You are on page 1of 76

FOR TODAYS SECURITY PROFESSIONAL

BUYER

Volume 23 Edition 12 April/May 2016

SECURITY
www.securitybuyer.com

Penetration:
The art of breaking
into IT systems
www.securitybuyer.com

THE INDUSTRYS LEADING SOURCE OF


COMMENT, ANALYSIS AND OPINION

PERIMETER
PROTECTION

HEALTHCARE

SECURITY MANAGEMENT
MORE THAN MEETS THE EYE IN CHILDRENS HOSPITAL

BANKING SECURITY

MODERN TRAINS

CHANGE IN TECHNOLOGY
LEADS TO UNCERTAINTY

IN NEED OF INNOVATIVE
SAFETY SOLUTIONS

CONTENTS

006 INDUSTRY BULLETINS


All the latest company and corporate news
from every area of the global security industry

014 PRODUCT SPOTLIGHTS


An in-depth look at some of the most innovative
products recently launched to the security market

018 ASK THE EXPERT: AXIS COMMUNICATIONS


Markus Lai explains how to reduce bandwidth
requirements in IP-based surveillance systems

022 ASK THE EXPERT: SONY


Roger Lawrencelooks at how the resolution
revolution is moving to 4K and beyond

026 ASK THE EXPERT: DALLMEIER


Andreas Wolf tells Security Buyer about the
ongoing paradigm shift happening at the fence

030 COVER STORY: SANS INSTITUTE


Adrien de Beaupre tells us all you need to know
about the people that break into IT systems

034 INDUSTRIAL SECURITY: INTRODUCTION


Mark Fletcher looks at industrial security in the wake
of the new information-enabled industrial revolution

038 INDUSTRIAL SECURITY: WURLDTECH


Paul Rogers explains why present IT systems are
not equipped to keep connected systems flowing

040 TRANSPORT SECURITY: INTRODUCTION


Chris Phillips, former head of NaCTSO, looks at
how recent events have affected transport security

038
INDUSTRIAL

Some of the industry experts in the current issue

THIS ISSUES CONTRIBUTORS

Shayne Bates

02 ISB

Adrien De Beaupre,
SANS Institute

Lisa Brandenburg,
Seattle Childrens

Markus Lai, Axis


Communications

Roger Lawrence,
Sony Professional

Pierre Paterni,
Rockwell

George Redpath,
Sensurity

Andreas Wolf,
Dallmeier

www.securitybuyer.com

CONTENTS

072
PERIMETER PROTECTION

045 RETAIL SECURITY: INTRODUCTION


With the advent of built-in intelligence, entirely
new security applications have arisen for retailers

048 RETAIL SECURITY: DALLMEIER


Ochtum Park Factory Outlet Centre in Bremen
relies on Panomera multifocal sensor technology

050 GOVERNMENT SECURITY: HIKVISION


150 elected representatives in the Jordanian
parliament benefit from a new network of cameras

052 BANKING SECURITY: HONEYWELL


Chris Beck speaks to Honeywell Security & Fire
about the latest technology in banking security

060 SHAYNE BATES: HEALTHCARE


Our Industry Editor explores how Seattle Childrens
Hospital is using technology for more than security

060 PERIMETER PROTECTION: SENSURITY


George Redpath, Technical Director of Sensurity,
looks at the science behind perimeter protection

064 PERIMETER PROTECTION: BOSCH


Perimeter protection, combined with video analytics
is ideal for protecting sites such as airports

068 IFSEC PREVIEW


Three keynote speakers have been announced for
the leading industry event, held in London this June

070 WHATS ON
A look at some of the leading security industry events
and exhibitions across the globe in the next 12 months

046
TRANSPORT

022
ASK THE EXPERT

ISB 03

SECURITY
SECURITY

BUYER
BUYER

EDITORS LETTER

FOR
FOR
TODAYS
TODAYS
SECURITY
SECURITY
PROFESSIONAL
PROFESSIONAL

of a summer of international sport

CHRIS BECK,
EDITOR

If youd like to submit relevant news


stories for the next issue of Security Buyer
please email editor@securitybuyer.com

Twitter: @SecurityBuyer
LinkedIn: hayley.perry@securitybuyer.com
04 ISB

MANAGING EDITOR
Michelle Teeman +44 (0) 1622 823 920
E-mail: michelle.teeman@hand-media.com
EDITOR
Chris Beck +44 (0) 1622 823 921
E-mail: chris.beck@hand-media.com
TECHNICAL EDITOR
Mark Fletcher +44 (0) 1622 823 920
E-mail: mark.fletcher@hand-media.com
INDUSTRY EDITOR
Shayne Bates +44 (0) 1622 823 920
DEPUTY EDITOR
Charlotte Taylor +44 (0) 1622 823 922
E-mail: charlotte.taylor@hand-media.com
DESIGNER
Laura Bethell +44 (0) 1622 823923
E-mail: laura.bethell@hand-media.com
SALES DIRECTOR
Graeme Rossiter +44 (0) 1622 823 936
E-mail: graeme.rossiter@hand-media.com
BUSINESS DEVELOPMENT MANAGER
Chris Lingham +44 (0) 1622 823 928
E-mail: chris.lingham@hand-media.com
DISPLAY SALES EXECUTIVE
Hayley Perry +44 (0) 1622 823 930
E-mail: hayley.perry@securitybuyer.com
CLASSIFIED SALES EXECUTIVE
Emma Marler +44 (0) 1622 823 925
E-mail: emma.marler@hand-media.com
TAIWAN CONSULTANT
Promedia 00 886-4-24730700
E-mail: Image.media@url.com.tw
OFFICE MANAGER
Selena Cronin + 44 (0) 1622 823 920
selena.cronin@hand-media.com
ANNUAL SUBSCRIPTION RATES:
UK and Europe 99 Rest of World: 149
HAND MEDIA U.S.A OFFICE
20F Street NW, Suite 700,
Washington D.C. 20001 U.S.A.
Tel : +(1) 202 507 6378

HAND MEDIA HONG KONG OFFICE


2/F, Shui On Centre, 6-8 Harbour Road
Wanchai, HONG KONG
Tel : +852 2824 8605

an

Welcome to the latest issue of Security Buyer.


As the editor of a security publication, but also a football fan, it was
interesting to see the two worlds collide when a thankfully fake bomb was
found in a toilet at Old Trafford, home of Manchester United, on the last day of
the Premier League season in early May. The device was left behind after a
training session at the stadium a few days before the match, and led to the full
evacuation of over 75,000 spectators, the abandonment of the game and a
controlled explosion by a bomb disposal team. Event security is an especially
hot topic this year, with the upcoming Olympic Games and European Football
Championships set to be two of the most heavily guarded events in history,
and this incident has highlighted why.
Amazingly, Chris Reid, the Director of the company behind the botched
training exercise at Old Trafford, says Manchester Uniteds security staff overreacted by evacuating the stadium and calling the game off. He said that in
the security world, there is a lot of ticking boxes, just making sure that they
have the numbers. There are numbers there doing what they are doing, but
none of them are trained to a particularly high standard, which is not their fault.
This is to do with security officers that havent had the training.
While he raises good points about the need for regular training, and that the
security industry is facing something of a skills shortage, Reids comments
show a remarkable lack of tact. The device was described as incredibly
lifelike, so it stands to reason that the security staff reverted to their training
and dealt accordingly. The fans, media and staff were evacuated quickly and
safely, and there are no stories of major confusion or disruption. In todays
security-conscious world, people understand that safety comes first, and in
circumstances such as this, the correct steps were taken to ensure it wasnt a
lot more serious.
The security industry, as highlighted by this story, is going through
something of a skills shortage currently. The cyber security market in particular
is struggling to recruit the number of people needed to cover what is a very
fast-growing area. Demand is expected to outstrip supply by a third by 2020,
experts have warned, calling it the largest human capital shortage in the
world. One solution to this could be for
security and tech firms to promote
apprenticeships to ensure the gaps are filled,
and the next generation of cyber experts is
trained accordingly. The cyber security
industry has an almost 0% unemployment
rate, and those in the jobs already are highly
prized commodities that can command high
wages and great power. Its important for the
industry to remember that people are the one
constant in security without them, the
technology and innovation is largely
worthless.

PUBLISHER
David Rossiter + 44 (0) 1622 823 934
E-mail: david.rossiter@hand-media.com

ia

Stadium security takes centre stage ahead

d med

SECURITY BUYER
is published by: Hand Media,
Goldings, Elphicks Farm, Water Lane, Hunton,
Kent, ME15 0SG, United Kingdom.
Tel: +44 (0) 1622 823 924
Fax: +44 (0) 1622 823 933
Email: info@securitybuyer.com
Website: www.securitybuyer.com
REPRINTS: For reprints of specific pages
within this magazine please telephone
Chris Lingham on 01622 823 928 or
e-mail chris.lingham@hand-media.com

336/ISB/19/05/2016

The text paper in this publication is printed on PEFC paper

www.securitybuyer.com

INDUSTRY NEWS

Panasonics creation of
new European Solutions
Company creates single
point of contact
Panasonic has
announced the creation of a
new European solutions
company that will bring
together its various business
products and develop world
class solutions for its
customers, offering a single
point of contact and
accountability.
Panasonic System
Solutions Europe (PSSEU), a division of Panasonic
Marketing Europe, develops market specific solutions that
include Panasonic devices, software, connectivity and third
party products, delivered with world class design
engineering and project management.
Vertical markets
PSSEU will initially focus its activities on three distinct
vertical markets: Utilities, Transportation and Logistics.
The new organisation will be led by Tony OBrien, who
has over 20 years experience in enterprise solutions,
having previously worked with organisations such as
Siemens Building Technologies.
For nearly 100 years, Panasonic has been widely
recognised for its technology excellence in consumer
electronics, said Tony OBrien. This puts Panasonic in a
unique position because the majority of our business
customers sell to consumers too. This means we have a
shared understanding of the type of challenges that our
business customers face in the consumer market.
As a result, we have developed unique value packages,
which are tailored to specific customer needs. We are using
a fusion of sector expertise and technological innovation
delivering customised solutions that improve efficiency,
enhance customer experience and reduce business risk.
An example of these value packages is a trespass
warning system developed for the UK railway network. The
new automated system will help to prevent trespass
incidents at known hot spots, which cause customer
delays and cost the railway network millions of pounds
every year.
Operating across Europe, PSSEU is headquartered in
Wiesbaden, Germany. It also has a number of subsidiaries,
including Cameramanager, one of Europes leading cloud
security providers and Panasonic Business Software
Europe, which offers advanced software for the control and
management of logistics and supply chain.

06 ISB

Hikvisions integration with Paxton Net2 access


control helps to provide user-friendly interface
Hikvision has announced the integration of its full range of network
cameras and Network Video Recorders with Net2 access control system
from Paxton, the UK market leader of electronic IP access control and
door entry solutions. The integration will provide a user-friendly interface
to manage building security more easily.
This seamless integration allows for the easy configuration of Hikvision
Network Video Recorder (NVR) and camera detection with Net2 access
control system. Hikvision cameras can be associated to individual doors,
enabling users to monitor video linked with access events. This provides a
more comprehensive service for users, enabling them to take necessary
actions both in real-time and post-events.
Keen Yao, International Marketing Director at Hikvision, said: The
integration provides a value-added solution to Hikvision and Paxton
customers. It will help identify and address suspicious activities, making
security system management simple and more time-efficient.
Gareth OHara, Paxtons Sales and Marketing Director, said: At
Paxton, we encourage original thought. We develop innovative solutions
that represent the companys ethos of simplicity and quality, whilst
answering the needs of the security market. Its a pleasure to be working
with Hikvision, a company who place as much importance on product
innovation and diversification. We hope the solution will be an attractive
proposition for a wide range of installers.

Konica Minolta
forms agreement to
acquire MOBOTIX
Konica Minolta, Inc. has
announced that the company
has entered into share transfer
agreement with the major
shareholder Dr. Ralf Hinkel
Holding GmbH, and other
shareholders of MOBOTIX AG, a German manufacturer of video
surveillance systems, regarding the acquisition of the MOBOTIX shares
held by them comprising approximately 65% of the share capital of
MOBOTIX.
The deal is estimated at between 20 billion yen and 30 billion yen
which is equivalent to $177 million to $265 million in USD.
With the acquisition of MOBOTIX, Konica Minolta hopes to achieve
several things, including the provision of Next-generation Network
Security Solutions through cooperation in proprietary technologies of
both companies. Konica Minolta also wants to develop a workflow of
solutions across verticals and broaden the distribution of products.
Konica Minolta enters into this transaction to accelerate the breadth of
its solution services business that can help customers solve their issues
in various fields, digitalising data acquired with the companys
proprietary technologies in optical images and sensing.

www.securitybuyer.com

INDUSTRY NEWS

KBC Networks offers upgrades to existing


wireless ethernet range of transmitters
Hanwha Techwin teams
up with Veracity to deliver
the most efficient storage
solution on the market
Hanwha Techwin (formerly Samsung
Techwin) is introducing a low power, high
capacity storage solution in partnership with
Veracity, the market leader in IP transmission
and surveillance storage. The combined
solution, encompassing the latest generation
of high definition Hanwha Techwins
cameras, SSM video management software
and COLDSTORE storage, offers the most
efficient direct to disk system available and
does not require a network video recorder.
Open platform capability
The open platform capability of the
WiseNetIII camera range is used to enable
direct recording from the IP camera direct to
the COLDSTORE disk array. Further, the use
of LINKLOCK tamper-proof Ethernet over
coax technology, which is exclusively
available from Hanwha Techwin, provides a
total barrier to all unauthorised network
access by fully blocking external IP
connections to any cable or equipment that
has been tampered with or disconnected.
The partnerships we have established
with specialist technology providers such as
Veracity are a key component of our ongoing
major investment in R&D. They are a clear
demonstration of our commitment to offer
market leadership and provide end-users
with a total security solution, said Mr. Cheol
Kyo Kim, President & CEO of Hanwha
Techwin Co. Limited.
Our cameras and sophisticated,
professional level SSM video management
software when supported by
COLDSTORE, deliver a truly impressive
and unique architecture known as
TRINITY. It is an excellent example of how,
by working in harmony with our technology
partners, Hanwha Techwin has become a
one-stop-shop for video surveillance
solutions.

www.securitybuyer.com

KBC Networks, manufacturer of IP, wireless and fibre optic transmission equipment for
commercial and industrial networks, has announced a new development in the evolution of
its wireless range.
With promises to increase product flexibility and throughput, at the same time as
reducing cost, the transmission provider has launched the WES3 wireless Ethernet
series. WES3 replaces KBCs II generation wireless products. It comes in a new,
compact format and with enhanced, user-selectable firmware. The new firmware
means that with one common unit, installers are now able to select the device
configuration, as either client/station or host/AP mode for both point-to-point and pointto-multipoint links. The aim is to make system installation easier and more flexible, and
to reduce customers stock-holding and cost. Customers are now able to build a simple
point-to-point wireless bridge, a more complex point-to-multipoint wireless network or
mixed configurations, all with one common unit.
The first in the new 3-series products provides throughput of up to 99Mbps in the
licence-free 5GHz band. For high throughput applications, KBCs popular HT range
delivers 230Mpbs+ throughput (400Mbps aggregate). All of the KBC wireless ranges
are fully compatible and all come with free design assistance and technical support.

Winsted scoopes third Royal Award for Business


Winsted is again celebrating after being named - for the third time - winners of a
Queens Award for Enterprise, the UKs highest accolade for business success.
Building on the recognition achieved through Awards in 2012 and 2013, the
company has been recognised, yet again for its contribution to International Trade,
delivering substantial growth through the design, manufacture and delivery of control
room furniture solutions.
General Manager Terry Shough commented: For the third time in five years,
Winsted has been conferred with the UKs most prestigious award for business
achievement: The Queens Award for Enterprise. This is a tremendous achievement,
achieving this award again in such a short space of time confirms the companys
position as a leading supplier within our industry.
As the UKs most prestigious business award and the highest accolade any
business can receive, the Queens Awards for Enterprise are made each year by the
Queen and are awarded across the fields of International Trade, Innovation and
Sustainable Development, on the recommendation and advice of the Prime Minister.
As a Queens Award winner, the company can expect an invitation to attend a special
reception at Buckingham Palace with Her Majesty The Queen to be held in July.
Shough adds: I am very proud of the strong team we have here at Winsted and Id
like to thank them all for their professionalism and commitment to ensuring our
worldwide reputation and success over the years. This is a very exciting time for
Winsted. We have experienced an extraordinarily successful start to the year, and as a
company we are going from strength to strength.
The Queens Awards for Enterprise are the most prestigious accolades for
businesses and individuals in the United Kingdom. The winners are announced each
year on April 21, Her Majesty The Queens birthday.
The corporate awards recognise outstanding achievements by UK companies in
three categories: International Trade, Innovation and Sustainable Development. Each
Award is valid for five years and winners are invited to a reception with Her Majesty The
Queen at Buckingham Palace.

