, offering Mimoto Parking the ability to further develop the system as required and future proof its investment.

Just as importantly, PACOM and Cettec Seguridad collaborated to ensure that the system can be quickly and easily rolled out across any new sites as they are acquired. Each system controls one entry and one exit door using a single controller and keypad, which means minimal wiring and allows minor adjustments to be made as necessary. Success story Mimoto Parking’s Alejandro Martin is delighted with what has been achieved and praised PACOM’s willingness to work closely with his team and Cettec Seguridad to devise a unique solution. He concludes, ‘Our ability to keep customers’ motorbikes secure is fundamental to our success and therefore we needed to be 100 per cent confident that the technology we installed was able to meet this objective. PACOM’s experts were a pleasure to deal with and as keen as we were to optimise our entire security and access control infrastructure. I’m looking forward to working together in the future as we expand Mimoto Parking and introduce new sites to our portfolio.’ For further information please visit www.pacom.com



SURVEILLANCE

Manufacturer uniformity

Manufacturer uniformity that embraces planning, implementation and maintenance, ensure project success and turnkey security systems.

Decision makers often find themselves confronted with this question when they have to choose between a comprehensive video security solution from one manufacturer and the products and services of several different providers. Heterogeneous system landscapes and the increasing complexity of projects are prompting more and more customers to long for a return to “manufacturer uniformity”. The driving arguments behind this trend are criteria such as high interoperability and clear responsibilities.

28 I September 2019 I IN Security

Standards as the basis for “best of breed” Assembling the components for a video security system in a “best of breed” approach means not to rely solely on a particular manufacturer. Instead, security or IT decision makers put together those components which they think meet the performance requirements most completely. Standards such as ONVIF are intended to guarantee interoperability and users then expect that this combination will deliver the best overall solution.

More manufacturer uniformity sometimes provides customer benefit The realm of high-tech is characterized by products in which short-term innovations often provide a considerable customer benefit. If innovations support industrial standards, it will be a simple matter to combine products from several different manufacturers. It is, however, regularly discovered that such standards only represent the “lowest common denominator”. In many cases, innovative products have special features which cannot


“Single Source” or “Best of Breed” for Video Security? be implemented into systems from another provider. If the product in question is used as a part of a “best of breed” solution, the performance of the system as a whole might be throttled and limit the customer benefit. Furthermore, suppliers are transforming increasingly to total solution providers, and offer systems that are closely interwoven to provide the benefits desired. When components (e.g. camera, recording, software), from only one manufacturer are used, this frequently means they are truly compatible to each other. This is particularly important, when the quality of the video data must meet certain criteria, for example for video analysis systems. Privacy and Security by Design Advocates of manufacturer uniformity are particularly fond of privacy and security in support of their argument: If the components from different manufacturers are not seamlessly integrated, compliance may not be guaranteed and heavy fines depending on the severity of a data protection violation may be the result. Similar consequences may also arise with regard to data security in the case of a misunderstood “best of breed” approach: As IoT devices, video security systems nowadays are a popular target for cyber-attacks. Manufacturers counter this with

interlocking technical functions (“Privacy by Design” and “Security by Design”). In this case, more uniformity often means better integration of the technical functions and therewith reduced vulnerability. Consulting, planning and implementation from a single source But there are important arguments in favour of the “single source” approach on more than just the technical level: As soon as the requirements and objectives of a project have been defined, manufacturers can contribute valuable consulting services: By definition, they have the greatest expertise regarding their products, and they can often draw on an extensive fund of experience from previously completed projects. When it comes to the graphical planning of a solution, 3D planning departments of some manufacturers are able to create “digital twins” of customer environments and exactly simulate the entire solution, including cameras and other components. Important aspects such as required minimum resolution densities (e.g. according to the standard IEC 62676-4), compliance, data protection or even requests to customize software components can be dealt with in advance. Ultimately, implementation and successful operation represent

the last major challenge: Many installers and integrators have a vast fund of experience which they have acquired for numerous products of various manufacturers, but they may not necessarily have access to the detailed knowledge of the manufacturer’s expert teams. Moreover, clear accountability and responsibility (“one-face-to-the-customer” principle) offer benefits precisely in the case of larger projects. This applies not least and in particular to the support: If problems arise, they can be attributed unequivocally to one manufacturer – it is simply not possible to pass the responsibility off to another party when troubleshooting. Conclusion: Only trustful manufacturer uniformity is reasonable In addition to many functional aspects, such as the technical limitation due to industrial standards and data protection and data security considerations, it may make sense to adopt a strategy of manufacturer uniformity in terms of project management as well. However, to ensure that this does not become a gamble in itself, it is important to check the skills of the manufacturer beforehand. This may be to the extent of an on-site visit to the company’s headquarters. n

