Issue 134: Sep/Oct 23

Page 1

MEET THE MEN HELPING TO ADVANCE SAUDI ARABIA’S SECURITY SECTOR

ISS’s Richard Burns and Aluisio Figueiredo are leading the third wave of intelligent video innovation in the Kingdom

Issue 127 July/August 22 ISSUE 134 SEPT/OCT 23
SAUDI ARABIA 3-5 OCTOBER 2023 | EXHIBITION PREVIEW

CONTACT US

EDITORIAL

Publisher

Barry Bebbington +44 1708 229354 Barry@pubint.co.uk

Editor

Cora Lydon +44 7834 244613 cora.lydon@securitymiddleeastonline.com

ADVERTISING

Worldwide

Mike Dingle +44 1752 267330 mike@securitymiddleeastonline.com

Gareth Driscoll +44 1752 260603 gareth@securitymiddleeastonline.com

Ryan Bickerton +44 1752 265802 ryan@securitymiddleeastonline.com

Rahul Vara +44 1752 604352 rahul@securitymiddleeastonline.com

Kyle Kennedy +44 7867 641955 kyle@securitymiddleeastonline.com

Marketing Manager

Paul Riglar +44 7496 377630 paul@securitymiddleeastonline.com

PUBLISHED BY Publications International Ltd

1708 229354

UP FRONT

We’re only weeks away from the next big event on the security calendar: Intersec Saudi Arabia. The exhibition event provides the perfect opportunity for industry professionals to network with their peers, make new connections and hear more about some of the newest industry innovations. Over on page 26 you can find out more about what to expect, as well as learn more about some of the key exhibitors who will be in attendance.

As the show’s Official Partner Magazine we’re delighted to include a number of profiles and interviews with some of the leading companies who will be exhibiting at Intersec Saudi Arabia. On page 12 Intelligent Security Systems – ISS shares how successful they were in exporting their expertise to Saudi Arabia and in leading the third wave of technologies that is becoming key to the nation’s reputation as a world-leader.

Our interview with Colonel Feras Mohammad Abdulla Belhasa Alshamsi, Director of the Central Operations Department at Dubai Civil Defense, explores how it has enhanced incident management with the deployment of

Everbridge’s SAGA system (page 16). On page 37 Rapiscan | AS&E – industry leader in x-ray inspection, optical inspection and radiation detection technologies – tell us more about the benefits of its Gatekeeper Intelligent Vehicle Undercarriage Scanner. This issue we’re also bringing you some artificial intelligence-focused features to help you deploy the technology safely and securely. On page 64 Jonathan Mepsted from Netskope looks at how generative AI can be deployed within organisations without impacting security. And on page 69 Dan Norman from the ISF looks at how to secure the risks associated with machine learning and artificial intelligence.

cora.lydon@securitymiddleeastonline.com

smemag Security

SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023 | 03
+44
166
Lane, Upminster, Essex, RM14 1LN, UK This publication may not be reproduced or transmitted in any form in whole or in part without the written consent of the publishers. © Publications International Ltd. 2023 For subscriptions and advertising enquires, or for further information on the magazine visit our website at: www.securitymiddleeastmagazine.com
Front
altronix.com fire & emergency communications power network power management surveillance power & data access control & power integration YOU DESERVE BETTER Altronix secures and connects critical infrastructure to make every environment safer and more efficient, providing the foundation for any physical security system. Our comprehensive range of solutions is designed and manufactured to the highest standards – backed by Altronix lifetime warranty with the best support in the industry. © 2023 Altronix Corporation. All rights reserved.

ISSUE 134

SEPTEMBER/OCTOBER 2023

MONITOR

03 Up front

06

08 Market Monitor

A roundup of the latest security products and solutions

12 Cover story: Intelligent Security Systems – ISS

Find out more about how this provider of advanced security technologies has found success in Saudi Arabia

FEATURES

16 Dubai Civil Defense interview

Dubai Civil Defense spoke to Security Middle East about its deployment of the Everbridge SAGA Incident Response System

20 Security Middle East Conference returns in 2024

We’re delighted to reveal that next year we will once again be hosting the Security Middle East Conference in Saudi Arabia

23 Changing face of industry

We spoke to Sandi Davies and Nadeem Iqbal about the journey the International Federation of Protection Officers (IFPO) has been on

26 Intersec KSA

Find out more about October’s Intersec event in Saudi Arabia and hear from some of the companies you can meet with at the show

33 Case study: Traka Assa Abloy

Traka Assa Abloy’s key management systems were instrumental in streamlining operations for Jubail O&M Company

34 The future of smart cities

Eugeniya Marina from RecFaces looks at the role of facial recognition technology in shaping urban development

37 Rapiscan | AS&E: undervehicle imaging systems

The experts at Rapiscan | AS&E demonstrate the powerful capabilities of its Gatekeeper Intelligent Vehicle Undercarriage Scanner

43 Four considerations for fire evacuation alert systems

Johnson Controls’ Tomas Protivanek looks at what you need to consider when specifying a fire evacuation alert system

48 Enhancing perimeter security

Your perimeter security systems could be working harder, says Ara Ghazaryan VP of Scylla – all you need is artificial intelligence

53 Surveillance lessons from the higher education sector

Protecting education institutions requires an innovative approach. Dennis Choi, IDIS, looks at how many are turning to video solutions

58 Enhancing retail security

Video surveillance has become key to supporting retail security options. Sajjad Arshad, AxxonSoft, looks at its growing role

CYBER MONITOR

64 Safeguarding data in the age of generative AI

How easy is it to gain the benefits of generative AI tools, without compromising an organisation’s security? Jonathan Mepsted of Netskope takes a look

INDUSTRY MONITOR

69 Securing artificial intelligence

Dan Norman, from the ISF, explores how to manage the security risks of machine learning and artificial intelligence

72 Regional focus: Qatar

Meshal Aljohani of Aramco, talks to Malcolm C. Smith of Al Haffa Consulting about the particular security challenges Qatar is facing

74 Events

Diary dates for forthcoming security exhibitions, conferences and events

SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023 | 05
Foreword from the Editor
News Monitor The latest regional and international security news
CONTENTS
58 48 34

Board members worried about generative AI

Proofpoint, Inc’s Cybersecurity: The 2023 Board Perspective report has revealed that three in five (59%) global board members view generative artificial intelligence (AI) as a security risk. The surge in popularity of tools such as ChatGPT has captured the attention of the boardroom – with the majority fearful of its impact on their organisation’s security. The survey also found:

n A year-on-year increase in concerns over cyber risks. In 2022 65% felt they were at risk of a material cyber attack, growing to 73% in 2023.

n A worrying 53% of board members see their organisation as unprepared to cope with a cyber attack in the next 12 months.

n Top of the wish list for board members concerned with cybersecurity is a bigger budget (37%), followed by more cyber resources (35%) and better threat intelligence (35%).

n Board members and CISOs are aligned in their concerns over biggest threats. For board members it is: malware (40%), insider threat (36%) and cloud account compromise (36%). CISO’s ranked email fraud/BEC as their biggest concern (33%), then insider threat (30%) and cloud account compromise (29%).

Gallagher wins security award

INTERNATIONAL NEWS

Global security manufacturer, Gallagher Security, has been named Outstanding Security Equipment Manufacturer, at the 2023 Outstanding Security Performance Awards. Scott Elliott, Executive Vice President – the Americas, credits Gallagher’s dedication to research and development as the driver behind this

award. He said: “No one sets a higher standard than Gallagher Security. Each year, we reinvest 15% of our annual revenue into R&D so we can uphold our commitment to innovation and lead the way in the security industry. The values we uphold as a company are reflected in this award and I’m thrilled that the OSPAs have honoured us as the Outstanding Security Equipment Manufacturer for 2023.”

UAE announces new digital response platform

REGIONAL NEWS

In the face of a number of humanitarian disasters across the world recently, the United Arab Emirates has announced it is to launch a new digital response platform that will support disaster-impacted countries. The platform will help countries – such as Libya which was recently devastated by flooding and Morocco which recently

suffered an earthquake – to communicate their needs to the international community.

The platform will make use of technology, such as AI, machine learning and geospatial tools, and support other countries in better targeting and accelerating the delivery of aid.

“We are facing a humanitarian system in crisis. And the architecture of the past can no longer keep pace with the crises of the present,” said Her Excellency Ambassador

Lana Nusseibeh, Permanent Representative of the UAE to the UN. “The UAE has been developing a digital platform to support governments’ ability to better harness international support in the wake of natural disasters. We look forward to working on this with governments, the private sector, and humanitarian organisations in the coming months to launch a new tool to turbocharge our crisis response capabilities.”

SURVEILLANCE | UNDER VEHICLE MONITOR NEWS
INTERNATIONAL NEWS
06 | SECURITY MIDDLE
| SEPTEMBER/OCTOBER 2023
EAST

Center of Excellence to open in Saudi Arabia

Rockwell Automation, Inc. is to open its Digital Center of Excellence in AlKhobar, Saudi Arabia, strengthening its commitment to developing the local economy and workforce. Tying in with the Saudi 2030 Vision of enhanced economic growth and technical progress, the Center will support government and local companies of all sizes to upskill their operations.

“Digital transformation and automation technology offer solutions that will enable the oil and gas value chain to drive

efficiency and reduce costs while carefully navigating the transition terrain,” Ediz Eren, Regional Vice President, Middle East, Turkiye and Africa (META) region, Rockwell Automation, said.

Security spending to rise

INTERNATIONAL NEWS

A survey of security chiefs at the world’s biggest companies has revealed that nearly half expect to increase their budgets significantly in light of economic and social unrest, which they see to be driving an increase in theft, fraud and the leaking of sensitive data.

Carried out by Allied Universal, 1,775 chief security officers in 30 countries were questioned for the survey. It found that collectively, companies had lost more

than US$1 trillion in revenue in 2022, through non-cyber security incidents.

Steve Jones, Allied’s Chief Executive told Reuters that the majority of the fraud, intellectual property theft and counterfeiting was driven by financial gain. While the internal leaking of sensitive information was often motivated by social or political causes. He said: “There is this social kind of impact or social motivation or political motivation whereby the bad actors are there to either hurt a company or socially and politically impact them.”

OMAN

The Central Bank of Oman has given guidelines and instructions to banks and payment service providers to provide Card Tokenisation Services (CTS), to create a safer online and mobile payments environment. The new initiative will support the national digital transformation programme and reduce cash dependency but may take six to nine months to be fully operational.

KUWAIT

Kuwait’s General Traffic Department is launching a series of campaigns targeting vehicles with totally tinted windows. According to an unnamed source, drivers who violate traffic regulations – such as fully tinted windows – will have their driving licenses withdrawn.

SAUDI ARABIA

In 2022 the Saudi Arabia manned security services reached sales worth US$755m. It is now expected to hit a projected sales revenue of US$2,076 million by 2031.

KUWAIT

An official assessment of Kuwait’s cybersecurity situation has called it “novice” and “primitive” in comparison to international standards. It was suggested this is the reason for the significant number of electronic fraud operations happening in the country.

QATAR

INTERNATIONAL

NEWS

Qatar Airways Cargo is catering to the specialised needs of valuable and vulnerable shipments with its SecureLift product. Delivering an enhanced standard of security and vigilance, key products of the service include high loading priority, inclusion of approved data loggers and shipment escorts, secure handling and storage in a strong room.

MONITOR NEWS
In Brief
Data-centric security REGIONAL NEWS
to new statistics from Adroit Market Research, the size of the global market for data-centric security was estimated to be US$2.76bn –and is expected to grow to reach US$39.348bn by 2030. SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023 | 07
“This Digital Center of Excellence highlights how solutions from Rockwell Automation and its partners can improve performance all along the oil and gas value chain within the region. By working with government, industry, and academia, the Center of Excellence will enable local companies and workers to increase their understanding of what digital technologies can achieve.”
According

Paramount announces additional weapons integration at DSEI 2023 show

At this year’s Defence and Security Equipment International (DSEI) show, Paramount announced it is making available additional customer deliveries of its Mwari advanced reconnaissance, surveillance and precision strike aircraft, as well as the integration of a weapon management systems and command and control base.

The Mwari is already actively operational in Mozambique and both the Mozambican Air Forces and the Democratic Republic of Congo has ordered the platform.

Designed for ISR and close air support (CAS) assignments with an interchangeable mission-configurable payload system, the Mwari is capable of operating in remote and austere environments while requiring a minimal logistical footprint. Embodying the ‘F3EAD’ (Find, Fix, Finish, Exploit, Analyse

and Disseminate) capability, the aircraft is tailor-made for modern, asymmetrical threats around the world.

The company also announced that weapons testing and certification are expected to commence towards the end of

Kingston IronKey extends mobile data protection

Kingston Digital Europe Co LLP, has launched the best-in-class Kingston IronKey D500S, a hardware-encrypted USB flash drive that provides military-grade security for classified data in transit. The product is waterproof, dustproof, shock and vibration resistant to military standards, crush-resistant and epoxy-filled, with a rugged zinc casing to protect the internal components from penetration attacks.

It has a multi-password option, as well as a sessionbased read-only mode and a crypto-erase password that will destroy data and reset the drive if required. Oscar Escayola Kaloudis, Sales Manager DACH, Middle East and Africa, Greece and Israel for Kingston, EMEA, said: “IronKey has become an essential pillar to meeting Data Loss Protection (DLP) best practices with the toughest military-grade security for compliance with data encryption laws and regulations such as SOC 2, NIS2, FISMA, GDPR, PIPEDA, HIPAA, HITECH, GLBA, SOX, and CCPA.” www.kingston.com

the Q4 / early Q1 period, to be undertaken by Paramount Aerospace Industries (PAI), ensuring vertical integration and manufacture of the latest rendition of the company’s own intellectual property (IP). www.paramountgroup.com

viisights, Inc reveals latest advancements in proactive intelligence

viisights, Inc, a leader in behavioural recognition video analytics, has provided attendees of GSX 2023 a first-hand look at its latest advancements – including updates to its flagship viisights wise video analytics and viisights IQ auto-learning technology.

Asaf Birenzvieg, CEO, viisights, said: “With wise 3.0 and viisights IQ, we’re ushering in a new era of proactive security intelligence through the use of advanced behavioural recognition video analytics. These solutions mark a quantum leap forward in harnessing the power of AI and machine learning to detect critical events through the context and nuances of how humans and inanimate and dynamic objects behave.”

Wise 3.0 includes new detection capabilities such as persontailgating, person-abandon-bag, personal protective equipment and more. The new viisights IQ enhances the company’s powerful behaviour recognition video analytics in order to reduce false alarms, increase event precision capabilities and improve overall operational efficiency. www.viisights.com

SURVEILLANCE | UNDER VEHICLE MONITOR MARKET
08 | SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023
Exchange knowledge with leading influencers from the region. Experience the new wave of technologies. Build long-lasting relationships with industry stakeholders. Join decision-makers defining the industry, and aligning with the Saudi Vision 2030 initiative. Become a pioneer of today, shaping tomorrow… Contact us today to become a sponsor or delegate! Ryan@SecurityMiddleEastOnline.com SecurityMiddleEastConference.com

Middle East energy companies select Blackline Safety to protect workers

Blackline Safety Corp has announced a number of new deals with three of the world’s leading energy companies in Oman, Saudi Arabia and the United Arab Emirates. The combined deals – worth more than $1.3m – will see Blackline deliver 1,200 G7c and 200 G7x portable gas detectors, 50 G7 EXO area gas monitors and 40 G7 Bridges in order to protect workers at the sites in the Middle East.

“These deals are completely new connected gas detection contracts. We didn’t go in and replace competitors’ products. Customers are asking for connected safety in the field and remote locations, and Blackline Safety is the only provider that can fulfill this need with real-time visibility into what workers are experiencing on the job,” said Peter Attalla, Vice President, International Sales.