ISB 07

INDUSTRY NEWS

eneos new 32 channel NVR


delivers 960, Full HD frames per
second and 16 hybrid channels
eneo is launching its new 32 channel, standalone
network video recorder, the PNR-5332. The NVR
provides simultaneous live viewing and recording of
up to 32 Full HD (2.0MP) video channels in real-time,
25FPS (30FPS in NTSC), with a combined maximum
data throughput of 230 Mbps. It includes hybrid
functionality, recording up to 16 IP and 16 analogue
cameras all together, with a maximum recording
resolution of 5.0 MP (2592x1944p pixels) per
channel.
The Linux-based NVR is supplied with 3TB of
internal storage and has slots available for up to six
internal HDD drives, explained Martin Morris, eneo
Business Development Manager UK & Ireland. It
also has support for two further external eSATA
drives. Video output options include HDMI at
1920x1080p (Full HD) and VGA. The PNR-5332
design includes a front keyboard, with jog-shuttle,
mouse and IR remote control and allows for 19-inch
rack mounting.
iRAS video management software is included for
remote client access and control. The RAS mobile
app enables Android and iOS smartphone and tablet
viewing with touch-screen functionality. Setup is via a
user-friendly web browser and all ONVIF-compatible,
system cameras are automatically detected by the
NVR and configured for optimal performance.
The NVR operates with eneos NPCII universal
protocol converter, enabling integration with leading
point-of-sale (POS) cash till, access control, LPR
(license plate recognition) and ATM systems.
16 alarm inputs with four relay outputs and 16
audio inputs with one output are also included. Prealarm recording can extend up to 30 minutes, with
email, buzzer, software and alarm output
notifications. Alarm triggers include disc error, system
error, video loss, motion, text-in, physical contacts
and POS.

08 ISB

Wavestore releases Version 6 of its award winning


Video Management System and client software
Wavestore has announced the introduction of additional features and
functionality in its new V6 Video Management Software (VMS) and WaveView
client software.
Known for providing leading system integrity and user friendliness, many major
improvements have been incorporated in Wavestore V6 with the objective of
enabling end-user clients to securely and more easily unlock the full potential of
an integrated security system.
Widely referred to as the operators favourite GUI, Wavestores graphical
display has been updated with a fresh new look featuring updated icons and
graphics, making it even more intuitive to use. The addition of dockable
components and configurability of the live event stream window provides an
enhanced user experience which gives the ability for individual operators to arrive
at their pre-customised screen layouts each time they log in.
V6 also introduces camera shortcut keys using the keyboard number pad for
added convenience and security enhancements to protect against malicious
hacking attempts, including enhanced encryption and a high-security password
policy.
Many of the new or updated features inV6 have been developed as a direct
result of feedback from our worldwide network of customers, said Julian Inman,
Product Manager at Wavestore. For example, Wavestores client side
de-warping feature, which supports a wide range of 360 degree cameras, now
offers greater flexibility by enabling the cameras to be fitted onto angled surfaces,
and not just flat ceilings or walls. We have also added full SDK integration with
ImmerVision lenses and Oncam cameras.
V6 maintains Wavestores any video, any format philosophy which sees it
supporting all leading camera vendors across multiple camera technologies.
These include very high megapixel, UHD, 4K, HD, 360 fisheye, thermal and
analogue cameras operating on H.264, MJPEG, MPEG-2, MPEG-4, MxPEG and
JPEG2000 video formats.
As the result of an update incorporated into V6, Wavestores propriety large
allocated storage system (LASS), now empowers the VMS to manage an industry
leading 384 Petabytes of data per server. As such, V6 claims to set a new industry
benchmark for Enterprise level applications and with effectively no limit to the
mass of images it can manage. The calculation and system design process is
also greatly simplified.
Intelligent failover is now also available at Wavestore Enterprise level to ensure
minimal disruption to recording should a fault occur and to deliver resilience and
peace of mind for mission-critical applications.

www.securitybuyer.com

INDUSTRY NEWS

Privacy assured with


Panasonic people masking
solution

Hanwha Techwin Europe launches


new ANPR-enabled camera
Hanwha Techwin Europe Ltd has launched a WiseNet Access
camera solution which can be put to work straight out of the box to
provide total control of vehicle access.
The WiseNet Access solution takes advantage of the long list of
features incorporated in the open platform WiseNet SNO-6084R/
ANP 2MP Full HD bullet camera which includes built-in IR LEDs,
Defog and Digital Image Stabilisation (DIS). These features work
together with the latest generation of Automatic Number Plate
Recognition software, which is supplied preloaded onto the cameras
to give users the ability to accurately log, monitor and control all
vehicles entering a site 24/7, regardless of the lighting or
environmental conditions.
Easy to deploy, the Wisenet Access camera generates event
notifications when an authorised vehicle number plate is recognised
and these can be configured to trigger access control operations
such as opening/closing a barrier, as well as sending activity reports
and snapshots via email or FTP.

Panasonic has introduced a people masking solution, within


both a range of cameras and as part of PC-based software, that
ensures users can continue monitoring their premises, whilst
protecting the privacy of individuals.
Germanys Federal Data Protection Act protects individuals
rights to privacy in reference to the handling of their personal
data. This means that surveillance images that identify individuals
are strictly prohibited by law. The Act is expected to become
national law across all EU countries.
The people masking solution allows people to be masked
whilst their silhouettes reveal movement. This gives the ability to
protect individuals privacy whilst also protecting their safety and
the safety of business assets.
Gerard Figols, Product Marketing Manager for Panasonic
Security Solutions, said, The people masking solution enables
the protection of privacy, ensures safety of people and locations,
in one solution.
The system was developed to provide logistics companies
with a method of monitoring packages, while protecting workers
rights. But, because both employees and customers are
protected, it will be of particularly interest to the retail and banking
sectors where continuous surveillance is necessary.
The people masking solution is available for the 3, 5 and 6
series cameras as well as the WV-SFN480 and for the
WV-SFV481 4K cameras and, for those who have other cameras
installed, there is a PC-based software solution, making it
possible to implement people masking on both existing
Panasonic and non-Panasonic analogue CCTV systems.
The camera based solution is now available, while the
PC-based solution is set for launch from June 2016.

Preloaded application
By preloading an
ANPR Application
which has been fully
tested and evaluated
onto Samsung branded
cameras, we are
looking to save
installers, systems
integrators and users,
considerable time and
effort in having to
research the long list of
available ANPR
solutions, said Dan
England, Technology Partner Manager for Hanwha Techwin Europe
Ltd. Equally important, with the Arteco Application ready to run outof-the box on the WiseNet SNO-6084R/ANP Access camera,
installation time and cost is minimised and users can take immediate
advantage of a seamless integrated solution.

www.securitybuyer.com

ISB 09

INDUSTRY NEWS

Partners in focus with new version of


Milestone online customer support tool
Milestone Systems, the open platform company in IP video
management software (VMS), announces updates to Milestone
Customer Dashboard, an online system monitoring service. This
service enables Milestone channel partners to obtain real-time
system status of customer installations and proactively solve potential
issues before interruptions to the customers business.
Milestone Customer Dashboard receives continuous system
updates from customer installations through Milestone Care Plus and
an internet connection. The channel partner accesses the Customer
Dashboard through their profile on Milestones user-friendly partner
portal. Partners have the freedom to access information anytime,
anywhere so they remain updated even on the road.
Exceptionally positive market feedback from the
partner community accelerated development and
launch of new capabilities including:

systems maintenance history.


Better integration with other partner tools - The login
credentials for Customer Dashboard are the same as the My
Milestone account, which is used to access other resources
such as lead management, Milestone partner news, and the
event calendar.

The Customer Dashboard requires no set up, works automatically,


and is compatible with all Milestone products as well as all models of
Milestone Husky NVRs.
This is another testimonial to our total dedication to our partner
community and our joint customers. The Customer Dashboard
update is an important step for us to further enable our partners to do
world class service, says Janne Jakobsen, Vice President of
Professional Products at Milestone Systems.

Customised emails for focused response System integrators can now customise
email notifications regarding system errors
so they are only notified about errors
relevant to them.
Optimised system history - System
integrators can now quantify the value of
their service agreement by creating system
uptime reports that document a particular

DVS Ltd open


Hikvision-authorised
training academy
DVS Ltd the UKs fastest
growing distributor of security
products have opened Delivering
Knowledge Training, the only
accredited company to offer
HCSA (HIKVision Certification
Security Academy) certification
outside of Hikvision.
The recently established academy offers hands-on training,
tailored specifically for security professionals. The full-day courses
are free and guarantee attendees a thorough and holistic
understanding of installing and maintaining the latest tech on the
market.Designed with the collective knowledge of the award
winning DVS Ltd and HIKVision technical teams, the academy is
unique and encompasses every aspect of the security installers
needs.
Limited to eight people per session, the day is structured to offer
a bespoke learning experience to maximise the understanding of

010 ISB

the participant. With topics


such as IP, TURBO HD, 4K and
ANPR being covered,
graduates are left with a broad
understand of current security
equipment and how they are
best utilised.
A recent attendee, Wayne
Palmer of Lantec Security,
commented: I found the
training to be very informative
and hands-on. Its great to get
an understanding of what our
engineers have to do whilst onsite. Our trainer was excellent, he
provided thorough and detailed instructions and demonstrations.
Jamie Evans, the Delivering Knowledge Training Manager at DVS
Ltd added: These courses have been designed around our
customers needs, they are an extension of the support we have on
offer at DVS.
Hikvision are revolutionising the industry and we are eager to
keep our customers ahead of their competition by having a
thorough understanding of the latest technology. The academy has
been running for a couple of months now and we are inundated
with people wanting to attend.

www.securitybuyer.com

INDUSTRY NEWS

VIVOTEK and Genetec announce strategic cooperation


for Stratocast small and mid-sized business customers
VIVOTEK has announced further strategic cooperation with Genetec, a leading
provider of open-platform, unified IP security solutions on its cloud-based videosurveillance-as-a-service (VSaaS) solution Stratocast. Compatible with VIVOTEKs
enterprise-level network cameras*, Stratocast is designed to meet the security
demands of small and mid-sized businesses (SMBs), which require a reliable video
surveillance solution without the associated costs of on-premises storage, software
updates and on-going maintenance.
In order to address an increasing number of SMB owners who are concerned about
the safety of their facility and the operation cost of surveillance deployment, VIVOTEK
is providing its enterprise-level cameras* for Stratocast customers. The cameras have
been integrated to work with Stratocast, allowing SMBs to deploy a highly affordable
and convenient cloud-based video surveillance system.
As the IP video surveillance market continues to mature and evolve, Genetec
realised very early that the cloud would play a significant role in both hosting and
storing security applications and content, said Philippe Ouimette, Director of Strategic
Alliances at Genetec. Stratocast VSaaS offers SMB clients a hassle-free, easy-to-use,
and affordable cloud-based video surveillance service, and we are delighted to partner
with our camera technology partners at VIVOTEK to provide network-ready camera
hardware to help end-users realize value and quality.
William Ku, Vice President of the Brand Business Division at VIVOTEK said:
Partnering with Genetec means we are able to help SMB users migrate to IP video
surveillance and enhance our security knowhow directly from end-users. By leveraging
the Companys expertise in cloud-based VSaaS and VIVOTEKs enterprise-level
network cameras*, SMB users can benefit from reduced total cost of ownership and
focus on their core competencies.

Pelco set to launche the new Sarix Professional range


of cameras at IFSEC International in London this June
Pelco by Schneider Electric will unveil the new Sarix Professional Next Generation
Range cameras during IFSEC International. At stand D800, Pelco will also highlight the
advanced capabilities of its Optera Series Panoramic IP Camera line and its awardwinning VideoXpert Video Management System (VMS).
Demonstrated for the first time at IFSEC, the new Sarix Professional Range cameras
incorporate Pelcos advanced fixed IP camera features and functionality. The devices
feature resolutions from 1MP to 5MP, deliver sharp images, cover larger areas with a
single camera, and have the capability to digitally zoom in to scenes while maintaining
evidential data clarity. The cameras also offer superior low-light performance and
adaptive IR illumination to capture critical image details in dark environments such as
faces and number plates, for effective site security and protection.
The Sarix Pro camera range is one of our best contributions to our comprehensive
IP camera portfolio, offering exceptional clarity and increased coverage, as well as
exceptional integration capabilities, said Mark Pritchard, Director of Marketing, EMEA,
Pelco by Schneider Electric. The Sarix Pro camera range is ideal for locations where
video security equipment could be at risk, as well as vandal resistant to IK10.
Pelco will also highlight VideoXpert, the companys award-winning VMS platform that
manages single and multi-site video surveillance solutions from a single workspace
interface, and Optera, the award-winning multi-sensor, panoramic cameras, which
provide seamless video images through 180-, 270- or 360-degree views.

www.securitybuyer.com

INDUSTRY NEWS

Ex-CIA Senior Official joins


Darktraces expert board
Darktrace, the leader in Enterprise Immune System technology, has
announced that Alan Wade, former Chief Information Officer of the
Central Intelligence Agency (CIA), has joined the companys Board of
Advisors, alongside Lord Evans of Weardale KCB, the former Director
General of MI5 and Dr Mike Lynch OBE, Founder of Invoke Capital.
Mr Wade retired from federal service at the end of 2005, following an
illustrious 35-year career in the CIA, where he latterly served as the CIO.
Prior to this, he held a series of senior positions at the CIA, including the
Director of Communications and Director of Security. Mr Wade is a
recipient of the National Intelligence Distinguished Service Medal, the
Directors Medal, and the Distinguished Intelligence Medal.
Darktraces Advisory Board complements the companys
unparalleled combination of expertise in machine learning and
mathematics, government intelligence from the U.S. and software.
Darktraces breakthrough cyber defense technology, the Enterprise
Immune System, uses a self-learning approach to detect threats within
organizations, and has been deployed over 1000 times, boasting 144
partners, 230 employees and 20 offices across the globe.
I am excited to join Darktrace at this important moment in its growth.
Machine learning is becoming critical to addressing the speed and
evolution of threats today, and Darktraces innovation in this area is
fundamentally improving organizations ability to defend themselves
effectively, said Mr Wade on joining Darktraces Advisory Board.
Alans experience at the leading edge of mission-critical intelligence
and technology innovation is exceptional, said Nicole Eagan, CEO at
Darktrace. We are delighted to announce his appointment to the
Advisory Board, as Darktrace accelerates to become the worlds leading
cyber defence company.

012 ISB

Wurldtech launches industrial managed


security services for industrial and
critical infrastructure operators
Wurldtech, a GE company and leader in cyber security for
operational technology (OT) and critical infrastructure, have
announced a new GE Digital security offering: Industrial
managed security services provider (iMSS). These services
are designed to help customers strengthen their security
posture by providing real-time visibility, threat detection and
remediation within their OT network environment.
Wurldtechs iMSS utilises its innovative network security
detection and prevention technology, OpShield, which is
designed to protect critical infrastructure control systems and
assets and enable security management and monitoring for
control systems, critical assets and other embedded/
connected devices.
Leveraging GEs existing IT security operations centres and
its business specific remote maintenance and diagnostics
services, Wurldtechs iMSS will provide a uniquely qualified OT
offering for security monitoring & management, incident
response and threat intelligence.
With the emergence of the Industrial Internet, OT
environments are increasingly interconnected to a wide array
of networks, including IT and business networks, broader
communication platforms, direct-to-internet transmission
frameworks and cloud services.
The connectivity of these networks introduces more risk to
the OT environment, which can require 24/7 monitoring for
threats, said Paul Rogers, President & CEO of Wurldtech and
General Manager of GE Industrial Cyber Security. These
threats cannot adequately be addressed by the traditional IT
security offerings on the market. Wurldtechs Industrial
iMSSbuilds on GEs unique experience leading the
convergence of IT and OT. The iMSS will help companies
minimise risk, reduce costs and protect their overall OT
investment.
According to Gartner, by year-end 2017, more than 80% of
enterprises with significant OT assets will complete restructuring
their security governance and management organisations to
encompass IT, OT and physical security requirements.
Wurldtechs iMSS is being rolled out across GEs Brilliant
factories in the oil & gas, power, transportation and aviation
sectors in the US and Europe. This phase further solidifies
GEs commitment to using and developing solutions that
improve the safety of assets that are reliable and improve
production.
The Wurldtech iMSS extends what the GE Security Operation
Center currently does for the IT side of businesses to OT
environments, said Richard Puckett, Senior Director of Cyber
Intelligence and Security Operations, for GE Digital. The
intelligence were able to provide is based on the collective
expertise of the Wurldtech and GE teams in the cybersecurity
and industrial operating environments.

www.securitybuyer.com

INDUSTRY NEWS

Milestone hires top


talent for new internal
management positions
Milestone Systems have announced the
hiring of a Director for Global Support and a
Director of Program Management, both
based at the Danish headquarters location.
Lucas Rose has been appointed as
Director of Global Support and Sustaining
Engineering for Milestone Systems. He has
20 years of experience in customer and
support roles in telecommunications
companies, most recently heading Amino
Communications customer support. Before
that, he headed Nokias product support for
Operations Support Systems, leading teams
in Portugal, Germany, Greece, India and
China. Although British, Lucas has spent
most of his life outside of the UK. He holds a
degree in Computer Science from Brunel
University.
Lucas has extensive experience in
managing global support teams in multiple
sites across a multitude of time zones with
many cultures involved. This will help us to
bring Milestones Customer Service to the
next level, said Hans Jorgen Skovgaard, VP,
R&D and Support at Milestone Systems.
In addition, Erik Lund has been hired as
Director of Program Management - a newly
created position in the companys R&D
Management and Support team. Erik joins

www.securitybuyer.com

Milestone with over 20 years of leadership


experience from various software and
program management positions in the high
tech industry. He has a software engineering
background and comes from Motorola
Solutions where he was Director of Global
Device Software for TETRA professional
mobile radios, typically used by police, fire,
ambulance and transportation.
As Director of Program Management, Erik
will be the R&D focal point and owner of
release planning, program execution and
agile development processes. A key part of
this role is to work closely with the Milestone
business units and other key stakeholders to
align on priorities and to optimise customer
value. With a newly established Program
Management organisation, functions related
to Release Management, Product Design
(PO/UX), Technical Communication &
Localization, Patents and OEM relations will
all roll up under Eriks leadership.