IN Security I September 2019 I 29


Innovative 3D simulation for video security systems

3D planning makes it possible to determine the defined minimum pixel density in every area of a scene. Patented “Panomera®” cameras continuously meet the criteria – live and in the recording

Many CCTV installations these days are extremely complex, large-scale projects. Reliability and flexibility therefore have the highest priority, particularly in the planning phase. When designing its solutions, Dallmeier relies on a dedicated 3D simulation which not only offers the highest degree of planning reliability for its solutions, but is also able to adapt rapidly and flexibly to changes. “What we plan is what you get” An entire team of experts is dedicated to 3D planning at Dallmeier: The customer delivers 2D or 3D plans from which the graphic designers a build precise, three-dimensional model of the customer’s environment. The entire solution including cameras and complimentary products is then simulated in the finished 3D model. This procedure is very important, for example for detecting areas that are not

30 I September 2019 I IN Security

captured by a camera because objects are in the way. With the 3D simulation, the problem can be eliminated immediately either by repositioning the cameras or adding further components. Specification of 250 pixels per metre Before the 3D model is prepared, workshops are held jointly with the customer to define the security objectives. One specification may be for example that a minimum “pixel density” is achieved. This key parameter is defined in the standard IEC 62676-4 with pixel per metre (px/m). For example, 250 px/m or more ensure that the picture quality is sufficient to identify unknown individuals. With the 3D simulation it is child’s play to ensure that the 250 px/m specification is achieved literally in every last corner: Colour coding makes it possible

to say where the value has been reached, and where it needs to be improved, possibly by changing the position of a camera or replacing it with a different model. 3D Planning and “Panomera®” make a perfect team An equally important factor for customers to work with Dallmeier is the company’s patented Panomera® cameras. These cameras can cover immense areas at a precisely defined minimum pixel density, even in the recording. It is thus possible to later reconstruct any event regardless of where it took place and to identify all persons involved. At the same time, the consistent resolution density is important for – increasingly AI-based – video analysis applications. Only if the image quality is sufficiently good and plannable, useful analysis results can be achieved. Please visit www.dallmeier.com n


WOULD YOU TRUST TODAY’S SECURITY WITH YESTERDAY’S TECHNOLOGY?

Upgrade to Seos®: The Next Generation of Credential Technology Security needs have evolved, with technology maturing along the way to counter growing threats. But when it comes to physical security, most organizations continue to use legacy access control systems that leave them open to unnecessary vulnerabilities. Meet Seos, the next generation of credential technology from HID Global. Thanks to highly advanced encryption and a software-based infrastructure, Seos secures trusted identities on any form factor and can be extended for applications beyond physical access control. Upgrade to Seos and leave legacy technology behind. Powering Trusted Identities

|

Visit us at hidglobal.com/seos

© 2018 HID Global Corporation/ASSA ABLOY AB. All rights reserved. HID, HID Global, the HID Blue Brick logo, and the Chain Design are trademarks or registered trademarks of HID Global or its licensor(s)/ supplier(s) in the US and other countries and may not be used without permission.


CYBERSECURITY

The need for awarenesss The intensifying need for cybersecurity in smart buildings By Mirel Sehic, Global Director Cybersecurity, Honeywell Building Solutions

The last decade has witnessed a growth in investment in cybersecurity, partly in response to some high-profile attacks, which have caused hundreds of millions of dollars of damage worldwide. Increasingly, governments and businesses of all sizes are committing time and money to thwart these determined cybercriminals. The good news is that cybersecurity responsiveness is now being integrated into planning and day-to-day operational thinking.

32 I September 2019 I IN Security

However, the evolution of Internet of Things (IoT) connectivity and largescale digital integration have the potential to undo all the good work by presenting would-be attackers with new, low security points of access. The latest challenge is operational technology (OT), which has historically not needed a full suit of digital armour as it has traditionally worked inside discrete networks. This is increasingly not the case as a result of a bourgeoning use of new technology to improve

business operations. As more internet-connected devices are being incorporated into building operations, facility managers, along with information technology (IT) and OT professionals, need to collaborate to create and manage holistic cybersecurity policies and procedures to ensure the optimum levels of protection. The impact of digitisation strategies This, in turn, is raising a new challenge for businesses and facility managers – the need to understand