He added: “The reliability of our devices coupled with our real-time capabilities and our reporting suite, Blackline Analytics, set us apart. We started with piloting our lone worker solution, and now they are purchasing our

Elistair launches tactical tethered drone

Elistair has announced the new generation of its Orion tethered UAS product – the Orion 2.2 TE. The new launch builds on the Orion’s legacy, with new tactical functions, an expanded payload range and a 2-in-1 modular structure supporting an expanded range of capabilities.

Thanks to Nextvision Raptor, XQT AI and XQT LRF it provides superior continuous imagery for military units, border guards and national security agencies. It also includes target tracking, automated object categorisation, automated scanning routines and POIs, allowing for surveillance missions. www.elistair.com

full suite of gas detection products.”

The news follows on from another £1m deal unveiled in January 2023, with Blackline being named a preferred supplier for a major energy company. www.blacklinesafety.com

New partnership boosting school security in the UAE

A new partnership between Hikvision and Educore is helping to ensure safety on school buses, as well as integrate leading technology for improving school attendance through facial recognition, in-classroom analysis, bus on- and off-boarding and bus tracking.

A new app will allow parents to track their child’s bus in real-time, while the implementation of Hikvision’s facial recognition technology will improve campus security. “We are thrilled to partner with Hikvision to enhance campus security, support sustainability, and integrate cutting-edge technologies that will further improve learning experiences for our students,” said Moustafa Batrouni, Managing Director at Educore.

“The integration of Hikvision’s facial recognition technology and bus tracking solutions will enable us to provide a safer and more secure learning environment, while also improving student safety during transportation.” www.hikvision.com

SURVEILLANCE | UNDER VEHICLE MONITOR MARKET
10 | SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023

Manufactured, Tested, Specified, Certified

Sunray is the specifiers choice for Steel Security, Fire and Blast Doors, Louvre Panels/Facades and Steel/GRP Platforms and Walkways. Our comprehensive Steel Door Range and associated products provides Fire Ratings for up to 4 Hours plus overrun and Security Ratings from SR1-SR6.

We lead the industry with our Door Size Ratios, which enables the Architect, Designer or Specifier to maximise infill without overpanel and creating clean sight lines, as well as practical ease of access for plant, machinery, and general use. With an extensive list of hardware and locking options, electro-mechanical access, vision panels, finishes etc. we tailor your criteria to deliver the required performance and practical solution.

● UTILITY

● TRANSPORT

● POLICE

● EMBASSY & CONSULATE

● PETROCHEM

● RETAIL

- sub-stations, transformer chambers, plant & pump rooms.

- rail, including underground, airport & ferry terminals.

- government & military, armouries, ranges, sensitive & secure buildings.

- UK & abroad.

- UK & abroad.

- staff / safe & stock rooms & financial institutions.

For more details, call our specialised team to discuss your particular project on:

01233 639039

sales@sunraydoors.co.uk

www.sunraydoors.co.uk

SEVEN PILLARS OF WISDOM

Intelligent Security Systems – ISS has managed to rapidly establish itself as a leading provider of advanced security technologies in Saudi Arabia. We find out the back story and the reasons for their success

Saudi Arabia has become the prime target market for a host of security products and services vendors around the world, attracted by the sheer size and scope of H.E. the Crown Prince Mohammed bin Salman’s Saudi 2030 Vision programme. Petrodollars are being recycled aggressively to build cities, industries, jobs and culture that will propel Saudi Arabia to the forefront of the post-industrialised, post-oil world. Socalled Giga Cities are rising literally from the deserts of Arabia, with names that are passing into the everyday language of global infrastructure: NEOM, Diriyah Gate Project, The Red Sea and Qiddiya.

Few companies in the security sector have been as successful as American

intelligent software pioneers Intelligent Security Systems – ISS in penetrating the Saudi market over the past two years, since liberalising investment sector laws has allowed more flexible participation and easier visa passage in and out of the Kingdom. ISS has quietly and very successfully emerged globally as the market leader in paid video analytics and has increasingly been developing hardware that maximises its AI-driven algorithmic software solutions.

Security Middle East magazine sat down with ISS Chairman Richard Burns and CEO Aluisio Figueiredo to understand their firm’s voyage in the Kingdom, why they think their market entry has been so successful and whether there are lessons to be learned.

How

did this all start?

Burns: We’d been nudged by Sanjay Phatak – ISS Middle East Managing Director – for a couple of years to open in Saudi, but we’d hesitated while building our business in other markets. But three years ago we determined that there were three strategic global markets that we would pursue full bore. One of those markets was the Kingdom of Saudi Arabia. The transition from what we call the second wave to the third wave of security technologies – with a great demand for sophisticated and effective software and devices to lead the solutions and away from end-of-cycle hardware – was well underway.

Now, Aluisio and I are getting ready for our 17th trip to Saudi in two years. We joke that we probably have the most maximised Saudi visas ever issued. Our Saudi prospects and partners never doubted our commitment to Saudi Arabia once they’d seen us pop back again and again from New York in person – and the

12 | SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023

Middle East is a regional where turning up is key to confidence.

We were lucky to have great support from key people and institutions at the very beginning. ISS won the prestigious E-Award from the US Commerce Department ‘for outstanding contributions to US exports’ in 2020. Commerce invited us to Washington DC in the summer of 2021 to meet with much larger US corporations with a very senior Saudi delegation to the US.

It was there that we met Minister of Investment H.E. Khalid A. Al-Falih, a prolific Saudi public servant and former Chief Executive of Aramco. His kindness in introducing us to leaders in the public and private sectors got us off to an unusually incredible start. Not only were we speaking early with the top levels of security and technology management at Aramco from the very start, but we gained huge momentum from the Ministry

That meant if we told our story, got our references, followed the rules of engagement in Saudi, that we had the potential to become very successful.

Can you explain about second and third wave technologies within a Saudi context.

Burns: The Saudis expressly are looking for best-of-breed technologies. They’re building very ambitious infrastructure visions and want to be benchmarks for urban planning success. They’ve relied on a range of vendors who arrived a decade ago and established themselves as standards for video management or cameras or PSIMS. By and large, these companies simply haven’t updated their technologies that much in the past decade opening themselves to competition and loss to third wave, software-driven software and hardware device solutions.

term success in KSA – truly red, white, blue, green and white. On the floor of Riyadh LEAP Conference 2023, we signed an MoU partnership with AEC, the wholly owned subsidiary of Saudi Arabia Military Industries. The partnership is specifically to advance business in the security and video analytics sectors, and very specifically to transfer, maintain and enhance the technologies to manufacture the ISS SecurOS® UVSS at AEC’s facilities in KSA.

At the GITEX Dubai conference in 2022, we also signed an important MoU partnership agreement with TAHAKOM, the Saudi Technology and Security Comprehensive Control Company. The MoU covers a range of joint initiatives for comprehensive solutions for smart cities and public security in the Kingdom.

In both cases, ISS has committed itself to the full sharing and transfer of technologies with its Saudi partners, hiring, training, joint IP patents, and, of course, production of third wave technology devices for use both in the Saudi market and for export.

of Investment’s (MISA) attention to detail in matching us with partners and with projects. At the same time, the US Department of Commerce International Trade Administration treated us as a poster boy for emerging SME businesses competing head-on with major Chinese and European multinationals and leaned into our success in a major and important way.

When did you know you were on the right track?

Figueiredo: On our second trip we met with a very influential and powerful Saudi executive who controlled a lot of projects. We gave him our ISS presentation. He asked a few questions during the show. And after there was a moment of silence and we didn’t know what to expect. Then, in a very pronounced way he said: “You know, you may have arrived late to Saudi Arabia… but you have arrived at the right time.” We were being told that others may have set up earlier in the country before us but that we had the right technologies.

One excellent example is ISS’s SecurOS® UVSS (Under-Vehicle Surveillance System) and LPR (License Plate Recognition) solutions. The established vendor never knew what hit them as we started replacing their often-abandoned sites across the Kingdom. These ISS technologies have been adopted by ZATCA (the Zakat, Tac and Customs Authority), KAPSARC (King Abdullah Petroleum Studies and Research Centre), Al-Salam Royal Palace in Jeddah, and in Jeddah and Dammam Ports as major examples. Similarly, on large-scale projects, where ISS SecurOS® provides a highly reliable, expandable platform for all security intelligence, ISS is replacing old standards like the European video management firm that’s had traditional market share.

Who are your most important Saudi partners?

Figueiredo: We understood from the very start, as we read carefully through the Saudi Vision 2030 literature, that we needed to be true Saudi citizens for long-

That said, while the AEC and TAHAKOM relationships drive a lot of our activity in the Kingdom, we have a range of cherished relationships with integrators across the country. ISS has a policy, worldwide, of working exclusively with integrators to satisfy end-user demand.

We hope to be able to make another big announcement from the Security Middle East Saudi Conference in May, and we certainly look forward very much with our partners to participating. It is great that Security Middle East magazine is participating in raising debate and standards in the Saudi security market.

Any final words?

Burns: Because we’ve been here so often, we’ve done things – usually with our Saudi friends – that you’d never do if you were popping into Riyadh for a day to shake hands and leave. Like heading out to Al Nassr Football Club to watch Cristiano Ronaldo perform, for example. Or selecting our dates from the street where all the date merchants operate. Or if you really want a tip, stay around for Riyadh Season at the end of the year – it makes Disney look like a sideshow.

issivs.com

“We were told that we might have arrived a little late in Saudi Arabia, but that we’d arrived at the right time.”
COVER STORY | INTELLIGENT SECURITY SYSTEMS – ISS SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023 | 13
Left Burns and Figueiredo along with the Middle East team

ALL ADVANTAGES IN ONE PRODUCT

COLOR IMAGING 

HIGH RESOLUTION IMAGING 

CLEANING SYSTEM 

FLUSH MOUNT HOUSING

FULLY TRAVERSABLE 

FULL VIEW OF UNDERCARRIAGE 

AUTOMATIC COMPARISON FEATURE 

WWW.SECUSCAN.COM UNDER VEHICLE INSPECTION SYSTEM MADE IN GERMANY
SAUDI ARABIA 3. - 5. OCTOBER, 2023 RIYADH, KSA MEET US AT OUR BOOTH 2-A10
licensedby Messe Frankfurt Exhibition GmbH

Dubai Civil Defense selects Everbridge for incident response

Can you tell us about your involvement in the SAGA Incident Response System project?

As the Project Owner, my role was to oversee the implementation of the SAGA Incident Response System, from its conceptualisation to execution. My responsibility was to ensure that the project aligned with Dubai Civil Defense’s goals and requirements. We aimed to enhance our incident management capabilities and elevate our emergency response to new levels of efficiency and effectiveness. To achieve this, we collaborated with Esharah,

a leading solutions provider, to help us deploy the system.

What challenges were you looking to overcome with the implementation of the SAGA system?

Our main challenges revolved around managing the diverse and dynamic emergency situations that Dubai faces as a prominent tourist destination and bustling metropolitan hub. We needed a robust incident response system to address these challenges effectively.

Specifically, we wanted to digitise our incident management life cycle, achieve faster incident registration and response times, and establish a Common Operating Picture (COP) to improve situational awareness.

What system were you using prior to adopting the SAGA system?

Before the implementation of the SAGA system, we relied on a traditional Computer-Aided Dispatch (CAD) system. While it served its purpose, we recognised

Colonel Feras Mohammad Abdulla Belhasa Alshamsi, Director of Central Operations Department, Dubai Civil Defense, spoke to Security Middle East magazine about its recent deployment of the Everbridge SAGA Incident Response System
16 | SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023

the need to upgrade to a more advanced solution that could meet the demands of our rapidly evolving urban environment and ensure seamless coordination among our emergency response units.

What was your brief to Everbridge and Esharah when you decided to implement the SAGA system?

We presented Everbridge and Esharah with a clear vision for our incident response future. We tasked them with upgrading our CAD system to achieve operational excellence and digital cooperation through seamless integrations with various sub-systems and strategic public and non-public safety organisations in Dubai. We sought a comprehensive, easy-to-use, and secure solution to elevate our emergency response capabilities and better protect our community. Esharah played a crucial role in the successful deployment and integration of the SAGA system into our existing infrastructure.

How is the SAGA system currently being used by Dubai Civil Defense?

The SAGA system has become an integral part of our emergency response procedures. It is extensively utilised for registering emergency calls, providing automatic caller location identification, and dispatching the nearest fire station to the incident location. Additionally, the system enables us to document all Standard Operating Procedures (SOPs) and harness smart dashboards for real-time monitoring of our operations. This has empowered us to make betterinformed decisions promptly.

Since the implementation of the SAGA Incident Response System, what results have you seen, and what specific benefits has the system brought to Dubai Civil Defense?

The impact of the SAGA system has been profound. Notably, we have experienced significant reductions in incident response times, allowing us to measure the performance of individual fire stations and the overall efficiency of

our operations. Moreover, the system has empowered us with a specific balanced scorecard for Control Room operators and fire stations, enhancing our decisionmaking processes and ensuring more efficient operations.

potential to enhance emergency response and protect our community.

How has the SAGA Incident Response System aligned with Dubai Civil Defense’s goals?

Do

you have plans for the future of the SAGA system, such as further integrations or wider rollout?

Absolutely, our plans extend far beyond the current implementation. We envision further integrations with our strategic partners and internal systems, including Esharah’s expertise, to achieve seamless operations both within our organisation and in collaboration with external stakeholders. The SAGA system has proven to be a game-changer for us, and we are committed to exploring its full

The alignment with our goals has been exceptional. The SAGA system has equipped us with the capabilities to enhance incident management, leading to improved response times and a heightened level of collaboration with various organisations involved in emergency response. This system perfectly complements our dedication to ensuring public safety and our aspiration to be at the forefront of emergency management on a global scale.

www.everbridge.com

www.dcd.gov.ae

INTERVIEW | DUBAI CIVIL DEFENSE SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023 | 17
Discover how you can open more by scanning the QR code or visiting hidglobal.com/openmore Open More with HID Mobile Access® Open More with HID Mobile Access by using your smartphone or wearable as a credential to access doors, networks, services and more. From banking and finance, educational institutions, global corporate entities and more - we provide the solutions for a mobile-first world, giving you unrivaled convenience, enhanced security and privacy protection, and operational efficiency. © 2023 HID Global Corporation/ASSA ABLOY AB. All rights reserved. hidglobal.com

GIVING A VOICE TO THE INDUSTRY

The first-ever Security Middle East Conference – brought to you by the same team at Security Middle East magazine – was born out of the desire to advance the conversations that were happening in the security sector. There has never been a more exciting time to be part of the industry, with technological innovation happening on a daily basis and the need to protect people, places and possessions at an all-time high. We collaborated with some of Saudi Arabia’s most important security pioneers, as well as global experts, and tasked them with kick-starting vital conversations about the challenges the industry is facing, the future market trends, and how it all slots into place as the

region continues to develop at a pace.

The result was a packed day full of debate, discussions and the sharing of ideas and best practice. With a 200-strong audience, this was the opportunity to learn from the greatest thought-leaders in the sector, network with peers and be part of the conversations that could change the security landscape for the better.

Discussions were aligned to Saudi Vision 2030 and covered a broad range of topics, including addressing the talent gap, resiliency in the age of digitisation and securing Vision 2030.

The feedback we received post-event was overwhelmingly positive and pointed to one conclusion – the event needed

to be an annual gathering. Craig Ross, Senior Security Manager at the Diriyah Gate development project, was one of our panellists on the day, and said of the 2023 conference: “Events like the Security Middle East Conference are hugely important in developing our networks and sharing ideas on best practice.”

It was a sentiment that Sami Althowaini, agreed with: “This conference is the perfect platform for industry leaders, experts and enthusiasts to come together and exchange knowledge, ideas and best practices.”

Althowaini is Director of Security, Safety and Transportation at King Abdullah Petroleum Studies and Research Centre and was also on the advisory board

After the outstanding success of the inaugural Security Middle East Conference in May this year, we’re delighted to announce that we’ll be returning in 2024 – with another industry-defining event
20 | SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023

for the Conference, helping to ensure that we covered the most pressing and relevant topics on the day and shaping the layout for the event.