SALTO presents
integrated access
control solution with
Software House
SALTO Systems has announced the
integration of its offline lock with the C-Cure
9000 security and event management system
from Software House.
The SALTO/ C-CURE 9000 solution provides
seamless access control of an entire building
through a single user interface and is ideal for
use in applications that require varying levels of
security for interior and exterior access points.
The solution deploys SALTO offline locks for
interior doors that require a moderate level of
security, such as storage and office areas, while
Software House hard-wired door controllers are
used for high security and perimeter access
points.
It supports a nearly unlimited number of
offline locks and uses SALTO online readers to
update cards for offline reader access. With the
SALTO/C-CURE 9000 solution, no cabling is
required for lock installation and offline locks
can be installed on a large variety of access
points.
Michael Unger, Vice President Products at
SALTO Systems, says: The SALTO/ C-CURE
9000 solution is an extremely effective way to
manage access control throughout an entire
installation. Its superior capability and ease of
use can include all types of access points
requiring varying levels of security and
furthermore, thanks to this integration, the entire
installation can be managed with a single
credential and management platform.

ISB 013

SPOTLIGHT

OPTEX launches next generation of indoor laser


scanner, now with added performance benefits
The new RLS-2020I is part of the REDSCAN laser range that has been designed for a range of indoor
applications, thanks to its compact and discreet design and user friendly, easy-to-install functionalities

We have used our experience of similar technologies and the feedback from
customers to design a new sensor that has many of the new design features
and mounting functionalities of an IP Dome camera, so it is easy to install...

PTEX, a leading global sensor


manufacturer, is expanding its
series of award-winning
REDSCAN laser sensors with
the launch of a new short range, indoor
model that features the same proven benefits
of its larger companions but is lighter, more
compact and has a range of additional
control and power features similar to those
enjoyed by IP Dome cameras.

Analysis of size,
distance and speed
The RLS-2020I is an indoor sensor using a
new generation of laser that provides a
customisable virtual wall or pane with a
detection area up to 20m (65ft) x 20m (65ft)
to identify the presence of people or objects.
It protects areas from security breaches such
as theft or unauthorised access as well as
improving the reliability of video based
motion detection and surveillance.
By measuring the time it takes for the
emitted laser beam to hit an object and
reflect the signal back to the sensor the RLS2020I can analyse the size, distance and
speed of the encountered object. The system
can be set up to trigger only when a certain
size of object is detected or when a distance

014 ISB

threshold has been reached.


The scanned technology used in the
sensor is based on Class 1 laser technology
used for industrial, safety and security
applications and presents no hazard to
health. It is not affected by any lighting
conditions and will detect in complete
darkness. The accuracy and precision of the
detection makes it a perfect trigger to eventdriven Video surveillance systems, by driving
cameras to pre-determined positions and
pointing to where the intrusion or presence
occurs.

PoE capability
A particular feature of the new scanner is
its energy efficiency; it is Power over Ethernet
(PoE) enabled, consuming only six watts of
power. It is also very easy to set up, program
and control. An easy web browser feature
facilitates fast set up, while a more in-depth
configuration can be achieved by using
dedicated REDSCAN Manager software. It
also features three programmable series
analogue dry contact outputs, giving
flexibility in programming specific commands
including tamper, environment or alarm. The
short-range laser can be integrated with
Video Management Software (VMS),

Network Video Recorder and Physical


Security Information Management (PSIM)
platforms.

Compact and discreet


The compact and discreet design of the
new OPTEX laser sensor together with its
wall and ceiling mounting options enable it to
blend very well into an indoor environment. It
can also be custom-painted to become even
less obtrusive, an option that is important in
nearly every private house, hotel, retail store,
art gallery or modern office building. It
features a splash proof housing which makes
it suitable for more humid environment such
as glasshouses or indoor swimming pools.
Massaya Kida, Senior Manager Product
and Business Planning Department, OPTEX
says that the new scanner brings a new level
of detection to installers and end-users alike:
We have used our experience of similar
technologies and the feedback from
customers to design a new sensor that has
many of the design features and mounting
functionalities of an IP Dome camera, so that
it is easy to install and can integrate within
any video security solution.
www.optex-europe.com

www.securitybuyer.com

SPOTLIGHT

Sony introduces its first 4K video camera with


ultra-high sensitivity and excellent mobility features
Both 4K resolution and high sensitivity in full colour are now available in a compact, lightweight
body with Sonys UMC-S3C - ideal for a variety of applications across a range of industry verticals

At Sony, we focus on enhancing high resolution and high sesnitivity... With


this approach, we have been expanding our current 4K product line-up and
we are confident that we can tap into new markets with the all-new UMC-S3C.

ony has announced the all-new


UMC-S3C, the first video camera
that offers the highest sensitivity
with 4K video recording
simultaneously, allowing users to capture
details even in challenging low-light
conditions, the camera also features
tremendous flexibility and long duration video
recording, alongside 12 megapixel colour still
image capture. This announcement follows
the recent launch of the 4K network camera,
model SNC-VB770.

Focus on new markets


At Sony, we focus on enhancing high
resolution and high sensitivity, said Roger
Lawrence, Video Security Product Manager
at Sony Professional Solutions Europe. With
this approach, we have been expanding our
current 4K product line-up and are confident
that we can tap into new markets with the allnew UMC-S3C. The latest video camera is
also a testament of Sonys relentless efforts to
provide our clients with solutions that meet
their business requirements.
Capable of achieving both sensitivity and
resolution with colour video recording in 4K,
the UMC-S3C provides the highest sensitivity
in its class, with illuminance as under 0.004lx,
ISO 409600. This is made possible by
incorporating Sonys advanced technologies
from both its consumer and professional
space - the full-frame 35mm Exmor sensor
and image processing engine.

35mm full-frame sensor


Sonys UMC-S3C uses a 35mm full-frame
sensor to deliver high sensitivity with high light
condensing efficiency, and an image
processing engine which enhances noise

016 ISB

reduction. With the inclusion of compatible


E-mount lenses that are optimised to
maximise the performance of the 35mm fullframe 12MP sensor, resolution is kept high
across the entire image area from the centre
to the lens periphery.
The camera delivers clear images with less
noise thanks to the 35mm full-frame sensor,
which captures significantly more light with
lower noise than conventional camera
sensors, combined with the use of areaspecific noise reduction which is able to
selectively apply noise reduction to areas
based on image content. Image quality is
further enhanced through detail reproduction
technology, allowing clear and sharp video
recording in near pitch-black environments
beyond the capabilities of the human eye. This
helps to deliver optimised images in various
scenes and ensures a more natural sense of
dimension. The high sensitivity also allows
higher shutter speeds to be used even in low
light, allowing users to capture moving
objects clearly, retaining detail of text and
faces etc.

Most compact Sony camera


Weighing approximately 400g, the
lightweight UMC-S3C is currently the most
compact camera among Sonys line-up in the
full-frame camera market. With mounting
points on the camera body to enhance
mobility, the stand-alone camera allows users
to attach it onto moving objects, such as
vehicles, with ease. In addition, users can
control the camera via multi terminal, remote
controller or compatible software.
The UMC-S3C is suitable for a variety of
applications, including disaster responses;
wildlife monitoring; mapping or surveying of

landscape; surveillance; inspections and


investigations; live camera; dashboard/
professional point-of-view (POV) cameras,
among others. Supporting multi camera
systems, the UMC-S3C can fit into any
existing infrastructure and also allows various
playback functions with the use of a PC as
well as Live View via HDMI.
Long duration video recording is also
possible as the stand-alone camera is
equipped with a memory card slot on the
camera body, instead of network cabling
feature. For example, with a 64GB memory
card, users can record up to 125 minutes of
4K footage with standard quality (30 fps/60
Mbps). Furthermore, with 4K resolution,
where image resolution is four times higher
than full HD, users can cover larger areas with
outstanding image quality. The camera also
accommodates the XAVC S format, enabling
high quality recording with 100Mbps high bit
rate. This is a huge advantage to users in
challenging environments where cabling or
space is a huge limitation.
www.pro.sony.eu

www.securitybuyer.com

SPOTLIGHT

Axis Communications launches new product line to


address complete security needs of smaller businesses
The AXIS Companion Line is a complete, integrated and reliable product solution for businesses that
have a basic need for surveillance but may have been hesitant to install a security system in the past

Simplicity and reliability are the underpinnings of this offering. We deliver


enterprise-level quality in an easy-to-use solution so business owners can
focus on running their operation, not whether their security system is working...

xis Communications has


announced a focused offering to
meet the unique security
requirements of the small
business sector. The offering combines a
complete, integrated and highly reliable
product solution - the AXIS Companion Line with comprehensive support to resellers and
installers who call on small businesses, called
the AXIS Companion Specialist initiative. The
initiative makes adopting an advanced
network video security system an easier,
more cost-effective and low risk proposition
for businesses such as shops, restaurants
and offices that have a basic need for video
surveillance to secure employees, customers,
premises and assets.
We have seen that smaller businesses are
often hesitant to adopt network security
solutions due to price and maintenance
concerns, and perceived complexity of
operation. We have responded with a
competitive offering of cameras, storage,
software and other key components that
remove those barriers. Its literally an out-ofthe-box solution based on the same quality
and reliability customers worldwide have
come to trust from Axis, said Gilles Ortega,

www.securitybuyer.com

Director of Small Business at Axis. And, a key


aspect of delivering solutions to this sector is
to ensure that qualified and trained resellers
and installers are available to support these
types of customers, which is the focus of the
AXIS Companion Specialist initiative.

Building a complete solution


A key element in the AXIS Companion Line
is the AXIS Companion Recorder, an
8-channel network video recorder with built in
PoE switch for cost savings at installation. It is
a production-proven device which includes a
video surveillance grade hard disk and a fanless design. It also includes a USB port for
easy export of video footage and a wireless
access point for direct access to the system
with mobile devices.
The solution leverages the AXIS
Companion video management software,
which simplifies installation and use via the
AXIS Companion mobile app for iOS or
Android devices. This removes the need for a
PC during the system setup or on-going use.
The app allows users to securely access
video footage and manage the cameras
remotely from their smartphone or other
mobile device.
Simplicity and reliability are the
underpinnings of this offering. We deliver
enterprise-level quality in an easy-to-use
solution so business owners can focus on
running their operation, not whether their
security system is working. The capabilities
delivered in the AXIS Companion Line bring
peace of mind to small business owners,
added Ortega.
The IP cameras available in the AXIS
Companion Line provide a range of
capabilities for various uses, including day
and night video surveillance with integrated

infrared (IR) illumination for indoor or outdoor


scenarios. All the AXIS Companion Line
cameras deliver high video quality in full HDTV
or up to 2 Megapixel resolutions and include
Wide Dynamic Range (WDR) technology for
challenging light situations. The award
winning Axis Zipstream technology is also
supported for minimized bandwidth and
storage usage.
The cameras come with a microSD card
slot, which can be used in combination with
an AXIS Surveillance microSDXC Card and
the new AXIS Companion Switch, a 4-port
Power over Ethernet (PoE) switch, to
seamlessly scale the system or to use as a
cost efficient recording solution in scenarios
where fewer cameras and shorter retention
time is needed.
All hardware in the AXIS Companion Line
includes an Axis three-year warranty. AXIS
Companion Line network cameras and AXIS
Companion Recorder are only for use with the
AXIS Companion video management
software and mobile app.
AXIS Companion Recorder, AXIS
Companion Dome V Network Camera, AXIS
Companion Eye L/LVE Network Cameras and
AXIS Companion Switch will be available from
Q2 in Axis distribution channels in Northern
Europe, Middle Europe, Southern Europe and
North Americas.
www.axiscompanion.com

ISB 017

EYEBROW

Ask the Expert:


Axis Communications
Markus Lai, Manager of Sales Engineers
and Trainers at Axis Communications,
explains how to significantly reduce
bandwidth and storage requirements in
IP-based video surveillance systems

ver the course of the past ten years, we have seen


surveillance camera technology steadily advance offering
better and better image quality and detail. Todays
cameras feature Megapixel and full HDTV image
resolutions with first models already taking the leap to 4K Ultra HD.
Frame rates up to 60 fps are not uncommon. Wide Dynamic Range
technology enables todays cameras to capture detailed images even
in complex scenes with high contrasts such as when sunlight creates
both very bright zones as well as very dark shadow areas. Advanced
image sensors allow for colour video even in very dark and extreme
low-light conditions.
With these advances in surveillance camera technology the
requirements in terms of bandwidth and storage consumption have
steadily increased. This has put a lot of pressure on system operators
to manage the underlying network infrastructure as well as storage
resources in a smart way. After all, the best video surveillance evidence
is of no value at all if the system was configured to automatically
overwrite the footage before it was needed. Also it makes little sense to
invest in high quality cameras when reducing the video bit rate,
resolution or frame rate to a level where important details are no longer
captured and footage does not provide clear evidence anymore.

The H.264 video compression standard


Most IP-based video surveillance systems today are based on the
H.264 video compression standard lowering bandwidth and storage
requirements. This is achieved by reducing and removing redundant
information. The video compression algorithm identifies regions in the

018 ISB

IMPORTANT FORENSIC DETAILS LIKE


FACES, TATTOOS OR LICENSE PLATES ARE
ISOLATED AND PRESERVED, WHILE
IRRELEVANT AREAS SUCH AS WHITE
WALLS, LAWNS AND VEGETATION ARE
SACRIFICED BY SMOOTHING IN ORDER TO
ACHIEVE BETTER STORAGE SAVINGS...

www.securitybuyer.com

EYEBROW

video that have already been transferred and do not need


to be sent again in the next image frame. However the
H.264 standard does not specify the algorithm used to
compress video but only the syntax and the method to perform
playback. This allows for improved H.264 encoding solutions to be
created while maintaining the same file format for interoperability
with existing H.264 network infrastructure and video management
software.

Improving H.264 compression


with Axis Zipstream technology
This is where Axis saw the opportunity to take the H.264 compression
standard to the next level. Fully compatible with existing H.264 network
infrastructure and video management software, the Zipstream technology
is a radically more efficient H.264 implementation, lowering bandwidth
and storage requirements by an average 50% or more. This is achieved
by adding a new module inside the video compression engine of a
network camera that ensures that important details in the image get
enough attention in the video stream while unnecessary data can be
removed.
Axis Zipstream technology analyzes and optimizes the network
cameras video stream in real-time. Scenes containing interesting details
are recorded in full image quality and resolution while other areas are filtered
out to optimally use available bandwidth and storage. Important forensic details
like faces, tattoos or license plates are isolated and preserved, while irrelevant
areas such as white walls, lawns and vegetation are sacrificed by smoothing in
order to achieve better storage savings. Zipstream reduces the bit rate of the
video stream by applying the concepts of dynamic Region of Interest (ROI) and
dynamic Group of Pictures (GOP).

www.securitybuyer.com

ISB 019

ASK THE EXPERT

Dynamic ROI
The dynamic ROI optimizes bandwidth in real-time by
analyzing where available bits will offer the maximum
benefit from a forensic perspective. This process is
performed for all image content, resulting in a totally
flexible dynamic ROI. This dynamic ROI automatically
expands, shrinks, changes shape, splits, merges,
disappears and reappears depending on content, to
optimize bandwith and storage consumption in real time.
Since it is unknown in which parts of the image relevant
information may appear, Zipstream prepares the system
for unexpected events. This dynamic automatic ROI is
much more efficient than other ROI implementations
where the region is set manually.

SINCE IT IS UNKNOWN IN WHICH


PARTS OF THE IMAGE RELEVANT
INFORMATION MAY APPEAR,
ZIPSTREAM PREPARES THE
SYSTEM FOR UNEXPECTED
EVENTS...

B. Period with large longer motion needs more


space but still it is possible to save storage during
this motion since the dynamic region detects areas
where non-prioritized information can be removed.
C. Periods without motion are detected and the
dynamic GOP algorithm removes unecessary
I-frame updates.
D. Period with small longer motion.

Dynamic GOP

What about H.265?

The dynamic GOP reduces the bit rate by avoiding


storage consuming I-frame updates. I-frames contain all
details in an image while following P-frames and
B-frames build upon the preceding I-frame and contain
only the changes in the image, not the entire image.
Typical surveillance scenes with limited motion can be
compressed to an extremely small size this way without
any loss of detail. Zipstream automatically adapts GOP
length in real-time depending on the amount of motion in
a scene. This allows for always the optimal setting being
applied reducing bandwidth and storage requirements
significantly without compromising on image detail
should an incident occur.

A. Time period with short small motion. The small


motion is detected and adding bits in that region can
preserve the moving part of the video.