how their digitisation strategies are impacting the cybersecurity status of their building portfolios. And there’s no time to lose as the threat landscape is rapidly evolving. It is therefore essential to have a firm grasp of the potential cybersecurity vulnerabilities and risks associated with implementing new technologies and the steps that need to be taken to instigate the appropriate defences against cyberattacks. The more complex the system, the more difficult the diagnosis of the potential risks. On the other hand, older parts of OT networks often have little or no protection. As such, facility managers need to devise topto-toe risk management strategies that address weaknesses in both complicated new technologies and legacy systems. Understanding the cyber risks Incorporating IT capabilities, such as big data analytics and IoT connectivity, across OT environments can vastly improve productivity. Multiple proprietary systems can be easily centralised and automated, which further helps optimise building performance.

However, the implementation of new technologies and a greater number of entry points increases the possibility of cyberattacks and malicious activity, especially around unauthorised access to controls and security systems. The application of new technologies therefore needs to be accompanied by a concomitant rollout of suitable protection. The need for awareness While loss of personal data can have financial costs, an attack on an OT environment can have consequences beyond just financial loss – including prolonged outages of critical services, environmental damage and a danger to personal safety. There’s also the threat of a third party gaining unauthorised access to internet-connected physical security systems. There have been an increasing number of attacks on the manufacturing industry, critical government infrastructure such as dams, public transport and hospital networks. The most recent Notifiable Data Breaches report indicates that violations have occurred more regularly

month-to-month, with the health sector reporting the most cyberattacks out of any other sector. Worse still, 61% of these attacks were identified as malicious or criminal. Make no mistake, there are highly skilled and motivated criminals actively targeting networks to find ways to exploit the security weaknesses in the OT environment, control systems and critical infrastructure. Understanding how an attacker can gain access to a system, including the various attack techniques, is an important step towards mitigating the risks and will help organisations keep on top of the threats that exist in their own networks. Develop a cyber strategy Having a cybersecurity strategy in place is critical; readiness isn’t optional. This starts with employee training and awareness but facility managers also need to identify which assets need safeguarding, the types of likely threats and the rules and controls needed to protect against them. ➔

IN Security I September 2019 I 33


Developing, reviewing and maintaining policies and procedures is paramount, including guidelines for password use and renewal, the handling of sensitive data and the use of removable devices, to name just a few. Having employees follow clearly defined steps really can be the difference between a cyber incident being a slight hiccup rather than a total disaster. A thorough risk assessment will also be extremely useful. Starting with an asset inventory will enable an organisation to: • Identify what is connected to a network Establish a baseline for • network traffic to help identify existing gaps and potential security vulnerabilities tied to the OT environment Assists in formulating more • effective protection methods These findings can then be leveraged to create a cybersecurity strategy that is specific and detailed. Feeding the appetite for security In reality, industries and organisations differ in their acceptance of cybersecurity risk, which is sometimes referred to as ‘risk appetite’. Having a lower risk

34 I September 2019 I IN Security

appetite leads to a high focus on cybersecurity, while a higher risk appetite translates into less rigorous cybersecurity practices. The reality is, however, that every business is in danger of attack. The primary focus for cyber criminals includes critical operators such as hospitals, data centres, government buildings, airports and banking. However, past experience shows that their targets also include premium commercial buildings, for example high-end offices, upmarket hospitality and retailers of all sizes. Preparedness is unavoidable; thinking “it won’t happen to me” isn’t a defence. As with insurance, the better your cybersecurity, the better your protection and the quicker your business will bounce back after an incident. Moreover, cyber threats are constantly evolving and with OT systems being targeted more and more each day your facilities need to keep pace. Cyber criminals are finding new ways to bypass security and access data so it’s crucial that all stakeholders work together to raise the bar on protecting their investments. A hands-on, proactive approach to security will produce the best results, now and in the long-term.

And it’s won’t be getting any easier; the cyber criminals will see to that, so the longer you put off acting the harder it will become to secure your built environment. The convergence of OT and IT systems is also gaining pace, so it is essential that organisations are aware today of the risks across their OT environments and enhance their security provision to reduce the likelihood of successful cyberattacks, now. The bottom line is that the landscape of cybersecurity is changing and evolving in tandem with technological advancements. Facility managers are key decision makers in how to prevent and respond to security issues. As a result, it’s important they keep up to date with the latest insights and protection methods. This can be challenging and a drain on resources is not properly handled. Facility managers should therefore always work with specialist suppliers that have the knowledge and experience to help formulate and install the most appropriate cybersecurity systems. For further information please visit www.honeywell.com n


Send keys

Update keys

Revoke keys

Openow™ is the intelligent mobile solution for access control Make your workplace mobile-ready with SMARTairŽ

Multiple keys

Available for:

campaigns.assaaabloyopeningsolutions.eu/openow

They see the big city.