This year we’ll be working with the same advisory board, who did a stellar job of helping to determine how the rst ever conference looked, felt and sounded. This year, having been heavily involved with the inaugural event, we’ll be working closely with them to further expand the conference. Although the advisory board remains the same, 2024’s event will see a slew of new speakers and panellists share their knowledge with our audience. We will also have some new sponsors involved with the conference. Already Intelligent

Security Systems – ISS and MVP Tech –A Convergint Company have joined us as sponsors and we’ll be bringing you more details on these forward-thinking companies in the coming months.

With Saudi Arabia’s reputation for being at the forefront of development, best practice and innovation and the Kingdom unlocking its huge potential with world-leading giga projects, we will once again be returning to Riyadh for next year’s conference. The day-long event will be held on 14th May 2024 and will include sessions from some of the industry’s brightest minds, and panel discussions focusing on key topics that are impacting the sector.

“We were blown away by the success of

the rst Security Middle East Conference – the feedback only con rmed to us that there is a real need for this event in the sector and that attendees gained a huge amount by joining us,” commented Mike Dingle, Event Organiser and Co-Publisher of Security Middle East magazine. “Our plans for 2024 are even more ambitious, we want to ensure that there is a real bene t in attending our conference and that by doing so those working in the security industry can help elevate their own careers.

“We also want to give a voice to every single person in the sector and by bringing everyone together we can do just that.”

www.securitymiddleeastconference.com

SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023 | 21
www.securitymiddleeastconference.com

Control Center

Empowering Security Resilience in the Middle East

Everbridge Control Center is transforming Middle Eastern security management, transitioning from systems which are reliant on constant monitoring by security personnel to proactive information-based systems. Trusted by leading security operations globally, it optimises control rooms by efficiently managing the ever-increasing data volumes they need to handle.

With a 20-year history in the Middle East, Everbridge empowers physical security, public safety, and resilience. Our award-winning PSIM software equips teams to anticipate, mitigate, respond to, and recover from disruptions. Focused on safeguarding critical infrastructure, our solutions deliver tangible benefits to key sectors, including critical national infrastructure, energy, transportation, emergency services, and finance.

At Everbridge, our success is built on collaboration with trusted local partners, extending the impact of our cutting-edge solutions.

Discover how to build a more secure and resilient future for your organisation.

October 3-5

Intersec Saudi Arabia

Booth 2-C30

January 16-18

Intersec Dubai

Booth S2-D42

Scan the QR Code to pre-book a personalised demo

www.everbridge.com

CHANGING FACE OF AN INDUSTRY

Security Middle East Magazine sat down with Sandi Davies, Chief Executive Officer of the International Foundation for Protection Officers (IFPO), and Middle East Regional Director, Nadeem Iqbal, to discuss the progress of the foundation, their future ambitions, and the challenges faced with educating protection officers in the Middle East

Davies’ own career within the sector started at the tender age of just 17, when she was working a part-time role at the largest privately owned security contractor in Western Canada. Her professional ambition was to be a professional figure skater – a far cry from where she has ended up. Even at a young age she was able to spot a serious flaw within the sector: a severe lack of training for the people who were being sent out to protect people, property, and assets.

She said: “I discovered many things about the industry that I found quite intriguing. I would see people brought into the office and after a brief interview, they’d be sent to the uniform centre, totally equipped, and sent to protect people, property and assets in big metropolitan cities such as Calgary. They rarely spoke English and there was no training in place for them. And I just thought, at 17 years old, how is this even possible?”

From small acorns

As Davies progressed through the organisation, she began to work on a Protection Officer Training Academy in Calgary – but with no reference point, and a training academy that couldn’t operate without reference books, it could have all ended there.

Instead, Davies was involved in recruiting 20 contributing authors and went on to develop a book that covered 25+ subjects relevant to the modern protection officer. And that, she explained, “was really the inception of the International Foundation for Protection Officers.”

Since then, Davies has spearheaded the growth and development of IFPO as they have: moved headquarters to Naples in Florida; published a series of textbooks and developed a range of programmes for security officers in English, Spanish and Arabic; delivered the first-ever training programme for women in security in Saudi Arabia in 2009; and been the driving force in advancing training methods within the industry following the 9/11 disaster. Nowadays, IFPO’s training is predominantly delivered online, allowing for much greater expansion internationally. Today, the IFPO has students in 56 countries, members in 63 countries, and has certified over 180,000 officers.

Global growth

Davies said: “Our biggest focus right now is global expansion. We’ve always enjoyed a lot of international students,

but I believe that developing strategic partnerships in the various countries that have expressed an interest is going to be critical to our success.

“They need to think along the lines of a preventative mindset, and they need the curriculum. When there’s nothing available, they’re coming to us from every corner of the world and as soon as they achieve success… with social media now, there is just a boom.

“For example, somebody in Nairobi gets a CPO (certified protection officer) certificate, the next week there are eight new applicants from Nairobi, and we see the same in Malaysia, and all over the world.”

As the Foundation expands globally, it constantly modifies its content to meet standards in different countries based on the local culture and requirements. Something that ensures IFPO programmes

INTERVIEW | INTERNATIONAL FOUNDATION FOR PROTECTION OFFICERS SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023 | 23
Right Sandi Davies

are superior regardless of location.

“There’s no point teaching somebody in Lagos what somebody needs to know in Mexico. So there’s not a ‘one-programmefits-all’ mindset,” explained Davies.

“To support this, we’ve recruited some really great regional representatives. Nadeem has done a fantastic job in the Middle East, but we have regional representatives in India, Ireland, the UK, Costa Rica, Mexico, Nigeria and Australia,” she continued.

Modern security teams

Davies acknowledged that today’s security professionals would be unrecognisable to the security teams of 20 years ago, noting that as the roles and responsibilities have increased, the training for security officers has escalated.

She said: “I think that corporate

corporations are relying on them to, not only conduct the duties of security officer, but also a big part of the role is customer service. This is proven through our research and has changed a lot over the years.

“I also think that the delivery methods have changed, the officers themselves are requesting the training. Before, they didn’t have a commitment or loyalty to the company, but now corporations support their employees more, other employees are seeing that and they see career advancement through educational opportunities.”

Iqbal points out how diverse the sector is, particularly within the Middle East. He said: “One thing which is very unique in the Middle East, is the cultural diversity. When we look at Saudi Arabia and UAE, there are people from 120+ nationalities. With that many work cultures, working in

the security industry is an environment that is so diverse.

Women in security

We can’t speak to Davies without finding out more about how she was responsible for delivering the first training programme for women in security in Saudi Arabia. She was brought in by G4S and was honoured to be part of such an important milestone – which she calls a “fantastic experience”.

“The women that were in my class, they were eager, they were intelligent, they were bright and they were excited,” she explained. “I mean, they’d never had an opportunity like this in the past and they gravitated towards that. They studied hard, they were inquisitive, they felt comfortable and it gave them confidence. The education that they got gave them the confidence to be able to go and conduct their jobs. They were excited they could see the career path, too, and I never ever got the impression that they felt that they were going to be treated differently than their male counterparts.”

And 14 years later, do Davies or Iqbal think women still face barriers to entering the security industry? Davies said: “For me, personally, we still think the majority is men.”

Iqbal acknowledges that while barriers may still exist – they exist worldwide and are not a regional issue: “I don’t think the barriers in the Middle East are any different than rest of the globe. In the industry, it is perceived to be a man’s job, which isn’t right.

“Recent initiatives have focused on diversity, inclusion and equality. That has encouraged more and more women to come to the forefront and be actively involved in asset protection, loss prevention, security, and even health and safety programmes.”

Iqbal further explained the positive changes are far more encouraging than the diminishing challenges, “There are more opportunities in security, and the best part of that is the gap between security and business education is now shrinking. So, people know that they make a start with security and with some cross-functional training, they can go on to different disciplines.”

www.ifpo.org

INTERVIEW | INTERNATIONAL FOUNDATION FOR PROTECTION OFFICERS 24 | SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023
“There are more opportunities in security, and the best part of that is the gap between security and business education is now shrinking”

A room with a Vue.

IS A ROOM ON A MISSION.

Introducing the new Vue Consoles. Seeing consoles in a brand new light. Configurable. Connectable. Adjustable. Just plain more than able. And able to accommodate multi-operator solutions. Static or height adjustable. Horizontal / vertical adjustable monitor mounts offer complete ergonomic viewing. Or should we say Vue-ing? Because everything allowing a mission critical room to operate with 100% focus went into every design detail. This is productivity by design.

Begin the mission at winsted.com

winsted.com

Intersec Saudi Arabia

Returning for its fifth year, Intersec Saudi Arabia is to take over the Riyadh International Convention and Exhibition Centre (RICEC) from the 3-5 October

This year, the show will have over double the space it had last year – with the event taking place over 15,000sq m. There will be more than 500 brands showcased, over 200 major exhibitors and representatives from more than 20 different countries.

The buzzing show – a precursor to January’s Intersec Dubai event – allows visitors to explore the latest security and safety innovations, network with industry professionals and discover cutting-edge technologies.

In attendance at the show will be key government leaders, agencies and organisational heads, as well as outstanding, world-class speakers. Visitors will gain invaluable insights to help them enhance their own security operations through attendance at the seminars.

There are two conference programmes:

the Future Security Summit and the Fire Safety & Technology Summit. The former has been carefully curated to align with the Saudi Vision 2030 programme. It will bring together security and safety pioneers to discuss, debate, share and collaborate on the initiatives, challenges and opportunities that Saudi Vision 2030 presents.

Visitors to Intersec will be gaining a competitive edge, as they have direct access to the very newest developments in the industry. They’ll also be able to keep up-to-date with the latest security trends and regulatory legislation, and through attending the seminar programme will have access to a huge amount of expert knowledge that they can take home with them to benefit their organisation.

Innovation is another key area for

the show. Across five essential pillars a significant number of products and solutions will be unveiled for the first time. These pillars are: commercial and perimeter security; homeland security and policing; cybersecurity; safety & health; and fire & rescue.

There is the prospect of unlocking global opportunities with firms who can fortify your security strategies while optimising for costs to boost return on investment. Plus, as well as collaborating with your existing clients, there’s the chance to expand your business connections and network with new contacts to drive business growth and opportunity.

Take a look overleaf at some of the exhibitors you can expect to meet with by attending Intersec Saudi Arabia.

www.intersec-ksa.ae.messefrankfurt.com

PREVIEW
26 | SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023

Network Logic

Network Logic will be exhibiting at Intersec Saudi Arabia with NSGate’s products, producer and supplier of network transmission devices and solutions for outdoor video surveillance, remote monitoring and backup power. Showcased products include:

n Equipped electrical enclosures and exterior access nodes that provide reliable operation of installed electronic equipment;

n Backup power solutions with solar panels and LiFePO4 batteries, as well as cabinets’ cooling with thermoelectric coolers and filter fans kits;

n Network transmission components including PoE switches, injectors and Ethernet extenders.

Network Logic will highlight the benefits of NSGate’s products including NSBox (outdoor switches) that provide trouble-proof operation of connected video cameras with a secure power supply, reliable data transmission and protection of sensitive equipment from power surges. It is the perfect technology solution for the protection of large-scale outdoor assets and critical infrastructure ranging from construction sites, parking lots, hotels, parks, oil & gas, farmland, bridges and highways. www.networklogic.ae

Comm Port Technologies

Comm Port Technologies is celebrating its 25th year anniversary and its 20th year in the Saudi marketplace. Along the way we have made many friends and partners, seen great transformation in security/defense technology, and have had the honour and privilege to participate in projects throughout the region that protect and secure people from harm. Our participation in Intersec 2023 provides us with a wonderful forum to showcase our products and services, listen and learn about the emerging needs of the Saudi security market, and most importantly spend time with people and companies we serve that are at the heart of what we started 25 years ago. www.comm-port.com

TRASSIR

TRASSIR, global video surveillance system manufacturer, marks its 21st anniversary this year. Since its start in 2002, TRASSIR has grown to become a global supplier that boasts a presence in more than 42 countries. TRASSIR has built an entire video surveillance ecosystem combining CCTV cameras, video recorders, video management servers, cloud services, neural analytics and access control systems. With its wide expertise (more than 500,000 projects completed), the company is constantly growing and bringing value to customers. Today, TRASSIR offers an environment for providing security in different fields: retail stores, city surveillance, traffic, building, banking and much more. www.trassir.com

PREVIEW
HALL 2 STAND A09 HALL 1 STAND A36 HALL 2 STAND D10
SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023 | 27

Rapiscan | AS&E

Rapiscan Systems | AS&E is an industry leader in X-ray inspection, optical inspection and radiation detection technologies that help to uncover threats and identify and authenticate vehicles and occupants. Our scanning solutions assist governments, military, law enforcement agencies, commercial organisations and energy companies with their unique security requirements while maximising operational efficiency.

Our array of X-ray scanning systems help to find threats and contraband while our Gatekeeper intelligent optical vehicle inspection and recognition technologies assist with facial detection, recognition, license plate decoding, vehicle classification and undercarriage foreign object detection. Our advanced radiation detection technology accurately detects, identifies and locates gamma and/or neutron sources without disrupting the flow of vehicles, people or commerce.

PERCo

PERCo will showcase access control solutions demanded both in the Middle East and worldwide:

n ST-11 Speed gate with swing panels and a built-in card capture reader

n TTD-12A Motorised box tripod turnstile with built-in reader and barcode scanner

n WMD-06 Swing gate

n IRP-01 Reader post

PERCo is a leading Russian manufacturer of security systems and equipment, ranking among the top five global market leaders. We have been in the security market for 35 years and now export to 94 countries worldwide. Our entire product range comes with a five-year warranty. Plus we have an office, showroom and warehouse in Dubai, UAE.

www.perco.com

Customers can further enhance inspection capabilities and operational efficiencies with our analyst assist tools and data integration platform. With this technology, information can be collected and combined from multiple sources in the security operation to automate manual processes, control workflows, and deliver targeted, actionable intelligence.

www.rapiscan-ase.com

Intelligent Security Systems – ISS

Intelligent Security Systems – ISS is a leading developer of security surveillance and control systems for networked digital video and audio recording, video image pattern processing and digital data transmission. ISS’s technical roots are deeply planted under a highly sophisticated and robust operating framework, called SecurOS®. The platform is available as an end-to-end solution running on ISS network video servers and can be made compatible with most third-party security systems or devices. The system, from the outset, was designed to be interoperable with other hardware and software solutions in the security universe, and has constantly been updated to do exactly that.

www.issivs.me

PREVIEW
HALL 1 STAND I21 HALL 1 STAND G35 HALL 1 STAND A34
28 | SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023

Everbridge

Everbridge is at the forefront of revolutionising critical event management in the Middle East with its groundbreaking solution: the Everbridge Control Center PSIM platform. This cuttingedge technology seamlessly integrates diverse security and business systems in real-time, providing organisations with a uni ed operating picture to make informed decisions swi ly and e ectively. With an exceptional track record of success, Everbridge’s Control Center PSIM platform has been instrumental in increasing organisational resilience in the Middle East and beyond.

This award-winning platform has empowered cities, transportation, oil & gas, government and corporate enterprise in the region to enhance situational awareness, enabling rapid response and minimising disruptions. The Control Center PSIM platform’s integration with Everbridge’s critical communication

capabilities further ampli es its impact, o ering a comprehensive approach to incident management and resilience. Furthermore, Control Center seamlessly integrates with Everbridge risk intelligence, bolstering an organisation’s capacity to oversee, dissect and address risks originating externally, supporting the internal protection already provided by the platform.

www.everbridge.com

Genetec

Genetec Inc. is a global technology company that has been transforming the physical security industry for over 25 years. Today, the company develops solutions designed to improve security, intelligence and operations for enterprises, governments and the communities in which we live. Its flagship product, Security Center, is an open-architecture platform that uni es IP-based video surveillance, access control, automatic license plate recognition (ALPR), communications and analytics. Founded in 1997, and headquartered in Montreal, Canada, Genetec serves its customers via an extensive network of certi ed channel partners and consultants in over 159 countries.

www.genetec.com

HID powers the trusted identities of the world’s people, places and things. We make it possible for people to transact safely, work productively and travel freely. Our trusted identity solutions give people convenient access to physical and digital places and connect things that can be identi ed, veri ed and tracked digitally. Millions of people around the world use HID products and services to navigate their everyday lives, and billions of things are connected through HID technology. We work with governments, educational institutions, hospitals, nancial institutions, industrial businesses and some of the most innovative companies on the planet.