The H.265 standard is still very new. If we take a look


back at how many years it has taken until H.264 was
broadly supported by both hardware and software
vendors in the video surveillance industry then its fair to
say that the market will still take some time. A big hurdle
on the road to H.265 is certainly the steep migration path.
Not only do the cameras have to support H.265 but also
all other elements of a video surveillance system and the
underlying network infrastructure be that video
encoders, storage systems, video management
software or intelligent video analytics solutions.
Zipstream offers an open, non-proprietary approach to
the bandwidth and storage challenges at hand without a
need to invest in new hardware and software.

If we take
a look
back at
how many
years it has
taken until
H.264 was
broadly
supported
by both
hardware
and software vendors in the
video surveillance
industry
then its
fair to say
that the
market will
take some
time...

www.axis.com

Markus Lai, Manager of Sales Engineers and Trainers, Axis Communications


020 ISB

www.securitybuyer.com

EYEBROW
Ask the Expert:
Sony
Roger Lawrence, Product Manager for
Video Security at Sony Professional
Europe, looks at how the resolution
revolution is moving to 4K and beyond

he video security market continues to be a


challenging and competitive one, but that hasnt
stopped a growing awareness of the benefits of 4K
technology. The industry has worked hard to
promote 4K to the new standard, and so far its been well
received. Todays industry conversations are going beyond
HD, and the appetite for high performance, high resolution
and high sensitivity solutions is growing. This shift has
enabled manufacturers to look beyond the traditional market
place, as uptake in 4K continues to grow.

4K vs Analogue
Theres always an element of apprehension when new
technology launches, its part and parcel of entering the
market and happens both within the video security industry
and beyond it. In some cases people will search for limitations
about a particular technology before they see the benefits, and
its up to technology providers to reassure them of the
opportunities they offer.
Analogue still has a strong presence in low cost markets where
price point is the main consideration. Where quality of image and
reliability are the priority and deciding factors, 4K and IP are
driving customer demand. Those security buyers that initially
hesitated about making the transition from analogue to HD have
recognised that theres a new level of solution out there for the
taking its not just about HD anymore, but 4K. HD has undergone
a revolution and 4K is coming to the core. The move from analogue
to HD and higher resolution wont happen overnight, but it has
strong momentum, as technologies mature security buyers
become more confident to adopt them, as does the environment
which encourages them to specify the next level of technology.

THE LEADING 4K SOLUTION IS STRIDES


AHEAD OF ANALOGUE AS A
SURVEILLANCE TECHNOLOGY. IT CAN
COVER GREATER AREAS IN MORE DETAIL,
GIVING MORE INFORMATION WITHIN AN
IMAGE THAN THE GRAINY TYPES OFTEN
GENERATED FROM ANALOGUE...

022 ISB

The leading 4K solution is


strides ahead of analogue as a surveillance
technology. It can cover greater areas in more detail, giving more
information within an image than the grainy types often generated from
analogue. Take a car park for example, an analogue image would show
a vehicle and a person in it. Whereas a 4K image will show the vehicle
model, the registration number and will let you identify who that person
is. Whats more, one 4K model has the ability to cover the same area
as four HD cameras, bringing greater flexibility and value for money
criteria all security professionals need to meet when sourcing the best
solution.

www.securitybuyer.com

Going to market
Security managers are always looking for
higher resolution to ensure detailed replay
footage, clearer facial recognition and more
accurate live-monitoring around the clock.
4K surveillance can be applied across
many different markets, but there are a
few where it really comes into its own.
City surveillance car parks, shopping
centres and critical areas of cities need
a high level of security and 4K is perfect
for those applications in particular. 4K
technology lets security professionals
within the sector ensure anything
suspicious is dealt with appropriately and
accurately every time, eliminating any
guesswork in identifying who or what is the
object of interest in any one particular frame.
It also has the ability to manage business loss.
In logistics settings, such as shipping areas with
a high volume of parcels, 4K imaging can help
identify where packages might have been
misplaced offsetting costs and managing loss in a
positive way.
Theres a split in the video security market between those
who have security cameras purely to tick a box for insurance
purposes or policy, and those who see the potential to improve
efficiency, solve problems, and of course to provide indisputable
evidence, reducing crime. Those with the latter mind-set are those that
are most likely to invest in 4K solutions.
Harton Technology College has done exactly that. It has become the
first educational institution to install a 4K video security solution in an
effort to improve security and safety. The college wanted a solution
that would provide the optimum image quality to ensure the most
effective monitoring of key areas on the site. With a busy main gate
carrying students, staff, parents and visitors through it every day, it
was crucial that the solution was able to capture the minute details. 4K
technology has given the school broad coverage with high image
resolution, allowing them to cover a wide field of view whilst
simultaneously having the ability to zoom in to areas of interest within
the scene.

about more than imaging. Its about integration and providing an allround solution. The most effective technology developments are those
which have been designed to integrate with existing systems. Security
buyers shouldnt refrain from making the move to 4K because of
existing infrastructure models they have. Leading 4K cameras can
seamlessly integrate into existing FHD systems with little or no impact
on the systems infrastructure in place.
Theres still anxiety within the industry that high resolution means
low sensitivity. It does not have to be the case. Advancement in
technology means the industry can enjoy high sensitivity and efficient
bandwidth performance alongside the best resolution its not the
case of one coming at the expense of another anymore. Manufacturers
are on a mission to overcome anxieties users have about transitioning
to 4K, such as low light sensitivity and low frame rate. The industry
needs solutions that go above and beyond resolution to deliver an
offering to significantly change the effectiveness of security for end
users.

Harton Technology College not only needed a high level of physical


security, but also perceived security to give parents, staff and pupils
peace of mind; demonstrating that is has the tools and technology in
place to take appropriate action should incidents occur. The college
has been forward looking in its
approach, knowing what problem it
had to solve and identifying the 4K
solution that could solve it.
THERES STILL ANXIETY

Beyond resolution

WITHIN THE INDUSTRY THAT HIGH


RESOLUTION MEANS LOW SENSITIVITY. IT DOES NOT HAVE TO
BE THE CASE...

Well-designed 4K technology is

www.securitybuyer.com

ISB 023

EYEBROW

The next logical progression is


for CCTV to become fully
integrated with other systems,
such as alarms and access
control, and its already
starting to happen. Cameras
available in the market today
have features preparing for
this - analytics, plug in
software and audio
capability, for example. As
this technology develops
to become standard, and
its easier to do, more users
will get on board. Users will
demand interactive, rather than
separate systems, and manufacturers will
develop technology to fulfil this. Many
organisations today have different resource
owning security, IT infrastructure and building
management, but as building and home
automation grows, the line between their
responsibilities becomes less clear as integrated
systems evolve.

THE RESOLUTION REVOLUTION IS


WELL AND TRULY UPON THE VIDEO
SECURITY INDUSTRY, AND ITS NOT
GOING TO STOP AT 4K...

Flexibility also needs to be a priority. People are


becoming more digital in their everyday lives, from online
banking and shopping to communication, and the video
security industry shouldnt be any different. The cost of
having people monitor cameras 24/7 is very high and
needs to be justified financially, so traditional control
rooms are declining across Europe, with IP enabling
efficient centralisation. At the same time having the option
to access cameras from smartphones is becoming
ubiquitous. Mobile applications give security buyers the
opportunity to have round the clock access, without a
person being there physically, and its something
manufacturers should not ignore when developing
solutions.

The futures bright


4K is here now, and its here to stay. But whats next?

Looking forward, the industry will continue to demand


the highest resolution, but not purely from the camera
sensor. Stitching technology is already facilitating 8K
imaging and beyond. Multiple 4K sensors can be linked to
generate a virtual 12K or higher image, providing
seamless coverage of large areas, so its clear resolution
is high on the list of priorities. Security professionals need
to be able to follow the full journey of an object of interest
within a scene, and high resolution imaging with smart
technology is the way to achieve that.
The resolution revolution is well and truly upon the
video security industry, and its not going to stop at 4K.
The benefits of high resolution technology will become
more widely recognised across the industry, with
reduced camera counts offering savings on installation
and running costs, and high sensitivity and bandwidth
becoming part and parcel of 4K technology. Change is
being driven by end-users and the public and theres an
opportunity to transform surveillance. Its down to
manufacturers to take security into the next decade and
beyond with the next generation of imaging technology.

The next
logical progression is
for CCTV
to become
fully integrated with
other systems, such
as alarms
and access
control,
and its
already
starting to
happen...
As this
technology
develops
to become
standard,
and its
easier to
do, more
users will
get on
board...

The technology is out there to improve safety, reduce


crime and alleviate anxieties about security. Solutions are
only going to get smarter and security professionals will
have access to greater resolution than they ever have
before. Watch this space!
www.pro.sony.eu

Roger Lawrence, Product Manager for Video Security, Sony Professional Europe
024 ISB

www.securitybuyer.com

EYEBROW
Ask the Expert:
Dallmeier
Andreas Wolf, Product Manager,
Intelligent Video Surveillance at
Dallmeier, tells Security Buyer
about the paradigm shift at the fence

hen it is important to provide perimeter


protection for sensitive facilities and external
building security, thermal imaging cameras are
the most popular choice. They are highly
effective for detecting trespassers but unfortunately they do
not provide visual verification of alarms. But when thermal
cameras are combined with multifocal sensor technology, a
whole range of new capabilities opens up, in terms of analysis,
object tracking and identification of individuals on the perimeter.

Why is multifocal sensor technology


more suitable for perimeter protection than
conventional HD or megapixel cameras?
Perimeter protection usually involves very long distances.
Panomera is a camera technology developed by Dallmeier that
is particularly suitable for monitoring and safeguarding relatively
large areas and long distances. With an ingenious array of
optical sensors, this patented system is capable of providing
surveillance for the entire area in question, with uniform image
resolution, good dynamic response and continuous depth of
focus from a single location that would be impossible for
conventional single sensor cameras, and the resolution would
not be good enough.
So in order to achieve similar resolution quality, an enormous
number of single sensor cameras would have to be used. Quite
apart from the costs entailed by additional mounting masts,
wiring etc., there would still be another problem: The time and
labour required to configure each camera installation point
individually by hand would then be

considerable. Then you must also consider that perimeter surveillance


always requires working with 3D models, in order to be able to classify
objects meaningfully. The quality of the analysis naturally depends on the
camera and analysis having been configured correctly. If a large number
of cameras have to be configured manually and this task is not carried out
precisely as prescribed, the analysis cannot function reliably. With
multifocal sensor technology, the camera is configured automatically,
because 3D is already integrated in the Panomera, so the problem of
reliability associated with manual configuration does not exist. Another
dimension that is only possible in conjunction with MFS technology is
foreground observation.

What exactly is meant by foreground observation?


If an alarm is set off, the response by security personnel must be rapid
and decisive. Particularly when it comes to
perimeter protection, it is
advisable to continue
monitoring the scene so that
further movements by the
detected object can be
observed. With standard
perimeter installations,
however, the field of view is
limited exclusively to the
detection zone, that is to say
the cameras have a narrow
aperture angle and only a small
field of view. So it is not possible
to see what is happening in the
foreground. With multifocal
technology, long distances can
be monitored, and an object and

026 ISB

www.securitybuyer.com

ASK THE EXPERT

its location can be detected with certainty. After an alarm is triggered,


an object can be displayed automatically in multiple views, so that
observation can be optimal. In this way, it is also possible to work out
where the object is coming from, and where it is headed, so that it is
not immediately lost from view. Because of the high resolution
provided by the patented sensor concept in MFS technology, an
individual can be detected consistently.
In short, Panomera at the fence is actually three systems in one: it
offers classic intruder detection at the perimeter, analysis and
observation of objects well beyond the detection range by virtue of its
larger field of view, and lastly detection and identification of individuals
through its high resolution.
To this must be added the high level of availability and reliability of the
video analysis through the combination of multifocal sensor
technology with thermal imaging. Essentially, this new concept in
perimeter security heralds a paradigm shift at the fence!

Why does perimeter protection often


rely on thermal imaging cameras?
Thermal imaging provides the basis for a very high detection rate
with a very low false alarm rate. Because analyses in the visible
wavelength range are vulnerable to considerably more potential
sources of interference, such as shadows, trees or bushes, and they
often reach their performance limits in the face of environmental
conditions such as rain, snow, sandstorms, or when something as
mundane as the lighting equipment fails and they can no longer detect
an object.

capability of detecting intruders, much less identifying them.

So this is why it is used in


combination with multisensor cameras?
Coupling Panomera with thermal technology yields an ideal
combination for perimeter surveillance. The purpose of linking these
two technologies is so that the weaknesses of the one can be
compensated for by the other in each case.
Video analysis is performed primarily with the thermal video, which is
less susceptible to interference. If the thermal technology is no longer
equal to the task due to the climatic and thermal environmental
conditions, the system automatically switches to analysis in the visible
wavelength range. Practically total availability of video analysis was not
possible until multifocal sensor technology and thermal technology
were combined.

At what point exactly do thermal imaging


cameras reach the limits of their capabilities?
Thermal sensors measure the thermal radiation from an object and
convert it into a grayscale image. The contrast between an object and
the background is decisive. If it is inadequate, the thermal video cannot
be analysed. The contrast depends on the absolute temperature
difference in the image and the relative temperatures of the immediate
surroundings and the object. For the purposes of video analysis,
thermal sensors lose their effectiveness when the temperature of the
immediate surroundings is practically the same as that of the object
and the absolute temperature difference is very large, so that few grey
values are available per degree of temperature difference. The
resulting grayscale image then yields little or no contrast between the
object and its surroundings, which means that the object is not visible,

Yet thermal technology alone is also not equal to the task when the
contrast between objects and their surroundings is not evident based
on the thermal conditions. And there
is one critical disadvantage
associated with the use of thermal
imaging cameras: It cannot provide
THERMAL IMAGING PROVIDES
any high resolution colour images of
DETECTION RATE WITH A VERY
the scenery, that is to say, beyond a
generalised alarm verification
function, it does not have the

www.securitybuyer.com

THE BASIS FOR A VERY HIGH


LOW FALSE ALARM RATE...

ISB 027

ASK THE EXPERT

THE QUALITY OF VIDEO MODULE CAPTURES


VARIOUS MEASUREMENT VALUES IN THE VIDEO
AND USES THEM TO CALCULATE SHARPNESS
DIMENSIONS, CONTRAST RATIOS AND VISIBILITY
FEATURES, AMONG OTHER THINGS, AND IN THE
CASE OF THERMAL SENSORS THE MEASURED
TEMPERATURE RANGES AS WELL...
and thus also cannot be analysed.
A large absolute temperature difference and a small
relative temperature difference between an object and its
immediate surroundings occur particularly frequently in
industrial environments and the warm summer months
from the late afternoon and lasting until the early morning.
Reinforced surfaces, streets and building fronts store so
much heat that people on or in front of them disappear.

And this is when MFS


technology comes into its own?
Thats right. A function called the Quality of Video
module is permanently monitoring the quality of the video
content to check that it can be analysed using video
analysis processes. The Quality of Video module
captures various measurement values in the video and
uses them to calculate sharpness dimensions, contrast
ratios and visibility features, among other things, and in
the case of thermal sensors the measured temperature
ranges as well. When the thermal technology loses its
effectiveness for video analysis purposes, the system
uses the Panomera videos for analysis. Switching takes
place automatically, but it is reported as an event.

Are the videos from the MFS


systems only used for analysis?

obtained as needed for each


camera channel individually.
Depending on specification,
the video analyses operate
with a performance of up to 25
fps and an effective resolution
of up to 16 MP.

The DVS Analysis Server is


based on SEDOR, a highperformance, self-learning
video analysis system that
uses the latest image evaluation algorithms and adapts
the system parameters continuously to the prevailing
ambient conditions to deliver outstanding analysis results.
SEDOR Intruder has the capability to report
unauthorised entry in freely definable areas. The
application can recognise whether an object is
approaching a facility, which direction it is coming from,
and how long it remains in an area. The analysis contains
special modules and mechanisms that eliminate camera
shake, shadows, reflections from the sun and headlights,
thereby reducing false alarms to a minimum.

Would existing systems have to be completely


replaced to implement this perimeter concept?
All Dallmeier systems work with open interfaces, so the
Panomera solution could also be integrated in an
existing thermal camera system. In that case, a phased
introduction would also be possible, in which the
multifocal technology would be installed first at important
nodal points such as entrance roads and gates. We
advise customers thoroughly on this aspect, and prepare
corresponding migration concepts, because video
analysis in all its forms always depends on good planning!
www.dallmeier.com / www.panomera.com

No, the video streams from the Panomera are


simultaneously recorded at the highest possible
resolution, recording is either continuous or eventcontrolled. When an incident occurs, the best resolution
for visual verification of the event is activated
automatically.

The application can


recognise
whether an
object is
approaching a facility, which
direction it
is coming
from, and
how long
it remains
in an area.
The analysis contains
special
modules
and mechanisms that
eliminate
camera
shake...