You see the big picture with integrated safety and security solutions. Bosch empowers you to build a safer and more secure world. With practical solutions that work in concert to give you peace of mind, no matter how big your requirements are. Find out more at boschsecurity.com

Medium

In Security (GBP) Issue September 02.09.2019

SAP No.

Size (W x H)

186x129 mm (+ 3 mm)

Language

EN

Color mode

4c

Color profile

ISO coated v2 (ECI)

The global leader in door opening solutions


NETWORK SECURITY

Reducing the risk How to minimise the exposure to digital sabotage of network connected equipment, software and systems used in electronic security systems Glenn Foot, Security Products Technical Manager at Eaton Security

36 I September 2019 I IN Security


As the world becomes increasingly digital, organisations that have traditionally dealt in physical security are having to change the way in which they operate. A recent report from Deloitte found that by 2020, 4 billion people are expected to be connected globally, generating 50 trillion gigabytes of data per year. As consumers become more connected by the internet of things (IoT), threats not only remain but, in some cases, have become heightened. IoT can best be explained as the extension of internet connectivity into devices, such as alarms or smart meters. This era has made life more convenient not only for consumers – who can turn their heating on remotely, turn lights off when away from home, for example – but also for enterprises that can allow more devices onto their network. That said, this new type of technology has come with a few potential security risks. A report from RiskIQ found that the number of malware attacks on IoT devices has skyrocketed by 215% to 32.7 million from 2017 to 2018, demonstrating that whilst these devices may simplify lives, security is still a concern. This meaning that enterprises must take steps to remain vigilant against potential hackers that have the ability to access networks and potentially sensitive documents.

Cyber-attacks are not mutually exclusive to enterprises or consumer devices A study from Gartner revealed recently that 40% of smart home appliances globally are being used for botnet attacks and this figure is expected to rise to 75% by 2021. Whilst cyberattacks are clearly prevalent in the consumer space, they are becoming increasingly common across enterprises. According to a study by Hiscox, more than half of UK firms have reported a cyber-attack this year, admitting they are under-prepared for a breach. Not only can these breaches be financially damaging for organisations, they can also be harmful from a brand perspective. This is best represented by the Equifax data breach in 2017, when personal information of over 140 million customers was exposed. Following the hack, a YouGov BrandIndex report found that Equifax’s “Buzz score” – which measures whether people have heard anything positive or negative about a brand during the previous two weeks – had dropped from zero to -33 in the first 10 days following the hack. This significant drop-in trust clearly demonstrated the importance of managing reputational damage after an attack.

A lack of education around security standards A talent shortage and lack of education within the industry has, for a number of years, led to customer frustrations. The industry trade body, the BSIA, recognises the skills gap and has heavily invested in promoting apprenticeships for the sector through its training arm Skills for Security. It should not come as a shock that IP technology now plays an important role in the new Government Trailblazer apprenticeship scheme. However, cyber security is still not a key focus! The BSIA value education and qualifications and note the importance of addressing the lack of understanding of the impact of IoT in the security industry. 2017 saw the launch of CySPAG (Cyber Security Product Assurance Group) who immediately sought to determine the needs of industry and consumers in order to develop best practice in this growing field. With the support of members and industry expertise, this BSIA specialist interest group helps to combat a growing knowledge gap and the threats which accompany it. CySPAG’s main thrust was to develop an understanding of how internet connected security products and services impact on our industry sector and how we can minimise exposure to digital ➔

IN Security I September 2019 I 37


sabotage of network connected equipment, software and services used in electronic security systems. This led to the first work stream to develop the ‘Cyber Secure IT’ guidance, a first for the industry sector, which has received some significant interest and support both in the UK and within Europe. CySPAG is currently working on its next project developing an industry code of practice for installers of internet connected security systems, providing a basis for a certification scheme in this field. As CySPAG state: ‘the assurance these new guidelines give throughout the supply chain should instil end user confidence in connected security solutions.’ Whilst the BSIA CySPAG group is a major step forward, when it comes to tightening regulations, more can be done to protect both organisations and consumers. In some industries, even including some parts of the security sector, education around security standards is lacking. And this is not only from a consumer point of view, but also includes many industry experts – i.e. those installing the security. There is an argument to suggest that