Headquartered in Austin, Texas, HID has over 4,500 employees worldwide and operates international o ces that support more than 100 countries. HID is an ASSA ABLOY Group brand. www.hidglobal.com

PREVIEW
HALL 2 STAND C30
HID
HALL 1 STAND E33 HALL 1 STAND D12
SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023 | 29

Tailored control room furniture solutions

Connected Technical Furniture (CTF) designs, manufactures, delivers, and installs Control Room, Crisis Room, Meeting Room, and Conference Room furniture. CTF designs and manufactures all of the above in its own state-of-the-art factory in Dubai Investment Park (DIP). That’s right, high quality engineering and manufacturing right here in the UAE. CTF is aligned with the ‘Make It in the Emirates’ goal of promoting the UAE as the first choice for high quality engineering and manufacturing.

The CTF Team will come to your site, measure, and design the perfect bespoke solution for your requirements. The best part? Delivery is within two weeks in the UAE and three weeks in the GCC. This is a huge boost for integrators and end users alike who are often left waiting for control room furniture for 16+ weeks which delays testing & commissioning and ultimately the handover of the project! It also forces integrators to tie up cash with advance payments for 4+ months ahead of receiving the goods and being able to deliver and invoice them, further reducing their cash flow and ultimately their profit.

CTF have a range of four different consoles: the U, A, E and K Class consoles which all have different characteristics such as number of workstations, sit/stand options, and size.

CTF is certified in the standards of ISO 9001: 2015, 14001 and 45001 and manufactures to the ISO ergonomic standard for Control Room Furniture, ISO 11064-4 2013, so you can rest assured that we are meeting or exceeding industry standards.

CTF also provides a free design and 3D rendering service to consultants, integrators, and end users where CTF will design the whole room including the interior design so that all stakeholders can see what the finished product will look like before any money has been spent.

Do you want a custom colour or have a particular design requirement in mind? No problem! CTF offers a full customisation service where everything can be changed. From size, frame colour, client logo and tabletop colour.

Unlike some of our competitors, PDUs, cable management, monitor brackets, delivery and installation are included in

the price. We believe in a turnkey service for your control room.

Worrying about a warranty? All CTF products come with a 5-year warranty as standard for a hassle-free operation and we have an in-country team and facility to support you.

Pick a leading project in the UAE: Expo 2020, Burj Khalifa, Royal Atlantis, One Zabeel, Museum of the Future, Bee’ah HQ, Uptown Dubai, AWS, Emirates Global Aluminium, City Walk, ADNOC’s largest refinery. What do they all have in common? They all have CTF technical furniture sitting at the heart of their security and operational apparatus.

Why go abroad when the best solution is right here? Get in touch with the CTF team today and let us help you design and build the technical furniture for your project.

Made in the UAE, delivered in two weeks!
contact us at hello@ctfconsules.com or visit www.ctfconsoles.com. Mention this advert for free delivery with your order. PROMOTIONAL FEATURE 30 | SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023
Please

PREMIUM CONTROL ROOM FURNITURE

www.ctfconsoles.com
hello@ctfconsoles.com

CASE STUDY

Traka Assa Abloy

Traka Assa Abloy’s key management systems were installed to help Jubail O&M Company streamline its operational processes

THE SOLUTION

Traka Assa Abloy installed its key management systems in order to streamline the operational process and ensure efficiency. Most importantly, the keys to critical equipment and plant rooms are always safely stored when they are not needed. The installed system meant that keys can be automatically distributed to any authorised user, plus there is a full audit trail of all users and key movements which is retained within the system and software, TrakaWEB.

COMPANY OVERVIEW

Jubail Operations & Maintenance Company (JOMEL) is located in the Jubaili industrial city of Saudi Arabia. It is responsible for the operation and maintenance of the Marafiq Independent Water and Power Project. The environmentally-friendly plant can produce up to 2,743.6 mega watt of electricity and 8,000,000 cubic metres of water every single day so it’s vital it runs efficiently, giving the highest availability with minimal downtime.

THE CHALLENGES

There are more than 230 staff operating at a single site, meaning the process of managing and controlling the facility’s critical keys to electrical switchgear, hazardous systems, vital plant compartments and equipment has been challenging. The task has become more demanding as the number of keys grew as the business has scaled up over the years.

n Lack of efficiency & productivity: During the busiest hours, searching for the right keys to provide access to authorised personnel was a tedious task.

n High administration costs: The keys were managed manually, under the supervision of operation leaders. This meant the associated administration costs were high, as operational leaders had to ensure only authorised users had access to the specific keys.

n Outdated audit review: The company was recording key movements in a logbook, with staff adding handwritten details of keys signed in and out. Over time, staff signatures had become illegible.

n Reduced downtime: Staff are able to locate the right keys thanks to the description search feature, and then gain access to them in just a few seconds. Speeding up access to keys is helping to reduce the time spent on old inefficient key location processes. Previously each member of staff responsible for key management spent more than 10 minutes every day searching and queuing for the right keys. Using Traka’s system has increased the speed of access by 95%, ensuring prompt response times during emergencies and unplanned maintenance.

n Automated processes: Key and cabinet access rights are provided based on staff schedules. Not only does this offer 24/7 access to those who are authorised, but it ensures that access is only obtained during authorised time periods. Under the old system lost keys had the potential to become a security threat, not to mention the costs involved in replacing missing keys. Traka’s system includes the ability to generate an exception report, for any keys that are overdue. Additionally, automatic email reminders are sent when keys are not returned.

n Audit report & compliance: The Traka system delivers 100% traceability which means JOMEL knows where every single key is at any given time. It also ensures that staff return the keys on time. Staff at the plant are able to generate a critical report to measure the quality and effectiveness of the health & safety policies in place, and the solution is compliant with Health & Safety regulations. www.traka.com

KEY STATS

↑ 95% 95% increase in speed of key access, giving cost savings per year of an estimated £11,520.

↓ £3750

Since the new system has been implemented there has been no lost keys reported. With an average of 15 keys per year previously going missing, and the cost to replace each one £250, it allows for total cost savings per year of £3,750.

CASE STUDY | TRAKA ASSA ABLOY SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023 | 33

The future of smart cities in the Middle East

Eugeniya Marina, RecFaces Business Development Director for the MENA Region, looks at the role of facial recognition technology in shaping urban development

In the last 10 years, urbanism has made a giant leap from the spheres of housing, community services and transport to the digital heights of artificial intelligence (AI). The widespread use of AI and Internet of Things (IoT) in city management technologies is making spaces ‘userfriendly’ and showing us two opposing trends. On the one hand, convenience is attracting more and more people to the megapolis. On the other hand, it is technology that provides comfort and security to hundreds of thousands of people in the agglomeration. Facial recognition technologies play a significant role in this.

Smart cities at the peak of popularity

Most of the sectors of Information Technology (IT) associated with the smart

city concept are experiencing active growth. For example, the ReportOcean agency estimates that the Middle East and Africa peripheral computing market will be worth US$1.46 billion in 2023, growing at a CAGR of 33%. And the market for digital twins will reach US$61.45 billion by 2027 with a CAGR of 34.48%, according to a report by Mordor Intelligence.

The scale of implementation of artificial intelligence technologies is showing rapid growth. Only 10-15 years ago, the main application areas of digital technologies in megacities were city-wide security systems and the management of the technical infrastructure of buildings. Currently, smart cities are emerging –like Neom, Abu Dhabi. The digital twin of the entire emirate of Abu Dhabi was announced at GITEX Technology Week.

SMART
| FACIAL RECOGNITION 34 | SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023
CITIES
SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023 | 35
“A smart city should be comfortable not only for citizens, but also for those who build and maintain it. This is the key to its long lifetime value and troublefree functioning.”

Why a city should be smart

According to UN forecasts, by 2050 more than half of the world’s population will live in cities. However, let’s be realistic: the higher the population density, the higher the crime rate, the likelihood of the spread of infectious diseases, man-made disasters and other threats. This means that measures are needed to neutralise these factors. But this is not the only reason – and far from the main one! – to build smart cities.

The practice of implementing smart city systems in different regions, including the Middle East, shows that this approach to agglomeration management has a number of advantages.

n Economy: Control over the expenditure of resources, optimal distribution of traffic flows, automation of most routine processes bring serious bonuses to the city budget. The money saved can be spent on the implementation of ambitious projects that will make the city even more attractive.

n Safety: Video surveillance systems and video analytics contribute to the detection of crimes, as well as have the ability to notify emergency response services about various incidents – from a street fight to a fire.

n Quality control: It is not public utility employees who can monitor street lighting systems, the cleanliness of sidewalks and glazing, the condition of flower beds and park areas, but AI-based

video analytics systems. It is faster, more reliable and completely eliminates the human factor.

All of the above not only makes the city a comfortable ecosystem for people, but also contributes to the growth of investment and tourist attractiveness of the city, which means attracting capital.

Face recognition – the connection between a city and a person

One of the most important tasks of a smart city within the framework of creating a comfortable urban environment is interaction with a person. Face recognition systems solve this problem. In fact, it is a ‘bridge’ between the city and hundreds of thousands of citizens. By reading the biometric profile in a fraction of a second, facial recognition systems provide the smart city with information vital for the proper functioning of the city’s infrastructure.

n Detection of crowds: The formation of a crowd may indicate that it is necessary to quickly introduce additional resources: launch another escalator in the subway or an additional flight of transport. On the other hand, it requires the increased attention of law enforcement officers.

n Admission to buildings: Facial recognition systems successfully replace access cards and fingerprint systems at the entrance of enterprises, institutions, stadiums and theatres, schools and

universities. They are reliable and, thanks to the high identification speed, help to avoid congestion at the beginning and end of the working day.

n Check-in for flights, ticket sales, public services: A robot or kiosk equipped with a facial recognition system can verify the client’s image with documents and automatically issue travel documents without the participation of employees of the transport company. This possibility has already been implemented at Emirates Airline. It can also be implemented for the registration of some documents (for example, insurance), the provision of public services, or the sale of personalised tickets to events.

n Ensuring security of shopping centres: The systems track visitors from the ‘stop list’, register suspicious behavior in the store and warn the security services in time. Facial recognition helps reduce theft damage by 50-90%.

n Tracking violators: The facial recognition system tracks the movement of a certain person, including in a crowd, and helps to detain them ‘in hot pursuit’.

The future belongs to easy-to-use technologies. A smart city should be comfortable not only for citizens, but also for those who build and maintain it. This is the key to its long lifetime value and trouble-free functioning.

www.recfaces.com

SMART CITIES | FACIAL RECOGNITION 36 | SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023
The Line megacity, currently under development in Saudi Arabia, is part of the Neom project

UVIS: DESIGN REQUIREMENTS

FIND OUT ABOUT THE REQUIREMENTS OF AN UNDER-VEHICLE IMAGING SYSTEM TO GUARANTEE HIGH PERFORMANCE

Issue 127 July/August 22
IN ASSOCATION WITH

Under-vehicle imaging system design requirements for high performance

Under-vehicle imaging systems (UVIS) have proven to be critical for checkpoints that require high security. Yet despite this not all UVIS are created equally. We take a look at how Rapiscan | AS&E’s Gatekeeper Intelligent Vehicle Undercarriage Scanner (IVUS) performs

38 | SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023

Unfortunately, many under-vehicle screening systems on the market do not add value beyond the antiquated inspection technique of viewing the underside of a vehicle with a mirror on a stick. Yet, when designed correctly, an imaging system can scan the underside of a vehicle and produce consistent nighttime and daytime imagery, allowing for foreign object detection to help to quickly identify threats with much higher accuracy and in less time than other inspection methods.

Change detection is what matters

Manual human inspection of vehicle undercarriages is often ineffective and inefficient. Limitations on humans’ ability to focus on difficult tasks for long durations of time can significantly reduce the likelihood that a security officer will successfully identify a security threat under a vehicle.

Beyond the limitations of a person’s attention span, vehicle undercarriages vary significantly among models, making it difficult for a security official to locate threats among the large variety of components and variations. A UVIS uses change detection technology to compare alterations to the undercarriage of a vehicle to reliably identify potential threats.

A UVIS should produce highresolution, consistent imagery in all lighting conditions, and the images

should be easy to interpret with manual visual inspection on a computer screen.

Simultaneously, change detection will identify modifications to the undercarriage (such as an enlarged fuel tank) by circling or highlighting the area that requires further visual inspection of the image. Since a foreign object can be any form, shape or size, the most effective method of identifying an undefined foreign object is by detecting changes in the imagery (change detection) from a reference database.

The Gatekeeper IVUS performs change detection by comparing the underside of the vehicle with a reference image of the same vehicle if it has previously been scanned by the system, or it utilises a reference image of the same model of the vehicle in the system database. In the latter case, the reference image is recovered from the reference database based solely on its undercarriage match via the Gatekeeper pattern recognition algorithm. To perform this comparison effectively, the imagery should be consistent from scan to scan, both day and night, to allow for accurate change analysis of the imagery.

The Gatekeeper IVUS uses many specific technical approaches in the design to provide consistent imagery and performance in all environmental conditions while other systems can struggle to produce effective results.

About Rapiscan Systems | AS&E

Rapiscan Systems | AS&E is part of the OSI Systems family of security companies. We provide cargo and vehicle inspection systems and services to help borders, ports, military, high-threat locations and law enforcement combat terrorism, smuggling and trade fraud. Our broad array of scanning systems leverages optical inspection, X-ray inspection, and radiation detection technologies to address each customer’s unique security application requirements. Customers can further enhance inspection capabilities and operational efficiencies with our analyst assist tools and data integration platform. With this technology, information can be collected and combined from multiple sources in the inspection operation to automate manual processes, control workflows and deliver targeted, actionable intelligence. Our commitment to excellence in imaging performance, cutting-edge digital technology and uncompromising quality ensures our solutions help customers find threats and contraband with ease and confidence.

PROMOTIONAL FEATURE SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023 | 39

Parallax: the big problem

Gatekeeper technology solves

Parallax is the apparent change in the location of objects as viewed from different positions. If a UVIS is not designed correctly, it will produce inconsistent imagery from parallax if a vehicle is not centred identically every time it passes over the scanning system. Just a couple of inches of movement of the vehicle to the left or right when passing over the sensor can result in very large changes in the apparent location of components in the imagery of the underside of the vehicle.

Since foreign object detection relies on change detection, systems that suffer from parallax problems are less likely to reliably detect foreign objects.

Parallax problems can arise in a UVIS that has a small optical aperture located at the centre of the vehicle. To combat this problem, physical guide rails or curbs are often installed in the middle of the lane to force vehicles into the same location each time they pass over the sensor. Physical guide rails and constraints are understandably undesirable solutions for many customers given that vehicle tyres, undercarriages, and trailers can be potentially damaged as vehicles proceed down the lane. In addition, guide rails are not always effective solutions for centering vehicles with different wheelbases.

Failure to correctly align vehicles in systems with parallax problems could mean the imagery produced is significantly different, making a change analysis algorithm incorrectly identify these changes as foreign objects. Similarly, objects at the edge of the vehicle’s undercarriage can be obscured

from view due to line-of-sight blind spots from imaging from the centre of the vehicle outward rather than imaging directly upwards. The patented Gatekeeper IVUS design avoids these problems and allows for imaging without line-of-site or parallax issues.