What recording and analysis


technology is this based on?
The DVS Analysis Server, a complete system
installation incorporating both extensive recording
functions and very powerful video analysis functions.
Licences for preinstalled video analysis applications such
as Intruder, PeopleCounting or Object Counting can be

Andreas Wolf, Product Manager, Intelligent Video Surveillance, Dallmeier


028 ISB

www.securitybuyer.com

COVER STORY

Penetration:

The art of breaking


into IT systems
Adrien de Beaupre, SANS Institute
instructor and highly regarded penetration
tester tells us all you need to know about
the people that break into IT systems

ver the last few


years, IT security
breaches have
become high profile
news, with the likes
of TalkTalk and Sony
making headlines
for the wrong reasons. Across the world,
hacking attacks and website defacement
are becoming more frequent, impacting
thousands of companies worldwide. In
response, organisations have to protect
themselves from attack - whether it is from
cyber criminals, company rivals or even
hacktavists intent on website defacement
to serve a political agenda. To better
protect IT infrastructure, organisations
need to understand current and past
vulnerabilities and patch all equipment as
soon as vulnerability patches are made
available.
Such steps alone do not protect an
organisation, however. As is human nature,
people make mistakes. Whether its
granting full access permissions to a server
by accident or not setting a password on
the administrator account because it
makes management easier - no matter
how much patching is done, environments
can still be vulnerable to attack.
Testing an environment is secure is the
job of a penetration tester, pen tester for
short. A pen tester essentially simulates the
processes of a hacker, performing the
same sorts of attacks to try to penetrate a
network and locate compromised

030 ISB

systems.

Who are penetration testers?


Larger organisations often have their own
internal security teams that provide constant
day-to-day monitoring of networks and devices
and also collate and implement the relevant
security patches to help ensure systems are
secure. These teams may also conduct
penetration testing, usually undertaken after
major system updates or as a regular monthly
or quarterly activity. As marinating these
specialist teams can be expensive, many
organisations use third party external
penetration testing service providers.
Penetration testing can be performed by
security personnel who keep up to date with
the latest security developments, penetration
applications and methods of attack, or
preferably by someone with specific
penetration testing experience. Indeed, most
organisations require that a pen tester has a
level of certified competency. This is vital so
that the tests carried out are both
comprehensive and do not damage the
network in the process. The most established
and recognised certification is the GIAC
Penetration Tester (GPEN) certification which is
for security personnel whose job duties involve
assessing target networks and systems to find
security vulnerabilities. GPEN Certification
proves the holder us skilled in penetrationtesting methodologies, the legal issues
surrounding penetration testing, knows how to
properly conduct a penetration test and
understands the best practice technical and
non-technical techniques specific to
penetration testing.

www.securitybuyer.com

COVER STORY

What kind of person


makes a good pen tester?
Alongside training, a good pen tester
tends to have painstaking attention to detail
and strong analysis skills that allow them to
break down a problem in order to find a way
through. Good pen testers also display a
level of creativity, necessary to emulate
attackers in a controlled professional
manner. However, these are typically not
lone-wolf types, as working for a client also
requires soft skills around communication
and teamwork. Organisation skills are also
vital as each job requires a scope of the
project, rules of engagement, plus a solid
grasp of policies, process and procedures.

What are the key skills that a


penetration tester must
possess?
Many think of pen testers as solo
operators, when the truth is that the best
performers are those that engage as part of
a team. Some of the team skills that are
required are project management,
creativity, being methodical, analytical, and
having good writing skills. Most have an
extensive background in information
security, and tend to be very technical in
their areas of expertise. Team membership
varies based on the specifics of each
engagement; expertise in network testing
is not as useful in a wireless or web
application test for example.

Are there typically broad steps


that a pen tester follows?
Penetration testers tend to all follow the
same high level methodologies, often
tailored for a specific organisation or
engagement. Many of them are free and
available for download. Examples are the
SANS PenTest methodology, the Open
Source Security Testing Methodology
Manual (OSSTMM), Open Web Application
Security Project (OWASP) Testing Guide,
and NIST Technical Guide to Information
Security Testing and Assessment SP 800115. The steps are generally:

Planning and logistics


The pen tester will put the basic
framework in place, deciding whether they
can do the test, and how to conduct it. This
is a perfect time to schedule specific
phases of the process and allocate tasks to
various team members.

www.securitybuyer.com

ISB 031

COVER STORY

Reconnaissance and intelligence gathering


It is during this phase, the pen tester finds out about the target
organisation. This is not just a software based activity as the weakest
link is still people and conducting Open source intelligence (OSINT)
such as reading past employees resumes on LinkedIn can give pen
testers a wealth of information about organisational structure, for
example.

Identification and enumeration of targets

THE PEN TESTER IDENTIFIES


VULNERABILITIES DURING
THIS PHASE WHICH CAN
INCLUDE OUTPUT OF
AUTOMATED TOOLS...

Using a number of tools to interrogate the target, this stage helps to


paint a fairly complete picture of the target. This can include
identification of valid user accounts or poorly-protected resource
shares using active connections to systems and directed queries.

Vulnerability assessment and validation


The pen tester identifies vulnerabilities during this phase which can
include output of automated tools such as port scanners and other
tools, but also information gathered from the earlier stages to identify
vulnerabilities that may exist but not detected by tools.

Exploitation
The next stage is to test if any vulnerability can be exploited. This is
actually often the shortest phase of a typical week long project and
often requires a process to run through multiple vulnerabilities, in a
specific sequence, to breach a network or system.

Post exploitation - pillaging and pivoting


If a network is vulnerable and can be breached, the tester will make
their way around the different systems, collecting data within the rules
of engagement and mapping out where the attacker can traverse.

Analysis and report writing


Irrespective of whether the network has been breached, the pen
tester needs to create an analysis with a corresponding report that
focuses on documenting what happened for the client. This can
include output from key tests and some additional description for
explanation.
Although a common process, an experienced pen tester knows
when to exactly follow the methodology and derived checklist, and
when to get creative and document where the team goes off the path.
What three tools are typically first in a pen testers arsenal?
Each job will require the use of technological tools, which are readily
available, but in the hands of an unskilled individual they may do a lot of
damage, and often do not achieve the objective of identifying and
demonstrating risk. Selecting the right software to use really depends
on the scope and nature of the engagement. The most important tool
is knowledge. As my friend James Jardine puts it I thought it was just
a mindset? The rest is just pretty accessories. The honest answer is a
web browser to do the recon and information gathering, a project
management tool for scheduling, and a database to track target data
in. For Internet based testing a port scanner such as massscan, nmap
or unicornscan, a vulnerability scanner such as OpenVas or Tenable
Nessus, and an exploitation kit such as Core Impact Pro or Metasploit.
For web applications, wireless, or other forms of testing the tools are
quite different. The real ingredients for a successful penetration test by
a good team are people, process, and technology:

032 ISB

www.securitybuyer.com

COVER STORY

People: Good training, painstaking


attention to detail, experience, analysis skills,
and creativity to emulate attackers in a
controlled professional manner.
Process: This includes determining the
rules of engagement, project management,
logistics, scope, policies, procedures, and
methodology of the pentest.
Technology: Finding tools is not difficult;
often they are free and readily available
for download by anyone. In the hands
of a skilled penetration tester they are
incredibly useful. In the hands of a
wannabe they are a disaster
waiting for a place to happen.

What is the single


biggest mistake that a
pen tester can make?
The most cardinal sin is
violating the rules of
engagement or going out of
scope. The rules of engagement
include the laws and ethical
guidelines as well as those types
of tests that are allowed to be
performed in that engagement.
The scope are those things that
you are allowed to test in that
engagement. Going out of bounds
on either of these can not only be
career limiting, but also freedom
limiting. When in doubt always go back
to the written rules of engagement and

www.securitybuyer.com

scope. Ask for clarification or modification if


required. There is no cheating in penetration
testing. Only those things that are illegal,
immoral, unethical, or illogical.

How to improve as a pen tester


New or experienced pen testers can
benefit from SANS training. The curriculum
covers many aspects of penetration testing
and prepares students for the GIAC
certifications that are accepted worldwide as
a benchmark of technical skills and
knowledge.

About the author


Adrien de Beaupre
Adrien de Beaupre is a certified SANS
instructor and works as an independent
consultant in beautiful Ottawa, Ontario. His
work experience includes technical
instruction, vulnerability assessment,
penetration testing, intrusion detection,
incident response and forensic analysis. He
is a member of the SANS Internet Storm
Center (isc.sans.edu). He is actively involved
with the information security community, and
has been working with SANS since 2000.
Adrien holds a variety of certifications
including the GXPN, GPEN, GWAPT, GCIH,
GCIA, GSEC, CISSP, OPST, and OPSA.
When not geeking out he can be found with
his family, or at the dojo.
www.sans.org

Adrien De Beaupre,
SANS Institute Instructor

The most
cardinal sin
is violating
the rules of
engagement
or going out of
scope. The rules
of engagement
include the
laws and ethical
guidelines as
well as those
types of tests
that are allowed
to be performed
in that
engagement...

ISB 033

EYEBROW
INDUSTRIAL

Industrial security
NEEDS

Industrial solutions
Mark Fletcher looks at industrial security in the wake
of the new information-enabled industrial revolution

ohn Chambers, former CEO of Cisco Systems delivered


quite a sobering quote in a presentation a few years
back. He said: There are two types of companies:
those that have been hacked, and those who dont
know they have been hacked. Food for thought,
especially when you consider just how much of a
modern industrial plant is connected even
unintentionally or indirectly to the hornets nest that is the World Wide
Web.
Before you start pulling Ethernet and data cables out of the back of
your computers, routers and PLCs it is worth understanding that the
benefits delivered by a data-enabled enterprise are huge and that you
can get peace of mind from the fact that many of the worlds leading
network and automation firms are already ahead of the game when it
comes to data infrastructure security.
The new industrial revolution has many names and badges, with

Germanys Industrie 4.0 taking the lead in Europe. From a worldwide


perspective, the most popular moniker for the enabling technology is
the Internet of Things (IoT) or, in this case, the Industrial Internet of
Things (IIoT). No matter the name, the basic premise is the same all
data-enabled devices, even dumb ones on a low-level network, have
the ability to share their operational data and signals with just about
every other device on the same network, including external networks if
a suitable connections exist. It is the management, control and
regulation of these interactions that are key to effective data
exploitation and, of course, security.
According to Pierre Paterni, Business Development Lead, Network
& Security Services, EMEA for Rockwell Automation: The collection,
collation, deciphering, analysis and delivery of pertinent, real-time
manufacturing and processing data is giving key personnel and
enterprise systems the ability to make far more impactful decisions. By
connecting the physical and virtual worlds, the IIoT has brought
people, processes and equipment much closer together; not only

The collection, collation, deciphering,


analysis and delivery of pertinent data
is giving key personnel and enterprise
systems the ability to make far more
impactful decisions...

034 ISB

www.securitybuyer.com

INDUSTRIAL
EYEBROW

deepening the understanding of plant-floor events, but also


sharpening decision-making.
The Connected Enterprise approach from Rockwell Automation,
he continues, is one such initiative that is both driving and exploiting
this new data-driven industrial landscape. It leverages a number of
technological approaches to deliver multiple tangible benefits,
including faster time to market, lower total cost of ownership (TCO),
improved asset utilisation and optimisation and enhanced enterprise
risk management.
I asked Pierre about the risks that an unsecured enterprise could
see and what the primary issues are. The main issue we see is with
the IT the responsibilities within the enterprise or factory. Just who
is responsible for the industrial networks? Is it the plant manager or
the IT manager? In a perfect world these two roles should be
working together, but in our experience this is not always the case.
If we look at plant managers, I think it is fair to say that they often
dont have the requisite IT skills to be able to implement best
practice. The average person has basic knowledge of home
networking and may mirror this in a plant, but networks in the
industrial space are not always properly designed or robust
enough. They often dont have any form of network resilience or
redundancy and dont offer the performance levels suitable for a
robust security solution. Before implementing any security features
you must therefore have a properly designed network.
A consequence of this simplistic approach is that there are often
numerous ad-hoc remote access points, 3G modems and VPNs that
can actually expose a plant to the outside world as a side effect. You
only have to look at the Shodan website (www.shodan.io) to get a real
appreciation of unsecured devices. Shodan has the ability to trawl the
Net to discover a huge variety of devices including automation
hardware assets that are connected to the Internet, where they are

IN THE INDUSTRIAL WORLD THERE IS


ALWAYS THE QUESTION OF WHY
ACCESS A PLC? THIS IS, IN FACT, A BIT
OF A CAT-AND-MOUSE GAME, WHERE
THE OBJECTIVES OF THE HACKERS ARE
ALWAYS EVOLVING...

www.securitybuyer.com

located and who is using them.


Looking at the actual threats, one of the most high-profile attacks in
recent years and the subject of past Security Buyer features was
the Stuxnet malware, a very clever computer worm that was designed
to target specific hardware in specific applications in a particular
country, in this case PLCs running centrifuges in Iranian nuclear
facilities, although it has been seen in other countries and applications.
Political subterfuge aside regarding who created Stuxnet, it still serves
as a sobering reminder of just what is possible.
Pierre continues: In the industrial world there is always the question
of Why access a PLC? This is, in fact, a bit of a cat-and-mouse game,
where the objectives of the hackers are always evolving. An exposed
PLC or router will always run the risk of unauthorised access, indeed,
weve seen speed changes from external inputs resulting in process
errors, which can be potentially dangerous.
However, disrupting manufacturing operations is not the only
reason; a less obvious but just as vital reason is to gain access to
industrial intellectual property. An end user who gives external access
to a machine builder for remote monitoring might accidentally be giving
them free rein to access the whole network, where they could see a
competitors hardware. In this instance it makes sense for the machine
builders to work together with the end users to make sure that external
parties can only see what they need to see and nothing else.
I then quizzed Pierre on what steps can be taken and how Rockwell
Automation approaches the issues. When I walk into a customer, it is
typically a journey that starts with checking their system with current
best practices using an assessment. To this end, we refer to the
frameworks defined by Rockwell Automation and Cisco Systems and
our Converged Plantwide Ethernet (CPwE) Architectures guidelines
and resources, which provide education, design guidance and
recommendations. These resources, comprised of the Rockwell
Automation Integrated Architecture and Ciscos Ethernet-to-theFactory, provide users with a foundation for the successful deployment
of the latest technology, by addressing topics relevant to both
engineering and information technology professionals. They also

ISB 035

INDUSTRIAL

IF YOU LOOK AT SOME OF THE


WORLDS MAIN SECURITY
ORGANISATIONS YOU WILL ALSO
SEE COMMONALITY IN
APPROACHES...
address the cultural and technical challenges of Ethernet
network convergence between IT and engineering.
If you look at some of the worlds main security
organisations you will also see commonality in
approaches, he continues. The International Society of
Automation, the National Institute of Standards and
Technology and the US Department of Homeland
Security all share two primary objectives (among others)
when it comes to industrial security; and these are
defence in depth and the deployment of a so-called
demilitarised zone or DMZ.
Defence in depth, as the name suggests is looking at
security as a holistic problem, not one isolated to specific
products or platforms. You must have security at all
levels, Pierre elaborates. This includes, but is not
limited to: Physical security, such as access to data
rooms and switchboards; network security, using
hardened technology and routers; application security;
computer security, including robust policies relating to
patching software to the latest versions; and thorough
password policies and authentication procedures. You
cant look at any of these in isolation as any of them can
become a weak link.

THE END GOAL HERE IS TO ALLOW


INFORMATION TO FLOW, BUT IN A
SECURE WAY... BY USING
REDUNDANT FIREBALLS EITHER
WAY OF THE DMZ...
The DMZ approach involves the physical separation of
the office and manufacturing networks to ensure there
are no direct access points and cross contamination.
The end goal here is to allow information to flow, but in a
secure way, Pierre explains. By using redundant
firewalls either side of the DMZ and replication servers
within the DMZ, it is possible to isolate the two networks
while still allowing information through in a controlled a
secure manner by brokering the exchanges.
Pierre concludes with very useful advice in terms of
the six steps to securing the Connected Enterprise or
indeed any enterprise running any network with external

access. The first step is to assess what you have. You


cannot secure your enterprise unless you know what you
are trying to secure. The second step is to educate
people, who are often the weak link. To this end
Rockwell Automation offers Cisco Certified Network
Associate Industrial training for plant administrators,
control system engineers and traditional network
engineers in the manufacturing, process control and oil
and gas industries, who will be involved with the
convergence of IT and Industrial networks. There is also
Managing Industrial Networks with Cisco Networking
Technologies (IMINS), which is designed for IT and
Operations Technology professionals who are
responsible for the implementation, operation and
support of networked industrial infrastructure.
The third step, he continues, is the implementation
of technology in order to secure and upgrade the existing
infrastructure. This is followed by the fourth step, which
is to virtualise Servers and consolidate information into
Industrial Data Centres; so instead of having different
physical boxes, companies can use virtualisation to
have all vital programmes in a central location, which is
much easier to manage, maintain and secure.
Once the technology has been deployed, he
continues, the fifth step is to monitor your infrastructure
and network to ensure that it is working as it should and
that the security principals are being correctly deployed
and controlled. Finally, you must prepare for the worst
and develop a robust disaster recovery plan. It is almost
impossible to cater for absolutely every threat vector and
action, so companies must instead create a plan that will
allow them to be up and running to full capacity as
quickly as possible, irrespective of the unwarranted
action or intrusion.

You must
have
security
at all
levels. This
includes
physical
security,
such as
access to
data rooms
and switchboards...