38 I September 2019 I IN Security

better device security is required to ensure that it is harder for bad actors to infiltrate software. However, the onus does not lie with one group - both industry specialists and the public need to take responsibility when it comes to educating themselves against potential threats. The public must ensure they are only working with certified installers that have the correct credentials and are only buying from trusted manufacturer. Installers and industry bodies have a responsibility to ensure that safety is being made a priority, and that brand reputation of legitimate manufacturers is being protected. Remote working means enterprises must rethink security strategies It’s clear that the way in which people work has changed in recent years. According to the Office for National Statistics (ONS), between 2012 and 2016, flexi-time has risen by over 12%, whilst the number of UK workers that have moved into remote working has risen by nearly a quarter of a million over a decade. And this figure is expected to rise by next year, with the ONS forecasting that 50% of the UK workforce will

be working remotely. With more employees working away from the office, organisations need to be aware of the increased security risks that comes with this shift. For example, what to do in the case of employees using unsecured Wi-Fi while working from a public space. In the end, organisations must ensure they are adapting quickly enough to deal with workers changing needs, however be wary that when employees choose to work remotely, the tools are secure enough to safeguard employees. With bad actors becoming more complex and in search of new ways to infiltrate devices and enterprises for their own gains, it is up to industry specialists and bodies to better educate and protect customers. Only then will end users and enterprisers have the confidence to invest more in the right security systems. Whilst the BSIA is leading the way in supporting members and upholding industry standards, only 70% of the industry are represented, giving room for improvement. Only when the entire industry is protected, will we feel like our job is done. n


Cologne Cathedral Square

Single sensor

PanomeraÂŽ

DallmeierPanomera_allgemein_186x129_EN.indd 1

Total costs over a time horizon of 5 years

28.08.2018 12:00:42

Hands-off!

Code HandleÂŽ: The convenient way to protect sensitive stuff in public spaces campaigns.assaabloyopeningsolutions.eu/codehandle

aa_CodeHandle_advert_generic_halfpage_186x129.indd 1

17.04.19 09:59


product Listings

Astute Electronics

DSX manufactures integrated

Barco

Falken At Falken, we are a fully

Astute Electronics promises to deliver customers the best Quality, Service and Reliability. Astute is both an Electronic Components distributor and a global and UK parts supplier. The company’s highly-qualified team is experienced in procurement, engineering, logistics, finance, program management and QA. www.astute.co.uk

BUSINESS DATA SURVEILLANCE CAMERA

Barco designs and develops visualization solutions for the security market. With its own facilities for Sales & Marketing, Customer Support, R&D and Manufacturing in Europe, North America and Asia Pacific, Barco is active in more than 90 countries with 4,000 employees worldwide. Barco posted sales of 1.158 billion euro in 2013. www.barco.com/references

TRAFFIC CAMERA

REMOTE INTERACTION REMOTE NETWORK

Smarter visualization Networked visualization leading to smarter decision making

solutions for the access control and security industries. Based in Dallas, DSX designs all software and hardware in house. The company motto is: ‘Integrated Solutions and real world applications are what we do best.’ DSX products are sold worldwide through a network of factory-trained dealers. Dealers are located in the US, Canada, Mexico, Latin and South America, Europe, Middle East, Australia and the Pacific Rim, and Nigeria amongst others. www.dsxinc.com

licensed, registered, and insured professional service, equipment, manufacturing and retail supply firm. Founded and staffed by former law enforcement officers and retired military personnel, we have grown to become a trusted and secure global provider. www.falken.us

A reliable networked visualization solution is indispensable to monitor, analyze, and share an ever increasing number of video and data sources all over the world. That is why Barco designed its networked visualization solution, the simplest and most flexible way to securely distribute any information to any location. The result: faster and smarter decision-making.

Bosch Security Systems

Learn more about networked visualization at www.barco.com/netviz

14090.BARCO.resize.ad.in security.netviz.indd 1

24/04/14 15:43

Offer an extensive portfolio of innovative, high-quality, ergonomic products and systems for security, safety and communication. Our product range includes video surveillance systems with state-of-the-art IP-solutions, access control systems, intrusion detection systems, fire detection and evacuation systems, security management systems, paging and personal security systems and public address and conference solutions. www.boschsecuritysystems.com