Two views for twice the protection

The Gatekeeper-patented dual-view imaging system views the undercarriage from two different angles to identify objects that are hidden above pipes, mounts or other undercarriage infrastructure. This unique capability can help to identify more contraband than

other UVIS. Line-scan cameras also do not have the ability to produce more than a single view of the undercarriage which limits their ability to observe the vehicle from multiple angles for maximum foreign object detection performance.

Image consistency: illumination uniformity

Change analysis requires consistent imagery, and a major component of producing consistent imagery is the uniformity of the illumination. Since foreign object detection is based on change detection, changes in illumination between the most recent vehicle scan and the reference scan can be identified as

Above The Gatekeeper IVUS produces two views of the undercarriage at two different angles to identify foreign objects that may be hidden from single-view UVIS systems.
40 | SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023
The images left are from a camera for illustrative purposes: Imagery from systems with a centralised small optical aperture will create parallax issues, or differences in under-vehicle component locations with just a small change in vehicle centering over the system. Centred (left) vs. a vehicle driving just 7 inches offset from centre (right).

foreign objects. For example, significant changes in shadows or illumination brightness between the current vehicle image and the reference vehicle image can result in false detections of foreign objects and makes manual inspection of the imagery by a human difficult.

The Gatekeeper IVUS does not suffer from the same illumination non-uniformity issues as some competitors. Both the image brightness and uniformity are consistent day and night, allowing for accurate change detection when comparing new vehicle images with reference images, regardless of the time of day.

In some systems it is possible that the difference in daytime and nighttime imagery is significant, making change analysis and foreign object detection difficult, if not impossible, due to the changes in illumination brightness and uniformity.

Image consistency: full-colour imagery is not an advantage

The Gatekeeper IVUS creates monochrome imagery for a specific purpose: to create consistent imagery for the vehicle’s undercarriage in all environmental conditions and lighting. To produce the consistent imagery needed for accurate change detection, the system must reject the sun’s impact on the amount of light collected by the camera; otherwise, there will be large changes in the data from scan to scan.

The Gatekeeper IVUS incorporates spectral filtration matched with its

illumination to reject all wavelengths of light other than what is beneficial to the system. This spectral filtration creates a monochrome image that is ideal for change analysis, and it offers performance superior to colour imagery systems that inherently cannot use spectral filtration to improve image consistency. The monochrome imagery produced by the Gatekeeper IVUS has more consistent brightness and contrast, producing more accurate results with change detection algorithms, and is much more interpretable by humans during manual image inspection.

Is it really foreign object detection?

Some providers claim to have foreign object detection but instead use magnet detection on the underside of a vehicle. While the vehicle traverses the imaging system, the magnetic field is measured under the vehicle, which searches for magnets used to secure foreign objects to the bottom of the vehicle during a demonstration.

The magnetic detection software identifies the location of the magnet rather than the foreign object itself. Without the presence of a magnet, the object is unlikely to be detected under the vehicle if it was secured to the underside by other common methods (adhesive, bracketry, etc.). Magnetic detection technology also would not be able to identify other physical changes made to an undercarriage to mask the carrying of contraband.

Imaging system performance: line-scan vs. area-scan

The Gatekeeper IVUS uses area-scan imaging rather than line-scan cameras used in other systems, as area-scan technology produces an undistorted image of the vehicle undercarriage regardless of the vehicle’s motion over the sensor. Even if the vehicle speed changes while it’s traversing the system, or the vehicle stops before proceeding, area-scan imaging produces undistorted imagery by acquiring overlapping two-dimensional imagery at high frame rates and stitching them into a single, high-resolution image.

This technology enables a more accurate representation of the undercarriage without the blurring or distortion that is typically observed in line-scan camera imaging solutions that produce a one-dimensional image and attempt to create an accurate two-dimensional image from that data. The line-scan imaging systems are also sensitive to vehicle speed and driver inconsistencies that can result in distorted or blurry images.

Test who is best

Gatekeeper imaging systems from Rapiscan | AS&E are leaders in intelligent optical inspection technology, trusted by customers around with world with thousands of installations at borders, ports, critical infrastructure and highthreat facilities. We encourage on-site, side-by-side demonstrations with competing systems to demonstrate how our technology can more effectively help customers solve the most demanding security challenges.

rapiscan-ase.com

PROMOTIONAL FEATURE SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023 | 41
Top image Night imagery from Gatekeeper IVUS. Bottom image Day imagery from Gatekeeper IVUS. Gatekeeper systems produce consistent undervehicle imagery both day and night with similar brightness and uniformity to facilitate accurate foreign object detection in all lighting conditions.

END-TO-END SECURITY CHECKPOINT TECHNOLOGY

PROTECTING HIGH-THREAT FACILITIES & CRITICAL INFRASTRUCTURE

Secure your checkpoint with our industry-leading X-ray inspection, optical inspection, and radiation detection technologies that help to uncover threats and identify and authenticate vehicles and occupants. Further enhance inspection capabilities and operational efficiencies with our analyst assist tools and data integration platform that collects and combines security information from multiple sources in the inspection operation to automate manual processes, control workflows, and deliver actionable intelligence. With our end-to-end checkpoint security technology and expert program management and support, we can help you maximize threat detection and operational success.

rapiscan-ase.com

fire evacuation alert system

Tomas Protivanek, Product Manager, Fire Detection, Johnson Controls takes a closer look at the key points security professionals should be aware of when detailing a fire evacuation alert system

4 things to consider when specifying a
ALARMS | FIRE EVACUATION SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023 | 43

When it comes to fire safety in highrise structures, swift and controlled evacuation is paramount. As building designs become more complex, evacuation protocols must also evolve. In recent years, fire evacuation alert systems (EAS) have been identified as a vital component in establishing safe egress and limiting confusion during stay-put orders. When specifying a fire evacuation alert system, consider these key factors:

1 BS8629 Compliance

The BS8629 code of practice has become the gold standard for fire evacuation protocols within high-rise residential buildings. These guidelines highlight the importance of a fire EAS to provide effective communication during critical events.

The BS8629 standards extend into EAS design, installation, commissioning and maintenance, and it is important that all involved parties be trained on, and are familiar with, these guidelines. Although BS8629 guidelines are a code of practice and not an enforceable regulation, building professionals who implement these standards can now be poised to meet future requirements as standards evolve. For this reason, it is important to ensure the EAS you purchase is fully compliant with BS8629.

2 Building Size

The Fire Industry Association (FIA) designates that evacuation alert systems must meet the occupant load of the building including the number of storeys. In most instances, each building level will be identified as an individual evacuation zone. If the number of evacuation zones exceeds a single EAS panel, multiple panels can be

networked together or linked through an evacuation alert black box. Additionally, each residence must be fitted with an alarm sounder and visual alarm device.

3 System Features

Simplified operation is a key element of EAS design that should not be overlooked. Features such as individual toggle switches allow the operator to systematically activate and cancel sounders by evacuation zone. Look for a system with exterior identifiers that can be used to indicate status and availability of power within each zone. It is also important to ensure speakers and sounders are EN54-24 certified to optimise safety and performance.

4 Panel Protection

Fire evacuation alert panels are intended to be operated exclusively by first responders. To prevent tampering, panels should be concealed within an Evacuation Alert Control and Indicating Equipment (EACIE) enclosure that meets LPS 1175: Issue 8 security guidelines. The enclosure should always remain locked. A unique key is then issued to nearby fire and rescue stations.

Evacuation alert systems are a vital component of establishing reliable fire safety measures within high-rise residential buildings. When evaluating systems, it is important that BS8629 standards are followed, as well as these other considerations. Following these guidelines will help ensure reliable EAS performance and intuitive operation when the system is needed most.

www.johnsoncontrols.com

ALARMS | FIRE EVACUATION 44 | SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023
“In recent years, fire evacuation alert systems (EAS) have been identified as a vital component in establishing safe egress and limiting confusion during stay-put orders.”

REVOLUTIONISING Video Management Software and Analytics

Vans

The Digifort VMS records high-quality CCTV video, whilst its neural analytics identifies objects and people of interest, alerting system users to events in real time.

Metadata allows the same recorded video to be searched, but this time for different criteria. So, a system configured to identify intruders, could be used forensically to identify vans, bikes, cars, trucks, groups of people, bags, and cyclists of interest - processing weeks of recorded video in just a few minutes.

People Cars Digifort Proven, Unified, Trusted, and Secure

Digifort Global

Enabling secure and auditable logistic solutions

Continuous technological advancements are reshaping the logistics market. Complex logistic and security challenges can now be solved based on mobile credentialing technology resulting in reduced operational costs and theft, increased transparency, and clearer liability throughout the supply chain.

CARGO SECURITY

Securing cargo handover to prevent freight theft

Global supply chains have experienced significant disruption due to the COVID-19 pandemic, war in Ukraine, as well as increasing vulnerability due to the growing adoption of digital technologies. In 2021, the top 3 causes of freight theft were hijacking (26%), theft from storage facilities (25%) and containers/ trailers (11%) (source: Transported Asset Protection Association). Cargo at rest in unsecured parking lots, container yards or port facilities is especially vulnerable to theft, a situation that is aggravated by growing port congestion.

Criminal organisations increasingly

infiltrate supply chains or manage to bribe warehouse workers or truck drivers to steal cargo. Insider theft typically occurs when warehouse or facility employees disclose confidential information pertaining to shipping and delivery times, or when employees intentionally leave doors and gates unlocked overnight, granting criminals easier access to goods.

To mitigate these risks, logistic authorities such as BIS, TT Club & TAPA EMEA recommend security measures such as sealed rail containers with ISO-17712compliant locks, documented checks on locking devices at all stops, GPS tracking of containers and alarms when container doors are opened by unauthorised personnel.

Securing freight based on real-time monitoring of mobile credentials

Based on dynamically managed encryption technology, real-time mobile credentialing over-the-air, and biometric authentication capabilities of smartphones, secure and auditable permission-based access to storage facilities, containers, vehicles as well as

shipping information and packing lists can be quickly implemented.

Benefits of mobile credentialing for Cargo Security:

n Wireless configuration – user smartphones and electronic locks can be remotely managed and configured over-the-air via a secure, encrypted Bluetooth or RFID channel.

n Eliminates physical keys which are easily lost or copied and require cumbersome manual storage and handling.

n Authentication of both users as well as locks and vehicles prevents fraud and hardware spoofing.

n Enabling of an audit trail provides historical reporting of who has interacted with each container, lock, and vehicle, when and where.

n Permission-based access grants and revokes access remotely and in real-time.

n Offline operation – mobile credentialing platforms can operate autonomously without a network connection resulting in 24/7 availability.

Mobile credentialing enables freight forwarders to reduce costs while increasing supply chain transparency.
By Richard Moser and Carl Fenger, LEGIC Identsystems
46 | SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023

COLD CHAIN LOGISTICS Securely manage delivery of perishable goods

Perishable goods such as food, pharmaceuticals and high value electronics require a controlled temperature to ensure the quality of the product during shipment. With a market value of 782 billion USD by 2030 (source Allied Market Research), the ‘Cold Chain

Logistics’ market is becoming increasingly important in global supply chains.

Risks in dealing with temperature sensitive goods include food spoilage, degradation of pharmaceuticals, and damage to high-value electronics and other environmentally sensitive products. The main factors contributing to damaged goods are related to improper handling during shipment and last-mile delivery, and failure to comply with regulatory

procedures or temperature monitoring guidelines. Reliance on multiple thirdparty service providers also contributes to a lack of logistics overview.

The ability to precisely monitor and record container environment as well as manage and log who accesses a container where and when is becoming increasing important, especially for auditing and liability purposes. Real-time monitoring and cargo access control is becoming a key competitive advantage for providers of Cold Chain Logistics services.

Benefits of Mobile Credentialing for Cold Chain Logistics

n Remote, real-time management of critical access points such as containers, storage facilities and transport vehicles.

n Automated logging of door and container openings based on mobile credentials enables reliable auditing and quality control of shipments from end-to-end.

n Automatic locking of transport equipment prevents human error, hijacking and product tampering.

n High security as locks and data storage/communications implement the highest commercially available encryption (AES-128) combined with Secure Element technology. All RF communications are encrypted, key data stored in the lock is physically and electronically inaccessible and smartcards cannot be copied.

n Offline operation – mobile credentialing platforms such as LEGIC Connect function even without a network connection enabling reliable 24/7 operation even when offline

n Wireless configuration – reefers or active cooling containers can be managed and configured over-the-air via a secure, encrypted Bluetooth or RFID channel to prevent damage to the cargo caused by misconfigurations or interventions by unqualified personnel.

For more information about Mobile Credentialing and LEGIC Connect for cargo security, visit www.legic.com/logistics, or send an email enquiry to info@legic.com

PROMOTIONAL FEATURE SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023 | 47

Enhancing perimeter security with AI

Even in safe regions such as the Gulf, security is a factor that really matters. It ensures that organisations, their assets and information are well protected from theft or damage, that nothing will disrupt the continuity of their operations, and that both employees and customers have a safe and comfortable environment.

Perimeter security is the first line in multiple layers of defence, protecting the boundaries of organisations, car parks, entry areas and loading zones. For many years, physical barriers such as fences, walls, doors and guards have been used to patrol the perimeter and monitor any suspicious activity. For example, the Al Fahidi Fort in Dubai has protective walls and watchtowers to provide visibility of the outside environment. Similarly, in Saudi Arabia, the Masmak Fort, with its thick walls, watchtowers and narrow, heavily built gates, protected against unauthorised entry and provided facilities to support ongoing life inside.

However, physical barriers have their limitations and are not sufficient to meet the growing demands of modern security threats. These methods are expensive to maintain, require significant manpower, and are not foolproof. Intruders could still find ways to breach the perimeter undetected. Besides, they do not provide much information about who is trying to breach the perimeter.

Advancing technology

With the advancement of technology, there are now various solutions available to enhance perimeter protection, including video surveillance cameras linked to a Security Operations Centre and access control systems that use security cards, PIN pads, biometrics, and other sensors. Infrared cameras are capable of capturing images in low-light conditions, making it easier to identify intruders. Laser beams create an invisible barrier that triggers an alarm when breached. Radar systems detect objects and movements beyond the line of sight, enabling early warning and detection of potential threats. Motion sensors detect movement within a specific area and send an alert to security personnel.

The major issue with video surveillance is its reliance on human review. This is labour-consuming, costly and fatiguing for security officers, which often results in missed events. A commonly cited study from 2002 found that after 12 minutes of continuous video monitoring, an operator will often miss up to 45% of screen activity. After 22 minutes of viewing, up to 95% is overlooked. One solution is to set up perimeter lines and detect line crossings or show the camera feed when there are a certain number of changed pixels. Unfortunately, this approach

doesn’t work well, and many detections end up being false alarms.

Avoiding false positives

Advances in AI technology have improved the efficiency and effectiveness of intrusion detection and perimeter protection solutions. This means that they can provide more accurate alerts.

Due to false alarm filtering technology, it’s now possible to remove over 99% of false positives caused by insects, camera issues, lighting changes or small animals. Only footage showing a person or vehicle is displayed. This saves countless hours for security officers, reduces labour costs and minimises security operator fatigue. By leveraging AI, organisations can enhance perimeter protection capabilities. AI-powered solutions use machine learning algorithms to analyse video feeds from surveillance cameras in real-time. They can detect and alert security personnel to potential threats, including unauthorised intrusions, suspicious behavior, and unusual movements, such as individuals loitering in a certain area or objects left unattended. By applying machine learning techniques, these systems can identify patterns and anomalies in the data that may indicate a potential intrusion. This helps minimise the risk of a breach and

Perimeter protection is a crucial aspect of security, whether it be for public, residential or commercial purposes. Ara Ghazaryan, Ph.D, Technical Co-founder and VP of AI at Scylla, looks at how it can work even harder thanks to artificial intelligence (AI)
PERIMETER
48 |
| SEPTEMBER/OCTOBER 2023
PROTECTION | AI
SECURITY MIDDLE EAST
SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023 | 49

allows security personnel to respond quickly and effectively.