This last point brings us neatly back to our introductory


quote from John Chambers: There are two types of
companies: Those that have been hacked, and those
who dont know they have been hacked. I am not
convinced that this is entirely the case in the industrial
arena and that it is, in fact, a bit of a pessimistic
statement, as not all companies undertake work that
merits the direct attention of the hacking community.
However, one look at router logs will show firewall activity
even if it is not directly targeted at your particular
company. The final message here is embrace the new
data-driven economy and if you have any concerns
about security, there are some companies out there who
are already ahead of the curve in terms of helping you to
protect your assets and IP against even the most
ardent intruders.

Pierre Paterni, Business Development Lead, Network & Security Services, EMEA, Rockwell Automation
Mark Fletcher

036 ISB

www.securitybuyer.com

INDUSTRIAL

Tailored access for a


Swedish utilities company
CLIQ provides individual and secure access for employees
and contractors at Swedens Eskilstuna Energi och Milj

hen everyone working for


Eskilstuna Energi och Milj
needed their own tailored
access rights, the solution
was the CLIQ system. The public utility
has installed CLIQ locks on interior and
exterior doors across its multiple sites,
which include a waterworks, a heating
plant, a recycling centre and 300 pump
stations.
From safe, unpolluted water to
dependable electricity supply, Eskilstuna
needs Eskilstuna Energi och Milj to keep
working round the clock. Everyday life and
economic activity in this small city west of
Stockholm relies on its utility, which is why
the company turned to an access-control
system tailored to securing critical
infrastructure and high-security premises
with a vast array of lock types.
The innovative CLIQ locking system
allows administrators to issue employees
with a mechatronic key that can be
programmed to open any locks in the
organisation. Around 400 Eskilstuna
Energi employeesplus consultants,
technicians and water-tower tenants
each carry a CLIQ key.
CLIQs programmable keys allow us to
give access to certain doors, to certain
people and at a certain time, says Annica
Strandberg, security manager at
Eskilstuna Energi och Milj.
Thanks to a simple, web-based
administration system, it is just as easy to
trace every use or revoke access rights for
a CLIQ key, too.
For every public utility, high security is a
priority. The CLIQ system eradicates the
risks associated with any lost mechanical
key, says a spokesperson for the ASSA
ABLOY group.
Available on the global market place,
CLIQ is an ASSA ABLOY group locking

www.securitybuyer.com

technology with battery-powered keys


that combines electronic and mechanical
security in a wide range of cylinder type
applications. CLIQ Remote solution is
designed for distant sites, enabling the
commissioning, programming and full
administration of security management
centrally via web-based software.
Eskilstuna Energi och Milj provides the
97,000 residents of Eskilstuna, in Sweden,
with water, heating, electricity and various
environmental services. The utility
employs around 400 people.
ASSA ABLOY is the global leader in door
opening solutions, dedicated to satisfying
end-user needs for security, safety and
convenience. Since its formation in 1994,
ASSA ABLOY has grown from a regional
company into an international group with
about 46,000 employees, operations in
more than 70 countries and sales of SEK
68 billion. In the fast-growing
electromechanical security segment, the
Group has a leading position in areas such
as access control, identification
technology, entrance automation and
hotel security.

www.assaabloy.com
ISB 037

INDUSTRIAL

Operational Technology in the utilities industry


requires its own specic type of cyber security
Paul Rogers, President and CEO of Wurldtech, explains why present IT systems are not equipped to keep
connected systems in Operational Technology environments owing, and how a new approach is needed

nnovation in the oil and gas, utility, healthcare and transportation


industries is heavily reliant on connectivity - between devices and
systems, machines and data, people and processes. This
connectivity is great for productivity upstream, mid-stream and
downstream, but is also exposes these systems to greater cyber
threat. Furthermore, as operational technology (OT) leverages the
benefits of the network, the threat of a successful cyber attack greatly
increases with the expanded attack surface. System operators and
security directors face challenges in responding to the growing
number of security threats they face in todays connected
environment.
Whether from outside threats, like hackers or state sponsored
actors, or inside threats, like human error, in an environment where
companies are operating drills, electric grids, MRIs or locomotives,
unplanned downtime is simply not acceptable. In many cases,
management will respond, Yes, we know. Thats why we focus so
much effort on IT cyber security. Isnt cyber security for OT
environments just like security for IT systems, but with different
protocols?
The answer is, no. IT security lives in the context of an IT stack with
tools from many vendors network, servers, storage, apps and data.
Its in a periodically updated ecosystem where most hosts are talking
to lots of other hosts and where there are frequent patch cycles - in
weeks or sometimes days - in response to expected and known cyber
threats. IT security basically protects data (information), not machines.

devised to withstand modern attacks. Surprisingly, many operators


dont know whats actually transpiring on their OT network and, even if
hacked, have no knowledge of the assault.
Executives are looking for options other than relying on IT cyber
security systems to protect OT processes. First of all, OT utilises
communication protocols and network architectures not often shared
with IT systems and requires different security tools that are capable to
operate on those protocols and architectures.
The cornerstone of IT enterprise security is the use of software
patching to eliminate underlying implementation vulnerabilities. Patch
management is a particularly painful operation in an OT system; many
organisations dont have the infrastructure for qualifying patches to
ensure they do not impact any of the software running on their system
and, so, have to depend on their vendors to test and ensure new
patches will not impact control of their processes. Secondly, many of
the security controls that are effective in IT are not effective in OT; they
have to be adapted to the technical requirements of OT systems.
Lastly, to apply the patch to an OT system usually means the operation
must be shut down. Closing down ones business periodically to add
yet another patch is not a remedy that works when minutes of
downtime can cost immense amounts of money. To eliminate turning
off the operation when patching, patches must be delivered to a
security solution that resides directly in front of the control unit.

Specifically, OT needs a solution that addresses five areas:

Why IT security does not work in OT environments

In OT, high-value, well-defined industrial processes - which execute


across a mix of proprietary devices from many different manufacturers
- need protection, not data. Many of the devices and software used in
operational environments are ten to 30 years old. They were designed
to be connected, have not been patched very often and were not

038 ISB

ICS/SCADA (Industrial Control System/Supervisory Control


and Data Acquisition) equipment is difficult to patch,
OT protocols can easily be misused to disrupt critical systems,
Factory networks are very hard to rewire for proper
segmentation,
Limited visibility into attacks on the industrial network, and
IT security staff lacks experience with industrial equipment.

www.securitybuyer.com

INDUSTRIAL

OT security applications need to protect these ICS


and SCADA operations. It must defend unpatched
systems with strong perimeter and field defence,
plus inspect and control industrial protocol traffic.
To do so, the security must offer the protection of
three security applications: (i) firewall with stateful
inspection for layers 2 through 4; (ii) an Intrusion
Protection System/Intrusion Detection System
(IPS/IDS); and (iii) an Application Visibility and
Control (AVC) system. The combination of these
security applications will monitor and block
malicious activity and attacks - enabling highly
available industrial operations for maximum uptime
and secure productivity.
To simplify security administration, an easy to
use graphical user interface (GUI) must empower
operators to efficiently manage security policy and
protection profiles and include breakthrough drag
and drop virtual zoning for segmentation without
network disruption. The solution also needs to offer
full security visibility of the industrial network and
integration with Security Information and Event
Management (SIEM) tools.

Test, test, test


Once management has added such an OT
solution, the job is not over. To get into OT systems,
hackers leverage many different physical assets,
including those within the enterprise security system,
to gain access into entire system. They typically start
with elements which give them access to specific
computers. Interestingly, security people dont seem to
secure their own security equipment. For instance, IP
wireless cameras are favourite target of hackers. Card
readers in the access control system are also easy to
hack.
In this manner, hackers can then go after control
systems directly. Because of this, it makes sense to
employ a security and quality testing service to simulate
attackers challenging your own system, allowing you to
know yourself by making sure that you are controlling
who is talking to whom. Also, be sure to ask the
manufacturers of your mission critical devices if they have
been tested to repel cyber attacks. Have they had their
products monitored to both network and operational
parameters, allowing vulnerabilities to be discovered and
faults to be reproduced, isolated, identified and resolved
before they introduced this or these products to the
market? Are they certified to be secure?
Lastly, management needs to assure that the security
experts they hire are highly certified and trained to

carefully assess, design and implement OT security in


their industry environments. If the goal is to help secure
operational assets, reduce compliance penalties and
enforce supplier security, they need such expertise.

Many of
the devices
and
software
used in OT
are ten to
30 years
old. They
were
designed
to be
connected,
have
not been
patched
very often
and were
not
designed to
withstand
modern
attacks...

Needed - specific protections that ensure


operational technology security
Cyber attacks on oil and gas, utility, healthcare and
transportation infrastructures can result in significant
downtime and productivity loss. As a result, more and
more operations are now implementing an OT network
security solution that combines the protection of a
firewall, IPS and application visibility and control (AVC) to
monitor and block malicious activity and attacks to
ensure highly available operations for maximum uptime
and secure productivity. They are devoting as much
interest now to their OT and they have historically given to
IT.
www.wurldtech.com

Paul Rogers, President & CEO, Wurldtech


www.securitybuyer.com

ISB 039

EYEBROW

Mitigating risk to

transport infrastructure

Chris Phillips, consultant to Security & Counter Terror Expo and


former head of the National Counter Terrorism Security Ofce
(NaCTSO), looks at how recent events have affected transport security

espite sustained efforts from the international


community and individual states, instances of
terrorism shows no sign of abating. To spread fear
and disrupt everyday life, terrorists focus on the
most vulnerable in society by exploiting any
weaknesses that present themselves. The
techniques used by global terrorists are no doubt
evolving and whilst some will be more sophisticated, we have to bear in
mind that basic attacks with homemade weapons are always possible.
With the world on high alert the task ahead for security professionals
becomes ever more essential in securing the safety of the public.
Attacks to public transportation systems continue to be a main
feature of International terrorism. Recent examples include: Metrojet
Flight 7K9268 downed flying from Sharm el-Sheikh to St Petersburg,
Daallo Airlines Flight D3159 forced to make an emergency landing and
dual bomb blasts at Zevantem Airport and Maalbeek metro station in
Brussels. The impact of which left 30 people dead and many more
injured. Security professionals need to be even more focused on the
complex task of protecting state, local and private transport
infrastructure systems, whilst avoiding slowing the systems down to
make them unworkable.
There are a number of characteristic features that make transport
systems appealing to terrorists. The large number of people

040 ISB

congregating at a single location, ease of access to big cities and the


ability to travel across boarders are all contributing factors. As well as
this, the costly nature of the infrastructure in large cities adds an
economic and commercial significance that compels terrorists to
consider such facilities as potential targets. For these and many other
reasons, protecting the transport sector from attack is high priority.
Following the events of 9/11, air travel has been treated as a target
for terrorism. Yet, increased awareness and advanced security
protocol such as checks to baggage and identification at borders has
mitigated the threat. It is important that other transit modes and
terminals such as trains and buses together with ports, also focus on
the threat of terrorism.
The maritime sector has not been regularly targeted by terrorists at
this point. However, it is conceivable that terrorists may choose to
exploit the shipping industrys defences, and the concern over
hijackings of cargo or passenger ships, smuggling of weapons and
people trafficking is ever increasing. Evidence of such activity was
recently brought to light by counter-extremist think tank Queilliam, who
intercepted a document, allegedly written by Islamic State, containing
plans to target major commercial routes in the Mediterranean and
Europe.
Terrorists will stop at nothing to cause maximum damage and that

www.securitybuyer.com

TRANSPORT
EYEBROW

includes national and global infrastructure targets. It will


not be not lost on the terrorists that 90% of all global
trade moves by sea.
Events like Security & Counter Terror Expo are
essential as they bring together a diverse group of
professionals to exchange ideas in the hope of creating
a safer and smarter transport network for all.
As terrorists continue to adopt new tactics that help
them avoid detection and exploit new targets, the
security industry must seek to stay one step ahead by
investing in new technologies and intelligence solutions
in order to protect citizens from todays threats.
Transport Security Live will focus on discussing
effective solutions to these problems and ways in which
technology can be used to form effective preventative
measures. I recommend that members of the transport
industry attend shows like the Security & Counter Terror
Expo, which was held in London from April 19-20 2016.
The free-to-attend conference, running in Security &
Counter Terror Expo, at Londons Olympia,featured
international case studies and the latest development in
protecting transport networks, hubs and passengers
presented by leading figures in the industry.
Attendees heard key discussions regarding airport
and aviation security, including the potential for UAVs to
protect critical aviation infrastructure, maritime security,
boarder safety and mitigating the cyber risks in
intelligent transport systems.
More than 20 high ranking security professionals
spoke at the conference. Among these were: Dvir
Rubinshtein, Manager of the Aviation Security
Operation Centre at the Israeli Ministry of Transport;
Inspector Chris Boyle, Strategic Partnerships Prevent,
National Counter Terrorism Policing HQ; and Peter
Cook, CEO of the Security Association for Maritime
Industry.

The
maritime
sector has
not been
regularly
targeted by
terrorists
at this
point.
However,
it is
conceivable
that they
may choose
to exploit
the
industrys
defences...

I really enjoyed attending the Transport Security Live


sessions. I have no doubt that by bringing together a
variety of experts in the industry to provide insight on the
latest research and developments we can make the
work of terrorists more difficult.
Security & Counter Terror Expo is the event for
professionals from the public and private sectors tasked
with protecting against terrorism and delivering effective
security strategies. It comprises of a free-to-attend
exhibition, workshops, demonstrations and a high-level
paid for conference. Next years event will run from May
3-4, 2017.

Chris Phillips, Former Head of NaCTSO


www.securitybuyer.com

ISB 041

TRANSPORT

Modern trains
in harsh environments need
innovative safety solutions
ATrain in Stockholm secures and optimises its rail
service with a combination of Axis network cameras
and laser-based perimeter control from Embsec

Train AB owns and operates rail services between


Stockholm and Arlanda Airport. The trains, which are more
commonly known by the name Arlanda Express, operate on
the Arlanda Line, one of few privately operated railroad lines
in Sweden. ATrain currently owns seven trains and one train workshop.
The company decided in the summer of 2015 to install a camera
solution at train stations and depots to prevent crime and vandalism
and to enable the management of operative tasks, such as monitoring
flows of travellers, checking signs, elevators and escalators, and
making sure that the ticket machines are working.

Solution
Arlanda Express trains operate in a relatively harsh environment
used frequently by a lot of people. The challenge was to find good
locations for the cameras and make sure that these locations actually
covered all the areas that needed to be monitored.
Another challenge to overcome was the lighting conditions, which
would require high-quality cameras. The solution chosen was a
combination of Axis network cameras and Embsecs laser-based
perimeter control, VFence.

Result
ATrain has zero tolerance when it comes to graffiti and vandalism.
Besides the high costs for cleaning the trains, there is also a
considerable risk of injury to the perpetrators of these crimes, as there
are high-voltage power lines in the areas around the tracks and depots
which could easily lead to hazardous situations. After the cameras and
VFence were installed, only two incidents have occurred and both of
these could be averted in time without vandalism or accident.

Zero tolerance for graffiti and vandalism


ATrain has 180 employees, including train drivers, train attendants
and operations management personnel. Seven Arlanda Express trains
operate on the Arlanda Line between Arlanda Airport and Stockholm
Central Station. ATrain is responsible for safety and security at four
stations three at the airport and one at Stockholm Central Station.
There is also a dispatch centre at Stockholm Central Station, where up

ANOTHER CHALLENGE TO OVERCOME


WAS THE LIGHTING CONDITIONS, WHICH
WOULD REQUIRE HIGH-QUALITY
CAMERAS...
042 ISB

www.securitybuyer.com

TRANSPORT

CLEANING
VANDALIZED TRAINS IS
A HUGE EXPENSE,
AND HAVING
GRAFFITIED TRAINS
OPERATING ON THE
ROUTE IS DAMAGING
TO OUR BRAND. WE
ARE PROUD OF OUR
TRAINS...
to six people perform real-time
surveillance of the camera monitors
that oversee the stations and depot.
In addition to enhancing safety and
security for passengers and staff, the
aim of installing the cameras was to
prevent graffiti and vandalism to the
trains. This has been a problem,
particularly at night when the trains are
at the depot.
Cleaning vandalized trains is a huge
expense, and having graffitied trains
operating on the route is damaging to
our brand. We are proud of our trains,
which have a high standard and awardwinning design, says Jimmy Ahl,
Safety and Security Director at ATrain.
ATrain has a zero-tolerance policy for
these types of occurrences. They
simply must not be allowed to occur.

Cameras in combination with


laser-based perimeter control
Axis partner NOKAS was contracted
to investigate how technology could
help achieve this zero-tolerance vision.
The solution that proved to meet all of
the requirements was a combination of
Axis network cameras and Embsecs
VFence F-501 laser-based perimeter
control. The system monitors stretches
along the train routes that need
perimeter control, but where physical
protection could not be set up. The
solution is simple, powerful and fully
automated. The laser-based perimeter
control sensor VFence F-501 detects
passing people and objects at a
distance of up to 500 meters. The laser
sensor functions without reflections
and detects both static and moving
objects, regardless of lighting
conditions.
The laser sensor is connected to Axis
cameras and an alarm is sent directly to

www.securitybuyer.com

the camera when a laser beam is


broken or a reference point changes.
The moving camera is aimed at the
occurrence, recording begins and
action can be quickly taken.
The components in this system are
really top of the line. They meet the
stringent requirements of this harsh
and sometimes dangerous
environment. With this modern
technology, we feel very confident that
we are giving our passengers and our
employees the security and service
they expect, says Jimmy Ahl, Safety
and Security Director at ATrain.
In an environment like this, high
precision and reliability are everything.
We cannot accept too many false
alarms, says Johan Elliott, Key
Account Manager at NOKAS.