FLIR FLIR Systems, Inc. is the global leader in Infrared cameras, night vision and thermal imaging systems. Our products play pivotal roles in a wide range of industrial, commercial and government activities in more than 60 countries. www.flir.com

pt

Dallmeier One of the world

leading providers of products for network-based video surveillance solutions, already has more than 30 years experience in the development and manufacture of high quality components and complete solutions for the CCTV/IP sector. www.dallmeier-electronic.com

grated

mm

hall 4, stand D80

06.02.2012 11:05:55

40 I September 2019 I IN Security

Hitachi Hitachi’s 3D LiDAR “Time-of-Flight” (TOF) sensor adds an enhanced layer of security / marketing data to existing systems using advanced infrared motion technology. Hide.Hayashi@hitachi-eu.com


to have your company included in this listing contact wayne banks on +44 (0) 1622 201207

Honeywell Security Group

paxton Access Ltd is a leading manufacturer of electronic access control systems. From its inception Paxton has aimed for engineering excellence. This means designing and manufacturing intelligent and innovative products that are fit for their purpose. We have become a market leader through our constant efforts to exceed the expectations of installers and system users. www.paxton.co.uk

Keytracker Ltd

Samsung Security

delivers the newest innovations, technologies and products. Honeywell is driven to maintain its position as an innovator and leading manufacturer, and invests continuously in R&D. Each of the product ranges regularly delivers new features and technological advancements, while maintaining a familiar user interface and backwards compatibility for ease of installation. Honeywell is a world leading security business. www.security.honeywell.com

Secure Storage & Management for all Keys & Equipment Mechanical & electronic tracking to suit all budgets & applications, low spec to high tech – the world’s largest range of tracking systems for keys & equipment. Keytracker Ltd, Keyper House, Unit 3, Station Road, Rowley Regis, West Midlands, B65 0JY sales@keytracker.co.uk www.keytracker.com

Samsung Techwin is one of the fastest growing professional security brands in Europe. Providing a complete range of security solutions that are suitable for a wide range of applications, the company is dedicated to developing technology and products that its clients demand. www.samsungsecurity.com

The leading global M2M managed services provider

It’s good to be well connected.

Dual vision, Real time. Keysure

ULISSE COMPACT THERMAL The positioning unit offers an integrated solution for total darkness, fog, rain or smoke.

KEYSURE’s patented Key Control container is a pilfer proof, tamper evident key safe. This is the only non-electronic security device that will control and audit the use of a key, password or any other content. Once an item is secured inside the Key Control, it must be physically broken to access the contents. www.keysure.net CCTV PRODUCTS

Your M2M solution is more than just data connectivity. We understand that.

Videotec Dual vision, Real time.

So we not only built the world’s most advanced global M2M platform, we also built our business upon the most important connections of all – our relationships with our partners, carriers and customers.in-house Videotec manufactures

ULISSE COMPACT THERMAL a wide CCTV products That’s why Wyless is the trusted M2Mrange partnerof of Fortune 500 companies

The positioning unit offalike. ers an integrated and startups We’re the easiest company to work with. We listen to our solution for total darkness, fog, rain or smoke. customers and take pride in every connection.

recognized for high performances, flexibility and style. Our mission to Wyless offers truly uncompromising M2M solutions, delivering worldwide lead the field in the development wireless connectivity via the most secure and resilient network infrastructure. We provide unrivaled management tools and empower with end-to-end of robust, reliable andyou high managed services, technical expertise and dedicated support. performances mechanical and So connect with the experts and together we’ll take your to the electronic products forapplications surveillance next level. You have found your true M2M partner. applications is the driving force We can’t wait to discuss the possibilities. behind our success. www.videotec.com

www.videotec.com

CCTV PRODUCTS www.videotec.com

wyless Systems

Luminite Luminite have been designing and manufacturing PIR detection systems for 35 years and have extensive expertise in the security market. Their flagship Genesis wireless security range provides rapid, flexible and robust solutions to minimise installation costs and maximise profits. www.luminite.co.uk

+1 617 949 8900

Our award-winning M2M platform, delivered in partnership with the world’s largest mobile network operators, provides secure, reliable wireless connectivity to mobile and fixed devices in nearly every country in the world. Our unique products and services help our customers deploy robust, scalable and secure applications. +44 1895M2M 454 699 info@wyless.com www.wyless.com www.wyless.com

The leading global M2M managed services provider

It’s good to be well connected. Your M2M solution is more than just data connectivity. We understand that. So we not only built the world’s most advanced global M2M platform, we also built our business upon the most important connections of all – our relationships with our partners, carriers and customers. That’s why Wyless is the trusted M2M partner of Fortune 500 companies



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.