The power of integration

One more important step in improving perimeter protection is integrating access control systems with facial recognition software and implementing multi-factor identification to verify both employees and visitors. It results in increased safety and security and improves employee attendance control and visitor management.

Using license plate recognition systems is another way to provide an extra layer of security. Along with video surveillance cameras, organisations can control access to their premises by creating a list of vehicles allowed on the territory. The LPR system quickly and accurately verifies vehicles that enter or exit a parking lot or a controlled area within a business or private premises, ensuring that only authorised vehicles have access to these areas.

Another prospective technology for perimeter protection used in the Middle East is security drones equipped with high-resolution cameras. They allow for quick and efficient monitoring of large areas, providing real-time footage to security personnel. This technology is particularly useful for monitoring areas that are difficult to access on foot. For example, oil & gas companies can effectively inspect pipelines that span thousands of kilometres or monitor the exterior surfaces of storage facilities. In combination with advanced AI solutions, surveillance drones are going to become

smarter in the future and provide more high-quality data. Thus, in the next three to five years, the oil & gas industry is expected to increase its investment in drones and robotics from 15% to 28%, according to Frost & Sullivan.

Adoption across industries

The adoption of AI-powered video analytics for perimeter protection is already underway in various industries in the Middle East region. It is particularly useful for large-scale facilities, such as airports, seaports, oil & gas installations, and critical infrastructure, where human monitoring is impractical or insufficient. The Dubai Police Force has deployed a smart surveillance system that uses facial recognition technology to identify wanted criminals and suspects in real-time. The system has helped the police reduce crime rates and improve public safety in the city. Similarly, the Abu Dhabi National Oil Company (ADNOC) has implemented an AI-powered video analytics system to monitor its oil and gas pipelines and prevent theft and sabotage. Airports use it to secure their perimeters and prevent unauthorised access to restricted areas. Banks protect their branches and ATMs from robbery and vandalism using the technology.

Strong perimeter security is of utmost importance for manufacturing plants, which are at risk of product tampering and equipment theft, as well as vandalism and setting fires. Energy sites have to be vigilant to prevent terrorist attacks and acts of sabotage. AI-powered

solutions help them monitor the area 24/7, detecting and tracking potential threats and automatically sending alerts before intruders enter the perimeter or do damage.

With the travel and tourism sector welcoming 90 million international arrivals per year, tourism is continuing to grow in the Middle East. Visitors are attracted to a warm climate, a safe tourist environment and sightseeing opportunities. Therefore, Middle Eastern countries will gradually start requiring the implementation of AI video analytics in malls, residential areas, recreational facilities, and hotels to prevent intrusions and increase security protection. Perimeter security is also important for unattended swimming pools, as there have been many incidents of drowning when people have entered a closed pool without lifeguards.

The right combination

No single technology can provide complete perimeter protection. Therefore, a combination of traditional measures and innovative technologies should be used to ensure maximum security. Although traditional measures are still prevalent in many parts of the MENA region, innovative technologies are becoming increasingly popular due to their effectiveness and efficiency. The adoption of AI-powered solutions is gaining momentum and it is likely to be only a matter of time before it is used widely.

www.scylla.ai

PERIMETER PROTECTION | AI 50 | SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023

INTEGRATED PERIMETER SECURITY: A MUST-HAVE FOR MODERN, SECURITY-CONSCIOUS FACILITIES

Why all facilities need holistic, integrated perimeter security solutions and a reliable integration partner?

Today, all businesses, utilities, government buildings, critical infrastructures, and high-security facilities worry about the security risks posed by intruders and criminals. To protect their assets, safeguard vulnerable locations, and keep their people safe, these entities must implement strong defenses that go beyond fences, security gates, bollards, and guards. They must implement perimeter security solutions.

Perimeter security refers to security infrastructure that provides effective 24x7x365 protection for the facility. A comprehensive and integrated security infrastructure ensures robust and reliable access control, keeping out unauthorized users. It also helps security teams to manage the flow of people, detect security breaches, and stop threats before they can cause material damage.

Perimeter Security is Not a One-size-fits-all Game

There’s no one-size-fits-all solution that can satisfy the perimeter security needs of all facilities. The first step to implement an effective system requires understanding the facility’s unique security risks and requirements. Facility owners or managers must also define their perimeter and identify the system that can best minimize the facility’s risks. It’s also vital to tailor the system and ensure that it seamlessly integrates physical security with cyber and personnel security elements. Finally, a centralized, user-friendly console must be part of the perimeter security infrastructure and it should allow for easy management, upgrades, and reporting.

All these crucial activities can be overwhelming for inexperienced security teams. A security expert partner like MVP Tech – Convergint MEA can reduce the overwhelm and set up well-functioning, well-integrated perimeter security that strengthens a facility’s defenses and enables it to confidently face any kind of threat.

MVP Tech – Convergint ME: Integrated, Customized Perimeter Security Solutions for All Kinds of Facilities

We at MVP Tech-Convergint MEA have the expertise and experience to design state-of-the-art, cost-effective perimeter security solutions for many kinds of facilities, including commercial spaces, data centers, government buildings, and high-security facilities. We support clients at every stage of installation and are a single point of contact for business intelligence and assessments, plus system design, development, integration, testing, handover, training and support.

How Multi-layered Perimeter Security Deters Intruders and Protects Facilities

For many decades, factories, offices, government buildings, prisons, etc. relied on tall fences topped with barbed wire, human security guards, and dogs to keep intruders out. Over time, surveillance technology and devices like network cameras and motion sensors emerged, giving rise to next-gen perimeter security.

Today, perimeter security leverages many powerful technologies and tools including thermal video cameras, motion sensors, intruder alarms, lasers, monitored pulse fences, and access control systems. A multi-layered perimeter security system with a centralized command-and-control (C&C) platform integrates all these protective measures to provide strong, highly reliable protection from ever-evolving, dynamic threats.

The platform provides proactive monitoring, real-time alerts, and advanced visibility to deter potential intruders and safeguard the facility – something that stand-alone tools can do to a very limited extent. It also detects intrusions and raises alarms, allowing security teams to quickly take action to eliminate threats. The most advanced systems can also auto-initiate pre-programmed responses to provide stronger, more timely security that every modern facility now needs.

Each solution is fully customized for each client’s unique security needs and risks. It also unifies various stand-alone security tools, including access control systems, sensors, and CCTV cameras and seamlessly integrates with the organization’s overall security infrastructure to provide reliable, 24x7x365 protection. These integrated, reliable systems improve the response times of security teams, maximize detection precision, and minimize false alarms. Each system is also easily scalable, so tools can be easily added or removed as security needs change, thus ensuring that the system is always abreast with the evolving risk landscape.

Conclusion

In today’s security landscape, the most effective way to keep intruders out of facilities is a comprehensive, integrated perimeter security system. A diverse range of such solutions are now available that provide full visibility, detect breaches in real-time, and raise alerts, allowing facilities to proactively and effectively safeguard their spaces.

Please scan this QR code to know more about our offerings and expertise.

Middle East expansion

Security Middle East magazine had the opportunity to speak with Orep Sécurité’s Chairman, Stéphane Valette and Guillaume Arnuti, International Business Developer, to find out more about their ambitious plans for the future and expansion into the Middle East

Orep Sécurité was founded in 1972 and is now the leader in perimeter protection in France. What do you credit your longevity to?

Valette: The company was founded in 1972 to support the development of the French nuclear program. Right from the beginning, Orep specialised in the field of perimeter protection for sensitive sites of strategic importance, serving major institutional clients both domestically and internationally.

We have positioned ourselves as a major player in the market since the 1980s and continued to grow by renewing the design and relevance of our products and by responding to customer needs through innovation.

In 2013, myself and Benjamin Adell de Ortell took over the company. Today, the company focuses on designing, project management, manufacturing and commissioning of detection systems, including defensive anti-ram fences, instrumented fences, gate detectors, cable mounting on fences and more.

Tell us about your product range

Arnuti: From cable to instrumented fences, our intrusion detection systems include sensors that detect cutting, climbing, or shearing of the fence. These are highly reliable as they generate very few false alarms. According to the system, there is no more than one false alarm per year for every 1km of fence.

Without any doubt, our star product would be our smart fence: the Perifence system. It has been designed and developed by our engineering department. This is a detection fence consisting of rigid welded mesh panels that are equipped with a detection cable sensitive to cutting. This perimeter detection device is fully integrated into

the fence and completely invisible.

The detection wire is wired to form a current loop that, when analysed by the Zuc40 electronic board, constitutes an alarm zone. The top part of the Perifence fence is equipped with a bent arm system that detects any attempt to climb over. This system uses Epi-Sure connectors that ensure isolation of the electrical loop and provide easy maintenance. We also have a mobile version of Perifence.

What lies ahead for Orep Sécurité?

Valette: In terms of innovation, we’ve introduced a groundbreaking system known as Perisas. This represents an intrusion detection solution tailored for securing various critical areas, including airlocks, ducts, pipelines, effluents, and ventilation systems. Our primary objective for clients with sensitive sites is to delay intrusion by customisable intervals, be it 30 seconds, 1 minute, or even 10 minutes, depending on the specific requirements. These systems feature custom-designed barred grids, typically constructed from durable stainless steel, ensuring a lengthy lifespan and backed by a 10-year corrosion warranty. Detection is guaranteed through the cutting of the detection wire that

interfaces with the grids. The Perisas system and its junction boxes offer selfprotection. These protective measures are frequently installed in response to requests from prominent authorities such as the High Official for Defense and Security (HFDS), the Nuclear Safety Authority (ASN), or the Institute for Radiological Protection and Nuclear Safety (IRSN).

Arnuti: In term of business development, we have ambitious plans to expand our presence in the Middle East region. Over the past few years, the Middle East has emerged as a key player in the global economy. We aim to bring our French expertise and collaborate with local partners to secure critical infrastructure.

To achieve this, we’ve already scheduled our participation in key exhibitions in 2024, including Intersec Dubai, IRSN Abu Dhabi, and Intersec Saudi Arabia. OREP has established a reputation for delivering top-tier quality over the last 50 years and we are eager to export our expertise.

www.orep-securite.com
Stéphane Valette
PROMOTIONAL FEATURE 52 | SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023
Guillaume Arnuti

Surveillance lessons from the higher education sector

Middle East & Africa, explains how universities are turning to more capable and flexible video solutions

Just like any large institution, Middle East universities are susceptible to crimes including theft, vandalism and assault. Ensuring the safety of students, staff and property is a constant challenge. And of course, universities the world over can be the targets for more serious attacks, due to the concentration of people and their symbolic value. They can also be vulnerable to protests and civil unrest, which can disrupt university life and pose safety risks to students and staff.

Today, more Middle East countries are encouraging and welcoming women on to their campuses, which makes it more important for security teams to remain vigilant to the potential of gender-based harassment. Preparedness for more frequent extreme weather events and hard-to-predict natural disasters such as earthquakes, floods, and dust storms also necessitate emergency planning and infrastructure resilience.

In many cases, campuses have multiple access points and relatively soft perimeters. And sometimes facilities are dispersed in busy urban locations which makes them harder to demarcate.

Adding to the challenges, universities have large populations with a significant annual turnover, and there are often frequent visitors to be managed, including visiting academics, family members and friends of students, as well, of course, as all the staff and contractors who keep the institutions running.

Key role for video

Not surprisingly, video surveillance is playing a key role in security in education, helping to get the protective balance right.

Video systems are being upgraded to give better image quality and more complete coverage, and this is supporting control room teams who monitor events in realtime, and use better emergency response, personal alert and communications technologies to ensure that rapid support can be provided for anyone who needs it.

And these system upgrades are giving universities better results, more affordably, than in the past. They are delivering HD image quality regardless of lighting conditions, including complete darkness, or fluctuating extremes of light and shade; ensuring coverage without blind spots, across wide areas or focused on particular risk points.

The upgraded systems are easier to use, both for real-time monitoring and review, with the latest VMS giving operators smoother and easier controls, AI-powered analytics and mobile viewing and management options that support busy managers and teams on the move.

Affordability and long-term value

They also meet the requirement for affordability and long-term system value, including easy upgrade routes that allow existing equipment and infrastructure to be retained as part of modernised solutions; low operating costs and maintenance burden; and fair pricing structures without hidden licence fees or bundled-in charges for functions that are not used.

And, increasingly today, they offer AI-futureproofing. Universities are looking for the best analytics adoption models, including software, and more targeted options such as edge AI cameras or add-on devices. This is allowing them to harness artificial intelligence video tools, with obstacles, as they identify emerging benefits and potential for improving efficiency and surveillance effectiveness.

For example, in one recent application in Türkiye, IDIS video technology is being used to provide the backbone security infrastructure for an international university

SURVEILLANCE | HIGHER EDUCATION SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023 | 53

with facilities dispersed across a busy city centre. It’s a site that also benefits from a thriving night-time economy – a further attraction for students at many universities – but of course that brings with it an increased risk of incidents, including crime and anti-social behaviour.

Tackling accumulated complexity

In this case, the security team monitors the various locations from a 24/7 dedicated control room, using a 350-camera system.

However, at the point when IDIS became involved, the system had already been expanded several times, and by now comprised a mix of cameras from six different manufacturers. The VMS being used was struggling to control these multiple brands; pictures would often freeze, and the solution had an excessive video data storage burden.

This kind of complexity, with assorted video infrastructure accumulated over time, is a common problem. In this case IDIS Solution Suite (ISS) VMS was used to quickly register the mix of cameras and devices, including third-party DVRs, two Dell recorders, various analogue HD cameras, and a three-by-three-metre video wall. This integration allowed smoother and more streamlined control, which was not possible with the old VMS.

Improved control room operations

Security staff can control today’s systems from their workstations as well as from video walls, with browser features allowing fire systems, and other key

systems, to display on the same screens. Schematics can show the locations of the cameras on maps and floorplans, to improve domain awareness across complex sites and make navigational playback faster and easier.

And it’s now easier for universities to achieve more complete site coverage, using a choice of Fisheyes, mini-PTZs, and domes which give affordable options for both wide area coverage and targeted scene surveillance. Today’s cameras can also cope better with the challenges that universities sometimes throw up – for example, historic buildings where major structural modifications are not permitted.

Managing recorded video

To save bandwidth and reduce the storage burden, cameras in areas including corridors, basements, and storage areas can be set to record only when motion is detected, again taking advantage of advances in analytics, as well as powerful compression technologies.

When this footage needs to be reviewed, bookmarked event recording makes it easy for operators to skip from scene to scene when searching recordings. And today’s deep learning analytics can take search capabilities a step further, leveraging metadata for even faster, automated footage review with tools that can speed up investigations from hours and weeks to mere minutes.

Finally, systems are now easier and more affordable to expand. Today’s more powerful NVRs allow more cameras to be easily added, while increased storage capacity will ensure longer retention periods without increasing storage costs thanks to H.265 combined with the latest advanced compression technologies.

Extended concepts of risk

No two university sites are the same, but most share the problems of complex facilities to watch over with legacy video infrastructure that will sooner or later need modernising.

As universities extend the concept of ‘risk’ to cover not just the physical safety of students and staff, but also their wellbeing, there’s a greater understanding that young people living away from home for the first time in unfamiliar surroundings, sometimes in a new culture and speaking a second language, can be at risk, and that institutions have a duty of care towards them. The ability to streamline and extend the life of ageing systems, to make them easy to use, get them delivering HD video, and enhancing them with the latest AIpowered analytics tools, offers significant advantages in addressing these risks, as well as reducing both costs and waste.

www.idisglobal.com

SURVEILLANCE | HIGHER EDUCATION 54 | SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023
IN A WORD, MANY SOLUTIONS. www.sicurezza.it ONE PLACE. FOUR EXHIBITIONS fireshow.com.br www.exposec.com.br INTERNATIONAL NETWORK PARTNER

Leveraging physical security to protect and optimise manufacturing operations

The manufacturing industry remains strong despite supply chain challenges, labour shortages, and pandemicinduced uncertainty. According to a report from the United Nations Industrial Development Organization (UNIDO), global manufacturing production is now well above pre-pandemic levels. However, to ensure future growth, reducing unplanned downtimes is a top priority.