Complicated lighting
conditions and requirements
for easy installation
Axis cameras must also be able to
handle the complicated lighting
conditions, backlighting and light/dark
parts of the screen that are common
scenarios at a station. In these cases,
an AXIS Q6045 Network Camera with
Wide Dynamic Range is used. In
addition to perimeter control, the
camera can also be zoomed and
controlled to check that signs, ticket
machines, elevators and escalators are
functioning correctly. This helps us
provide even better service to our
passengers, says Jimmy Ahl.
Installation was very simple. It
always is with Axis cameras hardly
any adjustment is ever needed. It is
right the first time not after ten
attempts, which can be the case with
other types of cameras, says Johan
Elliott. At the same time, maintenance
on this type of product is not easy.
Operation and maintenance are
demanding and costly, and that defines
what technology we use. It has to be
reliable, he continues.
Two incidents have been averted
since the solution was implemented in
summer 2015. ATrain plans to expand
the system and feels that their zerotolerance vision has already become a
reality.
www.axis.com

ISB 043

EYEBROW

Protecting
critical
infrastructure
for the London
Underground
Thermal imaging helps to
protect critical depots
serving Europes largest
underground railway

ver 4.2 million people use the


London Underground each day.
Although not often visible to
customers, during the night
thousands of people are also busy at work to
ensure that the signalling, tracks and other
critical infrastructure is maintained and upgraded
to meet increased demands placed on the Tube
network.

depots location while addressing the need


to maintain 24 hour a day access with full
audit of who has accessed the site and what
equipment had been removed. LU were also
keen to avoid using cumbersome pan-tiltzoom cameras and external housings while
still ensuring the site was always covered
while using the least number of devices to
increase reliability of the system.

London Underground (LU) maintains


hundreds of facilities across the capital providing
access to tracks and tunnels, along with highly
specialist equipment and spare parts needed for
both routine maintenance and ongoing
improvement work.

To this end, Vicom, a highly regarded


systems specialist with a number of
successful rail sector projects under its belt
proposed an innovative solution utilising a
combination of MOBOTIX thermal and
hemispheric cameras utilising advanced
analytics with local access control with
remote monitoring.

Critical depots requiring constant access


Many of these depots and goods-yards are
often alongside track areas and need to be
accessible 24 hours a day, sometimes at short
notice, to allow engineering teams to carry out
their tasks. The loss of specialist equipment
through theft can impact the entire network as
certain items are custom made for London
Underground requiring manufacturing lead times
of up to 20 weeks.
Although depots offer convenient access, the
trackside location places some restrictions on
how these locations are secured.

Hemispheric technology delivers


maximum visibility
A project to secure a London Underground
depot required innovative solutions, and needed
to take into account the limitation imposed by the

044 ISB

By using MOBOTIXs decentralised


concept and dual lens cameras, the
proposal would dramatically reduce the
number of cameras deployed on the site
compared to other options while providing
intelligent analytics able to detect site
intruders during the day and night without
the need for external perimeter lighting.
Vicom carried out a detailed site survey
and capability test to ensure that the site
could be monitored both day and night.
Due to the dual lens capabilities and
hemispheric models, the entire site was
designed to be secured using just 6
cameras. The system is also integrated
alongside IP Access Control, Intruder
Alarm and Public Address Systems which
are remotely monitored 365 days a year by
an NSI Gold Alarm Receiving Centre (ARC).

The whole project including exhaustive


testing and sign-off phases took just 12
weeks to complete.

Significant return on investment


The flexibility of the system means that
different areas can be armed independently
while the thermal imaging combined with
MOBOTIX MxAnalytics system built into
each camera can detect movement and
emit an audible alarm, warning the intruder
to leave the area. MxAnalytics also makes it
possible to track the movement of people
and objects in the image, and collects
statistical behaviour data to maintain a
complete audit of site activity.
As John Hinds CEng MIET, a Senior
Telecommunications Engineer for London
Underground explains: The system allows
us to effectively secure the depot and gain
access whenever we need.
Since implementation, the system has
been effective, with only some minor
remedial work required to secure the site
against the encroachment of urban wildlife
such as foxes that occasionally trigged
alarms which were quickly identified on
closer inspection of the actual footage.
This has proven a successful project,
says Hinds, and based on the results, it is
an approach we could consider adopting at
other sites across the Capital.
www.mobotix.com

www.securitybuyer.com

Video is security
and so much more

Security Buyer and Bosch explore how the latest


camera technology is helping retailers maximise
their bottom line and create real business value

n the retail industry, shrinkage is


one of the most important
challenges for every company. On
a global basis, shrinkage cost
retailers some 110 billion Euros in
2015 alone1. About half of the
damage is done by thieving
customers, but employees have a huge
share as well. In Germany, dishonest
employees account for approximately 4%
of all thieves being caught, but are
responsible for more than a quarter of the
losses2. A lot of that is due to so called
sweethearting, where employees operating
cash registers give away merchandise to
friends and family without charging them.
Even suppliers must be taken into account
- almost 5% of all the damage is allotted to
merchandise never even making it to the
shelves2.

www.securitybuyer.com

Given the fact that retail is a very competitive


market with relatively low margins, it becomes
very obvious that retailers in all market
segments must invest into suitable
technologies to reduce shrinkage as an integral
part of their overall safety and security strategy.
The primary goal of such a strategy will always
be to provide optimal safety for staff, customers
and suppliers with fire detection technologies
being the heart and soul of the system.
However, the need for video surveillance
solutions is obvious to deter strangers from
unauthorised access, monitor suspicious
activities and identify potential criminals. As not
all thieves come during store hours, an intrusion
detection system may also be necessary. And
once such an intrusion detection system is in
place, it can even double up as a real money
saver when you implement additional detectors
on freezer and fridge doors in a grocery store as

they will alert staff when such doors are still


open as the system is being armed for the night.
Integration of different safety and security
systems by means of a central management
system can greatly increase security levels and
operational efficiency, as video can then
automatically be used to verify alarms from the
other systems.
While fire protection is generally required by
law and the related investment thus
unavoidable for shop owners, the installation of
other security systems is usually driven by
business decisions alone. A common endorser
for the installation of such systems is a crime or
security incident that captures the attention of
retail management. However, more and more
often the mere potential of such incidents calls
for state-of-the-art technologies to prevent
crimes in the first place.

ISB 045

RETAIL

Prevention and detection


When talking about shrinkage and security
in a retail environment, video surveillance is
usually the first thing to come into mind. For a
good reason: Video surveillance can both
prevent theft and help to identify thieves after
the act, once prevention has not driven them
away. It can be used to identify suspicious
behavior on the shop floor just as it can
secure non-public areas such as warehouses
or offices. And while one or two general
purpose cameras may be sufficient to secure
a small retail outlet, there are also
sophisticated and specialized solutions for
monitoring of cashiers desks, outdoor areas,
parking lots, warehouses and other parts of
the premises. So it is little wonder that some
sort of video surveillance can be found in
almost every retail store around the globe.
However, not all of them make full use of the
potential of todays camera technologies.
These have greatly improved over the last
couple of years, mainly due to digitalisation.
State-of-the-art cameras can not only deliver
brilliant high resolution images even under
challenging lighting conditions; they also offer
streamlined management and operations,
resulting in reduced cost of ownership
specifically in larger outlets and chains.
Finally, built-in video analytics in network
cameras can act as an enabler of entirely new
applications beyond mere surveillance,
offering real business benefits.
As one would expect, image quality and
thus resolution has been one of the major
areas of the vendors attention. But while we
have experienced really dramatic increases in
resolution in digital consumer products, the
development has been somewhat slower with
surveillance cameras. There is a simple
reason: Images of surveillance cameras have
to be managed, transmitted and analyzed in
real time, and usually they must be stored and
kept for a certain amount of time. It is not
uncommon for the storage system alone to
account for half the cost of a video
surveillance solution, and transmitting high
resolution images in real time puts a lot of
burden on the underlying network. This is why
current developments do not focus on
resolution alone, but also on advanced
technologies to reduce the data volume
associated with video surveillance without
losing relevant image information.
Today, a lot of current surveillance cameras
offer HD or even 4K ultra HD resolution with

046 ISB

WHEN TALKING ABOUT SHRINKAGE AND SECURITY


IN A RETAIL ENVIRONMENT, VIDEO SURVEILLANCE IS
USUALLY THE FIRST THING TO COME INTO MIND.
FOR A GOOD REASON: VIDEO SURVEILLANCE CAN
BOTH PREVENT THEFT AND HELP TO IDENTIFY THIEVES
AFTER THE ACT, ONCE PREVENTION HAS NOT DRIVEN
THEM AWAY...
up to 8 megapixels. Such cameras can deliver
very detailed images, greatly improving the
operators ability to detect suspicious activity.
Further, new developments such as Boschs
starlight technology have brought a
breakthrough in light sensitivity in cameras;
showing color images where traditional
cameras can show only black and white and
showing black and white where others show
no image at all. While such technologies may
not be required on the well lit shop floor during
store hours, they can offer tremendous
benefits when outdoor areas and storage
rooms must be monitored as well.

video quality. By applying the Bosch Dynamic


Transcoding Technology, High resolution
images can be viewed from any location that
has access to the internet, even if you have a
slow mobile internet connection. The video
streams can be viewed from Android/iOS
devices or browser, a free Bosch Viewing
Client, or the Bosch Video Management
System. This technology can be specifically
interesting for smaller outlets without a 24/7
monitoring center, but will also offer very
valuable information to security staff or police
during their approach after an incident.

Another interesting development for


retailers is the advent of panoramic cameras.
With their 180- or 360-degree overview in a
single image they solve the well known
problem of blind spots. Panoramic cameras
for both indoor and outdoor environments are
readily available from Bosch with resolutions
of up to 12 megapixel and 30 frames per
second, offering high quality video around the
clock. They allow to easily capture moving
objects, significantly improving the
performance of the video surveillance
solution. Combined with Bosch Video
Security Client software the user can select
up to six different viewing modes.

Video analytics

Breakthrough imaging
Bosch IP cameras come with Content
Based Imaging Technology (CBIT). This
Bosch innovation intelligently combines
information from the sensor, image pipe,
encoder and its video analytics to dynamically
optimize the image for every scene. An option
enabled by CBIT and available on selected
cameras is Intelligent Auto Exposure (IAE),
which ensures the perfect picture in every
situation. Intelligent Dynamic Noise Reduction
technology (IDNR), which is standard in all
Bosch IP cameras, reduces the bitrate by up
to 50 percent by cleverly optimizing the detailto-bandwidth ratio without compromising

Building intelligence into the camera cannot


only deliver better images but also greatly
improve manageability of data, overall
security and forensics. Todays networkbased monitoring and video content analysis
enable a significantly more accurate detection
of incidents, as lack of concentration and
other human errors are excluded from the
outset. Second, they make the security staff
more efficient, since operators only have to
respond to alerts rather than continuously
monitor a huge number of live images. This
allows operators to spend more time on other
tasks. Accuracy and speed are increased
using metadata instead of the actual video
recordings. Such metadata are small text
strings describing objects or movements
which are much smaller than the images
themselves and can be searched fast and
automatically.
Advanced video analytics, like Intelligent
Video Analysis from Bosch, also allows the
configuration of reference objects. In this
case, all relevant object data such as size,
speed, and color in a selected live scene are
detected with a single click on the object in
question. This information can then be used
as criteria for tracking similar objects. Thus,
operators can quickly follow a suspect as he
moves along the shelves.

www.securitybuyer.com

RETAIL

Adding business value with video

marketing.

Going way beyond security applications,


Intelligent Video Analysis can also act as an
enabler of entirely new application in retail
environments. Few of these can be found in
real world stores today, but they will clearly
pop up over the next couple of years as they
can offer tremendous added value without
the need of substantial investments. One
example is a combination of crowd detection
and movement analysis which can deliver
useful information for the optimization of the
shop layout. With similar algorithms you can
analyze the acceptance of special offers and
events. Integrate such a solution with your
POS systems, and you will even be able to
calculate conversion rates. While the POS
application knows exactly how many of these
cool new headsets you have sold, intelligent
video will also tell you how many customers
have shown interest in them without finally
buying. Maybe for them, the product was just
a bit too expensive and you might be able to
optimize profits by slightly reducing the price.
On the other hand, very high conversion rates
can be an indicator that you could even
charge a bit more. In the long term, data
generated by Intelligent Video Analysis could
play an important role in improving in-store

Chains can also use statistical data from


intelligent video surveillance to benchmark
their individual outlets or to directly compare
how different presentations of goods
influence customer acceptance. In a move
towards Retail 4.0, such benchmarks and
comparisons could also include the chains
online store.
Customer service is another interesting
playing ground if you want to improve your
retail business. Crowd detection will alert the
management when the check-out is not
appropriately staffed and customers have to
wait, enabling fast reaction and thus a better
shopping experience for the customer. If a
camera identifies an individual staying
substantially longer than average in front of
shelves with high priced items, chances are
that this customer will need some attention either to help or to avoid theft. Finally, in large
shopping malls or in shop-in-shop
environments, one vision is to empower the
mall operator to develop rental charge
schemes based on real and proven traffic. In
addition, such data can be used to detect
bottlenecks and hotspots and thus to improve
space utilisation within the mall.

CHAINS CAN ALSO USE STATISTICAL DATA FROM


INTELLIGENT VIDEO SURVEILLANCE TO BENCHMARK
THEIR INDIVIDUAL OUTLETS OR TO DIRECTLY COMPARE
HOW DIFFERENT PRESENTATIONS OF GOODS
INFLUENCE CUSTOMER ACCEPTANCE...

www.securitybuyer.com

Footnotes
1: Global Retail Theft Barometer 2014-15 http://www.globalretailtheftbarometer.com/
2: Global Retail Theft Barometer 2011 - http://
www.retailresearch.org/grtb_currentsurvey.
php[Technology Showcase]

No more blind spots


With FLEXIDOME IP panoramic cameras
from Bosch, store owners will never miss
anything again. The FLEXIDOME IP
panoramic 7000 MP indoor camera offers a
full 180-degree or 360-degree overview of a
particular area with 12 megapixel sensor
resolution at 30 frames per second combined
with a fish-eye lens. For indoor and outdoor
applications, the FLEXIDOME IP panoramic
5000 MP offers the smallest 360-degree
dome design available on the market
combining a five megapixel sensor resolution
at 15 frames per second with a fish-eye lens.
Both camera models ensure a complete
overview in a single image without blind spots
and the easy capture of moving objects,
significantly improving the performance of
retail video surveillance solutions. Combined
with the Video Security Client software, the
user can select up to six different viewing
modes. The FLEXIDOME IP panoramic 7000
MP camera features a full suite of on-board
intelligent video analytics to ensure that
operators are alerted when needed and
relevant information is delivered most
efficiently both live and in retrospect.
www.boschsecurity.com

ISB 047

RETAIL

Ochtum Park Outlet Centre protected with


Panomera multifocal sensor camera technology
Ochtum Park Factory Outlet Centre in the German city of Bremen relies on Panomera multifocal
sensor technology from Dallmeier to safeguard its outdoor premises, along with thousands of shoppers

nyone who has ever paid their


respects to the Town Musicians of
Bremen and then wanted to do a
little shopping is in exactly the right
place in Ochtum Park. Over 50 businesses
occupying an area of 22,000 square metres
attract 2.5 million visitors every year. World
leading brands like Esprit, Nike, Puma,
Tommy Hilfiger or Fossil, many restaurants
and free parking all combine to make Ochtum
Park a real shoppers paradise.

Complete and discreet


In order to provide the most effective
protection possible for the entrances and
exits as well as the outdoor and car parking
areas, the decision was taken to install the
most modern video security equipment
which should also be discreet and
unobtrusive, as recounted by Sebastian
Khne, the spokesman for the owners: We
wanted coverage of the outdoor areas to be
as complete as possible, but without having
to install huge numbers of cameras. After all,
we want our visitors to feel comfortable here,
not as if they are constantly being watched.

048 ISB

ONE OF THE CHALLENGES WE FACED AT OCHTUM


PARK WAS THAT WE WERE ASKED NOT TO UNDERTAKE
ANY LARGE-SCALE CABLE LAYING TO TRANSMIT THE
IMAGES TO THE SECURITY OFFICE...
Ochtum Park found the solution in the
Panomera multifocal sensor technology
from Dallmeier. With its patented camera
technology, which unlike single sensor
cameras works with multiple lenses, this
system can monitor a huge expanse in the
highest possible resolution from a single
installation location. And in addition: The
cameras have been painted the same RAL
colour as the building faades, so they blend
discreetly with the overall image, explains
Dirk Lders, Sales Manager with Dallmeier
and joint manager of the Ochtum Park
project.
The concept for video protection was
prepared by Dallmeier in cooperation with the
design and engineering consultancy IfaS
(Institut fr angewandte Sicherheitstechnik Institute for applied Security technology), and
the cameras were then installed by the
company Freihoff.
One of the challenges we faced at Ochtum
Park was that we were asked not to undertake

any large-scale cable laying to transmit the


images to the security office explains
Christian Linthaler, Sales Manager with
Dallmeier. So we set up a wireless local loop
to carry the streams.