The cost of unplanned downtime

Interruptions caused by theft, breaches, and cyber-attacks result in massive delays and carry significant costs. Depending on the industry, unplanned downtime can cost hundreds of thousands of dollars every single hour. According to Forbes, industrial manufacturers can lose as much as 1%-10% of available production time at a total cost of up to $50 billion a year.

Manufacturers must take action to address interruptions by (1) tracking materials and products, (2) enhanced data security, (3) extending perimeter security, and (4) ensuring workforce safety. And this is where a unified physical security solution, like Genetec™ Security Center, can reduce the frequency and duration of interruptions while facilitating digital transformation.

Supply chain management: warehousing and transportation risks

Given manufacturing’s global nature, maintaining the smooth supply chain is vitally important. Employing tagging and fleet monitoring technology can bolster supply chain resilience by tracking valuable materials and enhancing asset visibility. Using a unified security platform, together with solutions like the TagTracker plugin and Security Center Fleet Monitoring from Genetec, can reduce unplanned downtimes by making distribution more secure.

Digital transformation and the importance of cybersecurity

Embracing digitization and moving towards more connected, efficient, and predictive processes at facilities can help manufacturers capture growth and protect long-term profitability. Greater connectivity and automation helps yield valuable data for real- time insights and competitiveness.

A unified security system, like Security Center, can collect and analyse data from multiple sources to develop accurate forecasting and planning models, improve strategic decisions, and perform predictive maintenance, which both decreases unplanned downtime and extends the life of machines.

It’s important to remember that increased interconnectivity can make organizations more vulnerable to interruptions caused by cyberattacks. To help mitigate these risks, manufacturers should plan to include cyber-hardened physical security solutions as part of their comprehensive approach to cybersecurity.

Moving security to the perimeter

Effective perimeter protection is essential to prevent costly delays. In addition to securing their perimeter, manufacturers also need to coordinate effective responses to threats to limit potential disruptions. Increasingly, plants that produce highly sensitive or valuable materials are at risk of

experiencing drone intrusions. As with any intrusion, a drone can cause delays that impact a manufacturer’s overall efficiency and output.

Mitigating the risks of intrusions requires a physical security solution that makes investigating and responding easier and more effective. Security solutions, like Security Center, that offer intrusion detection technology for Restricted Security Areas (RSA), including radar and laser-based systems, are important for protecting the perimeter and operations.

Keeping workers safe

Workplace safety has always been a top priority for manufacturers. Like everyone, manufacturers focused on maintaining basic safety precautions, including enforcing social distancing measures on the production floor and sanitising workspaces. They also increased their monitoring of people entering and exiting facilities as well as dangerous locations.

By implementing physical identity and access management solution like Genetec ClearID™, manufacturers can strengthen security policies by automating visitor requests while also improving the flow of people. And, with detailed audit trails of every visit, security teams can quickly investigate incidents and help get production back on track.

Despite economic uncertainties, the manufacturing industry experiences strong growth. To build on this success, manufacturers must reduce costly interruptions and prioritize product quality and workforce safety. A unified physical security solution can help reduce the frequency and length of interruptions in operations by protecting the supply chain, improving decisionmaking, reducing cybersecurity risks, and enhancing workplace safety.

www.genetec.com

PROMOTIONAL FEATURE 56 | SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023

Unified security, unlimited possibilities.

Securing your organization requires more than video surveillance. To be successful, you need access control, intercom, analytics, and other systems too. This is why our Security Center platform excels. It delivers a cohesive operating picture through modules that were built as one system. So, whether you’re securing an airport, a parking structure, a multi-site enterprise, public transit, or an entire city, you can access all the information you need in one place.

To learn about the benefits of unifying your security operations visit genetec.com

© 2021 Genetec Inc. Genetec and the Genetec logo are trademarks of Genetec Inc., and may be registered or pending registration in several jurisdictions.

ENHANCING RETAIL SECURITY

Sajjad Arshad,  Business Development Director, AxxonSoft Middle East, looks at the growing role of video surveillance in supporting retail security operations

58 | SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023

In an ever-evolving retail landscape, the significance of security measures cannot be overstated. One of the most critical components of modern retail security is video surveillance. Over the years, video surveillance has become an indispensable tool for retailers, helping to combat theft, enhance safety, optimise operations, and improve customer experience. Video surveillance has already revolutionised the way retailers safeguard their businesses and patrons and has an ever-expanding role in the retail industry.

The early days of retail security primarily relied on manned security personnel and rudimentary closed-circuit television (CCTV) systems. However, with the rapid advancement in technology,

video surveillance has undergone a remarkable transformation. Today, stateof-the-art video surveillance systems boast high-resolution cameras, intelligent analytics, facial recognition, and even artificial intelligence, making them highly effective tools in thwarting threats and optimising retail operations.

There are a number of ways it can do this:

1 The deterrent effect

One of the most apparent benefits of video surveillance in retail is its powerful deterrent effect. The presence of visible cameras serves as a warning to potential wrongdoers, discouraging theft and other malicious activities. Knowing that their actions are being recorded, significantly reduces the likelihood of shoplifting, employee theft, and other

RETAIL | SECURITY SURVEILLANCE SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023 | 59
“Today, state-of-the-art video surveillance systems boast high-resolution cameras, intelligent analytics, facial recognition, and even artificial intelligence.”

illicit behaviours. As a result, retailers can create a safer environment for both their

Loss prevention and inventory management

Shoplifting and internal theft can cause significant financial losses for retailers. Video surveillance plays a crucial role in identifying and preventing such incidents. Advanced video analytics can detect suspicious behaviour, prompting security personnel to intervene before a theft occurs.

3 Enhancing customer experience and safety

Apart from preventing theft, video surveillance contributes to enhancing the overall customer experience.

Retailers can analyse foot traffic patterns and customer behaviour within the store to identify opportunities for improvement. Understanding customer flow helps optimise store layouts, product placements, and staff allocation, resulting in a more pleasant and efficient shopping experience. Furthermore, video surveillance contributes to customer safety. In case of accidents or emergencies, security personnel can respond quickly, aided by realtime monitoring and footage analysis. Additionally, surveillance systems with integrated fire and smoke detection capabilities add an extra layer of safety,

their marketing strategies, promotional activities, and product offerings to better align with customer preferences and demands. These insights enable retailers to make data-driven decisions that boost overall operational efficiency and drive business growth.

AI and predictive analytics take a proactive approach

The integration of artificial intelligence (AI) in video surveillance has revolutionised the industry. AI-powered cameras can automatically identify and track suspicious activities, such as loitering around entrance/exit areas, high-value product sections, checkout counters, restrooms, etc. It can also spot unusual behaviour such as aggressive behaviour, shoplifting indicators, physical altercations, etc. and even recognise known offenders through facial recognition technology. This proactive approach enables security personnel to intervene before incidents escalate, further deterring potential threats. Armed with such insights, retailers can proactively plan and implement measures to mitigate risks, optimise resources, and enhance overall security preparedness.

security and privacy is essential for retailers. Transparent communication about video surveillance policies, Limited Access and Encryption, Deletion Policy, Real-time Anonymisation, Notice of Surveillance, adhering to local laws and regulations concerning data protection, etc. can help address these concerns and maintain trust with customers.

Video surveillance has evolved into an indispensable tool for retailers in their quest to enhance security, prevent losses, optimise operations, and improve the overall customer experience. Advanced technologies like artificial intelligence, predictive analytics, and facial recognition have further empowered retailers to tackle challenges proactively and make datadriven decisions. However, it is essential for retailers to be mindful of privacy and ethical considerations and ensure that video surveillance is used responsibly, striking a balance between security and privacy. By leveraging the power of video surveillance thoughtfully, retailers can create safer environments, improve operational efficiency, and provide exceptional shopping experiences for their customers.

RETAIL | SECURITY SURVEILLANCE 60 | SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023
www.axxonsoft.com

TRASSIR, a global video surveillance system manufacturer, outlines future prospects for Saudi Arabia market

TRASSIR is a CCTV systems manufacturer and video surveillance software developer which started in 2002 as a local company, has grown to become a global supplier, and now boasts a presence in over 42 countries. All of TRASSIR company’s advanced solutions are designed in-house.

TRASSIR key principle is that modern security solutions should be engineered based on the concept of deep futureproofing and wide-spread compatibility between all system components.

Over the years, TRASSIR has built an entire video surveillance system which combines CCTV cameras, video recorders, video management servers, cloud services, neural analytics, and access control systems. These components have been seamlessly integrated into over 500,000 projects worldwide.

The company is constantly growing and today offers an environment for providing security in different fields – retail, city surveillance, traffic, building, banking and much more. It’s primarily focused on software components, especially video analytics solutions.

TRASSIR recently broke into Middle Eastern markets and achieved significant success in several countries. Our primary objective in Saudi Arabia is to establish a strong and enduring presence within the region. TRASSIR already enjoys good consumer recognition, and a pool of smart video analytics-based solutions has already been implemented in various projects and business sectors. This strategic move has resulted in numerous pilot projects that have received overwhelmingly positive feedback from our clients.

One such project is Saudi Logistics Services (SAL), leading air cargo operator that serves all Saudi Arabian airports. Thanks to successfully replacing the current VMS with TRASSIR, the client now has a customisable system with a wide range of analytical tools to minimise their financial losses and react quickly to unauthorised territory access.

Together with our partner in Saudi

Arabia, Asagefah Business Development Company, TRASSIR CCTV system was also installed successfully at The Islamic University of Madinah, which provides Islamic, Arab sciences and other knowledge to students from more than 170 countries, speaking 50 languages. There are more than 3000 cameras in the university, and TRASSIR CCTV system can now be used to maintain safe and secure environment, monitor the activities of students, staff, visitors, and can also help to ensure that everyone is following the rules and regulations.

Another successful project is TRASSIR system being used to address security issues at Feast Food Festival, the largest of its kind in the Middle East that was held in December, 2022. Thanks to TRASSIR Neuro Counter and Face Recognition functionality, the event coordinators were able to obtain statistics on event attendance and even determine the age groups.

One of the cornerstones of the TRASSIR strategy in Saudi Arabia involves forming strategic partnerships with well-established local entities. These partnerships are not merely transactional but are built on mutual trust and shared goals. By collaborating closely with our local partners, TRASSIR aims

to gain a deeper understanding of the Saudi Arabian market and its unique dynamics.

The most popular modules in this region are Facial Recognition and Neuro Counter. Modules such as License Plate Recognition (LPR), PPE Detectors (e.g., Hardhat and Wear Detector), and Direction detection have gained prominence in this sector as well.

In the current year, we have made a substantial push into the retail industry in Saudi Arabia. In addition to the retail sector, our AI modules have found significant demand in industrial projects. These modules address crucial safety and efficiency concerns, making them indispensable tools in various industrial applications.

One remarkable aspect of the Saudi Arabian AI market is its rapid adoption and adaptation of cutting-edge technology. The market has shown a remarkable ability to embrace AI solutions and integrate them seamlessly into various industries. This agility has made Saudi Arabia a fertile ground for TRASSIR.

We are happy to invite you to the intersec SA 2023 (3-5 October). TRASSIR will be located at booth 1-A36.

Get а demo for free bу visiting trassir.com

ог emailing welcome@trassir-global.com

PROMOTIONAL FEATURE SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023 | 61
3 – 5 October 2023 Riyadh, KSA
by Empowering a Safer World Saudi Arabia’s leading trade fair for Security, Safety and Fire Protection www.intersec-ksa.com/Register Register to visit
Organised

Safeguarding our data in the age of generative AI

We have entered a period of unprecedented technological growth. Artificial intelligence (AI), especially Generative AI (GenAI), has become a powerful force for change that is already reshaping industries, enhancing human potential, and influencing how we interact with information and one another. GenAI applications such as ChatGPT have captured the public’s interest, including for business use. We cannot undervalue GenAI’s potential for innovation, but we also must be aware of its security risks, which is why the conversation is quickly shifting towards how to safely enable genAI tools in business environments.

As AI systems thrive across a wide range of sectors and applications, they pose particular security issues that call for a proactive and flexible strategy from the security sector to protect against sensitive data leaks. In the era of AI and ChatGPT, cybersecurity is crucial, and the security sector needs to adapt and respond to

this so that businesses are adequately protected. A Netskope study unveiled new research highlighting that for every 10,000 enterprise users, an organisation experiences approximately 183 incidents of sensitive data being posted to ChatGPT per month, source code being one of the most common data leaks. Clearly, we can’t allow the unchecked use of these tools in business settings, as exciting, fast, and productive to use they may be.

Protecting data

One of the main concerns with AI-based technology is the concern with data privacy. GenAI works by learning from existing data to generate new, realistic data based on the characteristics of the training data. As at least one major brand learned the hard way, once source code is inputted into GenAI like ChatGPT, it can be publicly accessed. ChatGPT took what is supposed to be confidential information and then used it elsewhere. Consider what

Jonathan Mepsted, Vice President - Middle East & Africa at Netskope, looks at how organisations can enable genAI tools without compromising their overall security
64 | SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023
CYBER MONITOR
SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023 | 65

might happen if other forms of sensitive data see similar exposure, whether personally identifiable information (PII) or other forms of intellectual property.

Unauthorised access to sensitive data poses severe risks to organisations, potentially leading to financial losses. Luckily, modern data protection controls already offer a solution. Steve Foster, Netskope’s Head of Solutions Engineering, rightfully said: “ChatGPT and other generative AI applications can seem like a new and daunting challenge for data protection, but actually, many of the same approaches that work for securing data in the cloud work just as well for securing data around generative AI systems.” Experts suggest that security teams need visibility; using automated tools that continuously monitor what applications employees have access to, what data they are uploading onto it, and the context with which they intend to access and share that data.

Boost accountability

Another way organisations can safeguard their data while still permitting their employees to enjoy the convenience provided by these applications is to ensure transparency and accountability. By fostering a culture of continuous learning, adapting cutting-edge technologies, and prioritising ethics, privacy, and fairness, we can create a secure and trustworthy AI landscape that empowers innovation and protects against malicious intent.

Employees must be aware that they are interacting with AI systems, and companies should be clear about the limitations and potential biases of interacting with AI systems. On a larger scale, governments all around the world have been trying to regulate the generative AI industry, which is growing exponentially and at a

speed that is too difficult to regulate with the current procedures. The first western country to initially ban ChatGPT was Italy, citing privacy concerns related to the data model. They said that they would investigate ChatGPT, and whether or not it complied with the General Data Protection Regulation.

What’s the solution?

All of this safeguarding leads to another obvious question: shouldn’t companies just block ChatGPT and other GenAI apps? Doing so presents the risk of falling behind the curve of the industry and willfully ignoring the potential productivity these tools represent. If internet security has taught us anything over the last two decades, it’s that ‘allow or block’ decisions can’t be binary—the context of the action taken, balancing security, performance, and business productivity, is what’s needed.

There is a solution to this: allowing companies to continue using ChatGPTlike tools, while also protecting the companies’ proprietary data. Businesses can do this by utilising modern data protection capabilities that incorporate AI and machine learning (ML) into critical security processes, including the safe use of generative AI tools.

What distinguishes fully modern tools from incomplete Data Loss Prevention (DLP) solutions are several important capabilities. For example, modern DLP tools have deep contextual awareness that enables advanced DLP solutions to identify, analyse and protect structured and unstructured data. With the help of automated ML data classification and Train Your Own Classifiers (TYOC) technology, these security solutions can automatically identify and categorise new data based on a ‘train-and-forget’ approach, ensuring data protection

adapts and applies well beyond what standard data identification can achieve.

Modern tools

Additionally, in modern DLP tools, AI-based threat protection provides unparalleled speed and exceptional results in detecting a wide range of threats, including the defense from multivarious attacks, polymorphic malware, novel phishing web domains, zero-day threats, and malicious web content. AI uses also extend to how security and network performance are usefully balanced. AI-driven SD-WAN capabilities, for example, help defenders proactively monitor the network, provide predictive insights, simplify management, minimise support tickets, and troubleshoot devices remotely, resulting in improved network performance and user experience. The emergence of generative AI represents a milestone in human history. As in other previous computing milestones with vast potential, cybersecurity safeguards are not optional. The dynamic and evolving nature of AI introduces new attack surfaces, novel vulnerabilities, and unprecedented threats that necessitate an agile and proactive response from the security industry.

Together — with the right mindset coupled with the right investments in technology — we can forge a future where AI and humanity coexist symbiotically, unleashing the true potential of this transformative technology while safeguarding what matters most –ourselves, our data, and our shared values. Only through a collective effort and a forward-thinking approach can we ensure that AI remains a force for good, driving progress and prosperity while protecting our digital world. www.netskope.com

CYBER MONITOR 66 | SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023
“ChatGPT and other generative AI applications can seem like a new and daunting challenge for data protection, but actually, many of the same approaches that work for securing data in the cloud work just as well for securing data around generative AI systems.”
www.stid-security.com MAKE YOUR ACCESS CONTROL SMARTER SECURITY ANSWERS Instinctive Technologies for a World without Constraint CARD MODE SLIDE MODE HANDS-FREE MODE VOICE COMMAND TAP TAP MODE REMOTE MODE INTUITIVE Supported by Supported by

Network Logic

Many of the world’s most iconic buildings choose Fastlane turnstiles to secure their people and assets. Our market-leading entrance control products include the very latest integrations with both facial and biometric recognition systems. The latest updates to our popular Glassgate 150 and 300 models now include increased lane widths and our Sidegate Detection® technology.

Turnstiles that have it all turnstiles by IDL Alan Hardy, Sales Manager EMEA +44 7500 772 803 | ajh@idl.co.uk +44 208 890 5550 | info@idl.co.uk | fastlane-turnstiles.com Entrance control
evolutions
68 | SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023

Securing artificial intelligence

Managing the risks associated with machine learning (ML) and artificial intelligence (AI) is a multi-dimensional challenge, says Dan Norman, and as organisations become more dependent on them, securing them will become business critical

Over the last few years, artificial intelligence (AI) has received a tremendous amount of attention from the media, businesses and consumers alike. Its supposed potential to transform our lives and to provide innovative solutions to a range of challenges would have previously been the work of science fiction but is now becoming a reality for many. The acceleration and development of operational machine learning systems are helping organisations to digest, leverage and commercialise data in unparalleled ways, such as developing new drugs, analysing medical imagery

in seconds or scheduling predictive maintenance on heavy machines. However, security practitioners are facing a significant challenge, as more organisations are starting to rely on these machine learning systems that they either have not secured or do not understand the security implications for.

Attention is required

Operational ML systems have become established in many organisations to improve efficiency, seek out innovation, and capitalise on the huge stores of data that modern enterprises generate

and collect. The data is used to build a digital model of one aspect or process of an organisation. The model, and the algorithm driving it can provide a greater understanding of that aspect of the business, allowing the organisation to make better decisions about how and when to act. It is broadly accepted that ML models and the strategy they influence will demand constant attention because they can produce wildly different outcomes depending on very small changes – the so-called ‘butterfly effect’. They also need attention – not just from information security – from other

INDUSTRY MONITOR SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023 | 69

stakeholders, especially those units or functions that will respond to the model’s advice. Stakeholders include information security, IT, operations, legal, data protection, data analytics and HR. In a large organisation that wants to make the most of its investment in ML systems, this roster of stakeholders and the oversight activity demanded will be considerable.

Understanding the lifecycle

A typical machine learning lifecycle covers gathering organisational requirements, ingesting data, modelling development/ testing, deployment and monitoring. Information security concerns are present at every stage of this lifecycle, and practitioners have an important role to play in handling the risks the organisation takes on if it commits strongly to being guided by the conclusions of the ML system.

Gathering organisational requirements

Every operational ML system is different, but it is important in every case that the organisation, and therefore the information security function, knows how and where the systems are in use, how many elements of the ML lifecycle are present, and how well they do their job. Key challenges at this stage may include a lack of skills and technical infrastructure to safely run and maintain operational machine learning systems; having governance structure in place to manage them; and local and international external regulations being fractured.

Ingesting data

Machine learning models largely rely on accurate data, and lots of it, to function and generate a faithful model of the business process, activity, or phenomenon that they are being trained to deal with. Key challenges at this stage may include ingesting data without regard to its origin

or its accuracy; not testing data for bias, leaking or exposing sensitive information; and a risk of subtle disinformation campaigns to poison data sources.

Modelling development/testing

If data is the fuel that powers operational ML, the model it develops is the engine of the application. This step in the lifecycle typically requires many iterations as the model is slowly trained on highquality data to return responses that align with the organisation’s aims for that ML system. Many ML projects fail at this stage because they are constructed haphazardly, deployed indiscriminately, and promoted deceptively. Key challenges at this stage include development pipelines; failure to adhere to secure code practices; and machine learning models providing little information about how decisions are made. Moreover, as political stances on machine learning evolve and change, sudden regulatory shifts may impact organisations.

Deployment

Once the model that defines the operational ML system has undergone sufficient testing, the moment comes for it to be deployed and for the organisation to adapt to its decisions and outputs – once those outputs are trusted and accepted. Information security should be one of the stakeholders involved in the conversation because many of the changes brought in will have an impact on the roster of policies and processes that serve the current incarnation of the organisation. Key challenges at this stage include outages in infrastructure supporting the model that cause it to fail; attackers targeting the model to seek to perform espionage or sabotage; copyright claims being made against the organisation for using data sources without permission or an appropriate license; and customers

complaining about outcomes and decisions being biased or unfair.

Monitoring

The dynamic nature of operational ML systems sets them apart from most other technologies that organisations deploy and use regularly. They need regular and constant curation throughout their design, development and deployment, and beyond that as they start to influence the way an organisation works. This oversight and curation process becomes increasingly important as ML systems spread inside individual organisations and permeate the sectors in which they operate. The monitoring and assurance activities are both the end and the beginning of the lifecycle. Key challenges at this stage include mismanagement during incidents and outages; over-automation of processes and loss of institutional knowledge; and potential regulatory demands for transparency and accountability.

Facing challenges head on Operational ML systems challenge organisations, and information security practitioners, in many ways. The initial challenge is just coping with the speed with which they are developing, spotting who is using them, defining a basis of governance for their use, monitoring potentially useful innovations and keeping an eye on how attackers are trying to adopt and abuse them. While many of the risks that emerge when an organisation adopts ML can be partially overcome by applying the knowledge and experience of practitioners, many others, and some of the most urgent and farreaching, demand broader collaboration. Information security functions may start this debate but the ultimate resolution of these risks is likely to be far beyond the responsibilities of the security leader and their team.

INDUSTRY MONITOR
70 | SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023
“While many of the risks that emerge when an organisation adopts ML can be partially overcome by applying the knowledge and experience of practitioners, many others, and some of the most urgent and farreaching, demand broader collaboration”

Integration made simple, however complex

Maxxess

eFusion
gives enterprises more than just a feature-rich access control solution, it’s the platform-of-choice for powerful, seamless integration of video, fire, intruder, building systems, and site specific applications.
complexity,
Europe Maxxess Systems Europe Ltd United Kingdom +44 (0) 1344 440083 sales@maxxess-systems.com Middle East Maxxess Systems Middle East United Arab Emirates +971 (0) 509467717 North America Maxxess Systems, Inc. United States +1 (714) 772 1000 www.maxxess-efusion.com
Without cost or
it’s an adaptable and modular engineering solution that lets you achieve the most practical, affordable solutions for your integration challenges, across one site or many.

Industry interview

Meshal Aljohani, CPP, PSP, PCI, Security Group Supervisor, Aramco, speaks with Malcolm C. Smith, 2022 President of ASIS International, Senior Executive Function & Principal Consultant for Al Haffa Consulting in Qatar, to find out more about the region’s challenges

Can you tell us about your journey in security and what attracted you to this field?

I grew up in a gangster-infested neighbourhood in Johannesburg, South Africa, where gangs ruled the streets. In the late 1970s, I started selling apples and peanuts at the local cinema to use the profits for my school tuition and personal needs. As a teenage vendor, I had to safeguard my business and me. Protecting my business marks the beginning of my security career. Then one day I saw a military truck with troops on it, and it was at that moment that I decided to join the army in 1983. I completed a three-year university programme in security risk management in 1999. I left the army in 2001 and the security qualification aided my transition to corporate security. I progressed from security project manager to heading up a global security function with a multinational oil & gas company.

What do you do in your day-today role?

I stick to a flexible daily routine while focusing on key priorities. I start a typical day by checking emails, and meeting briefly with my executive assistant to review the agenda for the day. I spend around 30% of the day on problemsolving, report writing and reviewing projects. I devote 30% of the day to participating in committee meetings, delivering presentations, consulting, and collaborating with internal and external stakeholders. I use roughly 25% of the day engaging my team while allocating resources and conducting coaching. Then I use 10% of the day for dealing with unfolding events. I’m also taking short productivity breaks and save time for

taking stock of daily achievements, and making plans for the next day.

What is Qatar’s most pressing security challenge?

According to the Global Peace Index, Qatar ranked first among the Middle East and North African countries. However, Qatar is not immune to cyber risk. Qatar’s National Vision 2030 aims to transform the nation into an advanced society capable of achieving sustainable development. Cybersecurity risks are increasing with a growing demand for skilled cybersecurity professionals due to digital transformation. Qatar is also coping with five broad security issues; namely military, geopolitical, economic, social and environmental security.

How did the World Cup in Qatar help advance its security overall?

Qatar has proved to be worthy of hosting global events. The nation has strengthened its regional and international security partnerships. Qatar has boosted its security competence following its cooperation with 49,000 public and private security experts from 13 countries. The country has the capacity and capability to host global events, including a central command centre that is fully equipped to conduct nationwide surveillance.

According to IPA Qatar, Qatar has the ‘fastest growth’ in cybersecurity spending in the MENA region. How have you seen cybersecurity policies evolve within your own role?

Qatar expects 12.7% growth in cybersecurity spending by 2026, while the government leads the cybersecurity agenda. Our company recognised the importance of cybersecurity as a national priority. We re-defined our governance framework and developed a clear structure across core functions to identify, protect, detect, respond and recover from a cyber event. We integrated cybersecurity and physical security, and improved analytics to inform our mitigation strategies. We reviewed our regulatory requirements to enhance operational resilience. We provided team members with resources to upskill, reskill or earn relevant certifications. I upskilled myself in cybersecurity by earning the Executive Leadership in Information Assurance and the Certified Information Security Manager (CISM) designation to help govern cybersecurity.

REGIONAL FOCUS | QATAR 72 | SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023

ADVERTISING EXISTS TO TURN POTENTIAL CUSTOMERS INTO BUYERS

Give your advertising an unfair advantage by advertising in Security Middle East, the leading security magazine in the Middle East region

Reach over 66,000 security and safety professionals by advertising in our November/December 2023 issue (Intersec Special).

This issue is the special edition for the Intersec exhibition which is held in Dubai in January 2024 and we have been appointed by the organisers as the Official Partner Magazine for the security sector of the show. We will be mailing out this issue three weeks before the show to our 14,000+ subscribers plus we will print an extra 8,000 copies to be given away to every visitor to the Intersec show. This means a total of 22,000 copies will be printed. Our readership survey* indicates that a copy of our magazine is read by an average of three people which gives us a readership of 66,000 for this special issue. The magazine will also be mailed out electronically to all our subscribers and readers in the Middle East region and will be placed on the homepage of our website for two months.

This is the issue to get your advert most publicity and exposure to 66,000 security professionals.

To advertise please contact: Barry Bebbington | Publisher Tel: +44 1708 229354 Email: barry@pubint.co.uk

* source: reader survey January 06 SME_Intersec24_halfpage_black.indd 1 19/09/2023 11:31 SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023 | 73

2023

OCTOBER

NOVEMBER

3-5 October

Intersec Saudi Arabia

Riyadh International Convention and Exhibition Centre (RICEC) intersec-ksa.ae. messefrankfurt.com

9-10 October

7th edition OFSEC Oman Convention & Exhibition Centre, Muscat, Oman ofsecevent.com

11-12 October

Natural Disasters Expo

Messe Frankfurt, Hall 11, Frankfurt, Germany

naturaldisastersshow.de

18-21 October

Korea Police World Expo

Songdo ConvensiA, Incheon, South Korea eng.police-expo.com

1-3 November

Secutech Thailand Bangkok International Trade & Exhibition Centre, Bangkok, Thailand secutechthailand.tw. messefrankfurt.com

14-17 November

Milipol Paris Paris-Nord Villepinte Exhibition Centre, Paris, France en.milipol.com

22-23 November

IDC Alliance Mövenpick Resort Al Marjan Island, UAE idc.com

28 November –1 December

26th International Cybersecurity Conference Hotel Grand Hyatt, Dubai, UAE aavar.org

Please check the event websites for the most upto-date details as dates can change all the time.

DECEMBER MARCH

4 December

Security & Fire Excellence Awards JW Marriott Grosvenor House, London, UK securityandfireawards.com

5-7 March

World Police Summit Dubai World Trade Centre, Dubai, UAE worldpolicesummit.com

JANUARY APRIL

16-18 January

Intersec

Dubai World Trade Centre, Dubai, UAE intersec.ae.messefrankfurt.com

9-12 April

ISC West 2024 Venetian Expo, Las Vegas, US discoverisc.com

30 April – 2 May

The Security Event NEC, Birmingham, UK thesecurityevent.co.uk

INDUSTRY MONITOR 74 | SECURITY MIDDLE EAST | SEPTEMBER/OCTOBER 2023

Traka Intelligent Solutions for Educational Facilities

In educational facilities, where safety is a priority, ensuring access by the right people to keys and equipment around the campus is necessary. With thousands of keys and often one large master key set, ensuring that the right people can find keys and equipment is fundamental. With students, staff and service contracting companies requiring 24-hour access to the site, all educational facilities need a secure method to manage their keys and access cards. Traka, the key and asset management specialist, has helped various institutions across the globe improve the implementation of their contractor control policy, ensuring Health and Safety Standards are met.

Improve safety and security in educational facilities:

• Have multiple cabinets

Spread key and equipment cabinets around campus, so staff and emergency services can access the keys when and where they need them, not from a central office.

• Minimise costs of re-keying buildings

The cost of losing a master key can be in the thousands of dollars. Avoid having to re-key buildings, by managing and controlling usage on a granular level.

• Restrict times of access

Only allow students and staff to access keys and equipment at times of the day when you want them to.

• Drive accountability

Make users 100% accountable for the items they use and ensure equipment and keys are only accessed by authorised users.

• Manage and control maintenance vehicles

Allow only authorised and trained drivers access to keys – and rotate the usage so there is an even wear and tear of vehicles.

• Keep an audit trail

Instantly access an online record of who accessed which keys and when.

• Minimise costs of re-keying buildings

The cost of losing a master key can be in the thousands of dollars. Avoid having to re-key buildings, by managing and controlling usage on a granular level.

• Easy to use and manage

Use a simple user-friendly system that can be accessed from a PC, Tablet or smartphone.

What benefits does Traka offer?

• Know instantly who has a set of keys out at any point in time.

• Know who has had keys historically if there is an issue – and when they were returned.

• Remove the element of human error.

• Protect the Security Lodge from breaches of Data Protection

• Through the software, turn someone’s access to keys on or off, at the click of an ICON, from a central point.

Traka is the global leader in intelligent management solutions for keys and equipment. Traka’s solutions help all types of organisations control their important assets, improving productivity and accountability, and reducing risk in critical processes.

For more information on Traka’s specialist key management solutions for retail banking, please visit:

www.traka.com

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.