Good visibility in
low light conditions
A major consideration for Ochtum Park was
that the cameras should be extremely
sensitive to light, so that they would still deliver
detailed image material with high colour
fidelity even at night with poor light conditions.
For this reason, the Panomera Nightline
series was chosen, because it is equipped
with the very latest generation of image
sensors and encoders, which is highly
sensitive to light and infrared radiation. The
Nightline cameras are equipped with an
ambient light sensor and a removable IR cut
filter and can switch between day and night
mode automatically. They are ideally suited to
situations in which exceptional contrast,

www.securitybuyer.com

RETAIL

Completely satisfied
The system was commissioned in the
presence of representatives from the
designers, the installer, the manufacturer and
of course the end customer. The cooperation
between the individual companies worked
well, and we have the feeling that we are in
good hands, says Sebastian Khne. And his
final word on multifocal sensor technology is
just unequivocal: There would not have been
any other camera system that can cover such
enormous expanses from so few installation
points.

About Dallmeier

brilliant clarity and high colour fidelity even in


poor light conditions, or exceptional infrared
sensitivity for outstanding results in night
mode are required. We can identify
individuals from a distance of 160 m, and
even read car licence plates at night. The
resolution is really incredible, Sebastian
Khne gives voice to his enthusiasm.
The MFS systems are supplemented with
IP cameras with integrated infrared
illumination, which is assured with semidiscrete 850 nm high-performance LEDs.

Dallmeier has at its disposal more than 30


years of experience in transmission, recording
as well as picture processing technology and
is an outstanding pioneer of CCTV/IP
solutions worldwide. This profound
knowledge is used in the development of
intelligent software and high quality recorder
and camera technologies enabling Dallmeier
to not only offer stand-alone systems, but
complete network solutions up to large-scale
projects with perfectly integrated
components. Right from the beginning the

company always focused on own innovative


developments and highest quality and
reliability. Dallmeier is the only manufacturer in
Germany that develops and manufactures all
components on its own. This includes the
entire product range, from cameras to picture
storage and transmission to intelligent video
analysis and even individually adjusted
management systems.
Over the years, Dallmeier has repeatedly
given fresh impetus to the market with new
developments and extraordinary innovations.
The worlds first DVR for example, which
introduced digital recording to the entire
CCTV industry, came from Dallmeier. The
multifocal sensor system Panomera will
have a similarly groundbreaking effect: This
unique and novel camera technology will
revolutionise the market and open up
completely new possibilities to the video
security industry. This and the extensive
experience in the CCTV and IP field have led
to a top position in the international market for
digital video surveillance systems.
www.dallmeier.com
www.panomera.com

Reliable recording
The camera images are recorded on
multiple Dallmeier IPS 2400 appliances. The
IPS 2400 is a powerful video appliance with
integrated storage system for reliable
recording and storage of the video material.
The Smavia Recording Server recording
software is already preinstalled. The IPS 2400
includes high-performance server hardware
with a multi-core CPU. The integrated storage
system (8x 3.5 hard disks) offers ample
storage capacity. A sophisticated hardware
concept and perfectly synchronised
components also enable rapid storage
speed. With the EasyChange functionality,
hard disks can be replaced quickly and
simply from the front of the device. The IPS
2400 has been certified by LGC Forensics,
which means that image material obtained
with this equipment is admissible as evidence
in a court of law.
The video streams are analysed centrally in
the security office at Ochtum Park.
Operation is really simple and intuitive,
Sebastian Khne says.

www.securitybuyer.com

ISB 049

EYEBROW
GOVERNMENT

Total control for


Jordans Houses
of Parliament
150 elected representatives in the national parliament
benet from a new 100-strong network of cameras

very government around the world takes the safety and


security of its elected representatives and personnel
extremely seriously. This is certainly the case in Jordan
where the 150 elected Representatives in the national
parliament recently benefited from a complete upgrade of their CCTV
surveillance system. The over-100-camera Hikvision system now
secures all aspects of the imposing House of Representatives and its
grounds and has proved a resounding success, although only being
allowed three hours access per day gave the installation team a bit of
a headache.

Introduction
The Hashemite Kingdom of Jordan, situated on the eastern bank
of the Jordan River that separates it from its neighbour, Israel, is
widely recognised as a beacon of stability and parliamentary
democracy in the Middle East. The current monarch, King Abdullah
II, holds wide executive and legislative powers, sharing them with the
Parliament of Jordan that was established in 1952. The legislature
consists of two separate houses: The 75-member House of Senate
(Majlis al-Aayan), all of whom are directly appointed by the King, and
the 150-member House of Representatives (Majlis al-Nuwaab),
which is elected.
Like almost all legislatures around the world, when the House of
Representatives is in session it is thronged with its own members,
their advisors and officials, foreign dignitaries and their diplomats and
officials, plus advocates and visitors. Therefore, when the House of
Representatives Security Team decided that the CCTV system
needed a complete overhaul, it was not only concerned with rapidly
installing a system that would protect and secure the building and all
its people within a well-defined budget but also with allowing the
business of government to continue as normal. As a result, access
for the design and installation team was severely restricted.

050 ISB

The house was functional throughout the period during which we


had to complete the CCTV installation, says Ammar Awamleh, IT
Manager at the House of Representatives. Therefore, we were limited
to a mere three-hour window on each day for the installation and the
implementation team was under pressure to plan and execute
accordingly. It was quite a challenge, as was the need for the system
design to provide full CCTV coverage of vital areas of the building,
including several key offices, the House of Representatives data
centre, as well as the main wall surrounding the entire complex.

The solution
Hikvision was chosen to design and implement the CCTV
surveillance system and came up with an over-100-camera solution,
with each camera connecting to one of four 64-channel DVRs in the
main control room. The solution was also notable in electing to use

www.securitybuyer.com

GOVERNMENT

nine different types of IP network camera chosen


from the Hikvision Easy IP and SMART IP series.
According to Ammar Awamleh, Despite
budget constraints, a high level of coverage of
the main building and all its grounds and
entrances was an absolutely key
requirement of the new system and we
made extensive use of Hikvisions 1.3MP
and 3MP 2-series IP cameras in order to
achieve this. Around 100 2-series cameras
were deployed, mostly DS-2CD2312-I and
DS-2CD2332-I Outdoor Network Mini Dome
cameras but supplemented with nine
DS-2CD2212-I5 and DS-2CD2232-I5 EXIR Bullet
cameras.
The Mini Dome cameras were a perfect choice:
the low profile fitting in discretely while offering true
day/night functionality with 30m IR range, IP66
environmental protection and 3D DNR, DWDR and
programmable backlight compensation for excellent
video quality. In particular low-light situations we
chose to deploy the EXIR bullet cameras, their
extended 50m IT range proving a real asset.

Smart surveillance
In addition to the Easy IP series cameras, a variety
of Hikvisions SMART IP 4-series cameras were
installed to survey individually selected key
infrastructure points.
We recognised that the Smart features, such as
Smart face, audio and intrusion detection, would
greatly assist our control room personnel in
recognising potential threats, says Ammar
Awamleh. Whats more, the Smart codec, Smart IR
and Smart VQD (video quality detection) is invaluable
in areas where video quality is vital.

THE MINI DOME CAMERAS WERE A PERFECT


CHOICE: THE LOW PROFILE FITTING IN
DISCRETELY WHILE OFFERING TRUE DAY/
NIGHT FUNCTIONALITY...
supporting up to 256 connections, give us room for
further expansion, says Ammar Awamleh. Also, the
iVMS-4200 software provides a powerful and
complete solution to our video management needs.
Smart and Open, it allows us to freely access the
huge quantity of video data we are now collecting,
being very easy to use and requiring minimal training
to operate.

Total control
Special mention should also be made of the
DS-2CD4065F 6MP Smart IP Box cameras, five of
which were deployed to provide much needed
coverage on the main wall. Each is capable of
providing three independent video streams and the
digital zoom in these cameras is excellent.

Inside the control room


Inside the manned control room, which operates
24/7, the powerful i7-powered PCs access the four
DS-9664NI-XT 64-channel NVRs using Hivisions
iVMS-4200 video management suite.
These high-end NVRs were chosen to fully
support the 6-megapixel resolution of the Smart box
cameras that keep watch on the main walls and, in

www.securitybuyer.com

Although the process of installing the new system


within the stringent time-constraints was very
challenging, the new solution has proved to be a
resounding success, with previously vulnerable key
areas of the building now under full, round-the-clock
coverage from the Hikvision equipment, concludes
Ammar Awamleh. A small expansion is already
planned and we have also recommended Hikvision
to other projects holders.
I can confidently state that the Hikvision CCTV
solution provides total control over the site and has
made life much easier for the buildings security
team.
www.hikvision.com

ISB 051

Banking security:
Rapid change in technology
leads to uncertainty over threats
Security Buyers Chris Beck speaks to James SomervilleSmith, EMEA Channel Marketing Leader at Honeywell
Security & Fire, about the latest trends in banking security

How have security threats in


banking changed in recent years?
The integrity of Chinese Walls has
become a security concern for the banking
sector in recent years. Financial regulation
requires financial institutions to put up
Chinese walls to safeguard against insider
trading, and separate the public and private
sides of their business. Banks face expensive
fines if they fail to keep these measures
secure - just earlier this year for example, a
UK stockbroker was fined 1.2m for failing to
maintain an effective wall. The increasingly
fast-paced world of finance, where staff
turnover is so high and employees switch
between teams frequently, presents a

052 ISB

challenge for ensuring information barriers


are always up to date. This puts banks at
serious risk of security breaches, as well as
the regulatory repercussions.
Another trend shaping the sectors
approach to security is the changing nature
of high-street banks. Retail banks are shifting
to a more modern, dynamic environment that
is much more open, welcoming and enticing
for customers, but presents challenges for

their security teams. Traditional security


procedures, such as the placement of
security cameras and alarm setting, need to
be updated to accommodate new layouts.
Gone are the days when cameras can just be
pointed at cashiers behind their glass
screens and ATM machines - as more
employees take to the floor with tablets,
banks are faced with a significant challenge
to ensure their employees and assets are
protected.

ANOTHER TREND SHAPING THE SECTORS APPROACH


TO SECURITY IS THE CHANGING NATURE OF HIGHSTREET BANKS...

www.securitybuyer.com

BANKING

traditional bank, greater camera resolution


increases the likelihood of spotting and
identifying a thief. Higher image quality is also
vital for providing evidence to aid prosecution.

Is there more awareness


of the importance of security
in the banking industry, both
from the banks themselves
and their customers?
There has always been a high level of
awareness within the banking industry
regarding the importance of security. Banks
have spent millions on the protection of their
assets and people and will continue to focus
their resources on security. However, the
threats in the sector are changing and it is vital
that those responsible for security and
revenue protection are one step ahead. Retail
banking is changing with many banks closing
branches and focusing on unmanned money
transactions. ATMs are used for both
withdrawal and deposits but currently there is
very little to stop a criminal from tampering
with the machines or targeting a customer.
There is certainly more awareness of the
potential risks of unmanned properties and
there have been efforts to educate customers
but banks now need to go further to ensure
the assets and customers are kept safe.

How has technology had to


adapt to these changing threats?
Access control technology is increasingly
being adapted to aid financial institutions in
securing their Chinese walls. In financial
services, access control has traditionally
been used for the purposes of external
security, blocking intruders and keeping
contractors out of certain areas. But this
technology also provides the means to seal
off sensitive areas, and ensure only
employees with a certain level of clearance
can access them. Similarly, it has also
become vital for access control systems to
integrate with IT systems, ensuring that only
those who have first badged in to a particular

www.securitybuyer.com

room can access the IT


infrastructure there. This is
essential for ensuring
companies remain compliant
with financial regulations.

CYBER-ATTACKS ARE
INCREASINGLY A BIGGER THREAT
TO BANKS. BUT ALTHOUGH CYBER
SECURITY IS AND SHOULD BE A
CRUCIAL ASPECT OF EVERY
BANKS SECURITY SYSTEM,
PHYSICAL SECURITY IS STILL
INCREDIBLY IMPORTANT...

As retail banks change their layout, their


security systems are evolving to advanced
video solutions. Video analytics technology,
for example, is increasingly used to monitor
the movements of customers and staff in
store, and alert the teams to any behaviour
that appears anomalous. Stores are also
investing in higher-specification cameras,
which is essential for pinpointing the
perpetrators of theft. In busy spaces where
people move around more dynamically than a

With the growth of online banking


and, with it, the risk of cyber-attack,
do you think the days of oldfashioned bank robberies are over?
Cyber-attacks are increasingly a bigger
threat to banks. But although cyber security is
and should be a crucial aspect of every
banks security system, physical security is
still incredibly important. Unfortunately, even if
an organization invests millions in a state-ofthe-art cyber security solution, they can still
be vulnerable to data theft.

ISB 053

BANKING

If an intruder accesses a banks


premises, its possible for them to
download confidential information,
or steal a device such as a laptop or
smartphone to access data. A
robust physical presence is essential
to ensuring cyber security can
operate effectively. Banks and other
financial institutions must invest in
robust access control and video
surveillance security to prevent
people without the correct authority
from logging onto a computer, and
capture vital video footage if these
safeguards are sidestepped.

Does the security industry


need to do more to educate
banks and customers about
the risks involved, and how
they are changing?
The rapidly changing nature of
security threats in the financial
industry can leave banks uncertain
over what to prioritise in their
security system. This is why the role
of the security specifier has never
been more important, educating
banks to new threats and ensuring
they have the most robust systems
in place to meet their needs.
For many years, independent
specifiers have been essential in
helping customers navigate the
complexities of new security
technologies. Specifiers working in a
heavily regulated industry like

THE RAPIDLY CHANGING NATURE OF


SECURITY THREATS IN THE FINANCIAL
INDUSTRY CAN LEAVE BANKS UNCERTAIN
OVER WHAT TO PRIORITISE IN THEIR
SECURITY SYSTEM...
financial services have a
responsibility to ensure they are up
to date with the latest threats facing
the industry, as well as how new
technologies can best be
implemented to meet regulatory
requirements. In turn, the security
industry more broadly has a
responsibility to ensure specifiers
have the solutions available to meet
this consumer demand, as well as
provide the supporting materials
and training sessions necessary to
ensure specifiers have the
confidence they need to
recommend these systems to
customers.

How will the threats evolve


in the future, and how will
technology have to change?
The closure of branches and
move to unmanned properties is
reflective of the changing face of
retail banking. ATMs within sealed
off sections of banks such as the
foyer are becoming more popular
and with these changes comes a
host of potential security
vulnerabilities. ATMs are vulnerable

to mechanical tampering and


without staff present as a deterrent,
criminals have more time to operate.
However, developments in remote
monitoring with two way audio,
linked to video analytics would allow
central control rooms to identify
suspicious activity quickly in bank
lobbies and issue a warning that the
people are being watched.
In addition, new banking
standards have come into effect that
are designed to safeguard the
perimeter of properties from cyber
threats. New standards will mandate
that external security solutions are
not connected directly to the internal
infrastructure meaning that any
tampering of external equipment
such as card readers or cameras
does not jeopardise the wider
system or the integrity of information
on the system. Card readers that
simply grant or deny access and
analogue rather than IP cameras will
provide the means to ensure that the
external devices cannot be used as
an access point to attack the
companys IT system.

The
closure of
branches
and
move to
unmanned
properties
is reflective
of the
changing
face of
retail
banking.
ATMs
within
sealed off
sections
of banks
such as the
foyer are
becoming
more
popular
and wtih
these
changes
comes a
host of
potential
threats...

www.security.honeywell.com

James Somerville-Smith, EMEA Channel Marketing Leader, Honeywell Security & Fire
054 ISB

www.securitybuyer.com

BANKING

The people of Pune:


Vivotek IP cameras secure Cosmos Bank
Cosmos Bank is the second oldest bank in India, and its Pune
branch was secured by a range of VIVOTEK surveillance cameras

ocated in the West of India, Pune


has long been a cultural and
financial heart of Maharashtra.
Though the Maratha empire was
conquered by the British in 1819, many
upper class Puneites seized the chance to
adopt British culture during the colonial era,
which brought many local elites into
leadership roles and set the foundation for
Pune to again become the cultural centre of
Maharashtra. Today, thanks to its proximity
to Bombay, Pune has sustained its long
tradition of economic prosperity. To add to
this, Punes reputation as an educational
centre has attracted students from all over
the world and earned Pune the title the
Oxford of India. Of course, to keep this great
city working, a financial heart is needed.
Punes Cosmos Co-operative Bank is that
financial heart.
Established in 1906, the Cosmos
Co-operative Bank is the second oldest &
second largest bank in India. The Bank has
recently completed a glorious 109 years of
service and attained multi state status in
1997. Cosmos Bank operates a huge
network of 140 branches in India spread
across seven States and in 39 major cities. In
Pune, Cosmos Bank is located on the
University Road, which is at the heart of the
city. Considering the scale of the city of
Pune, and the location of the Cosmos Bank,
any security system needed to be both up to
date, and ahead of the field.

centre of Pune. Given that Pune is a dense


and complex city with a population of five
million people, there are many exterior
factors that have to be considered when
setting up a security system for the bank.
Thus, a high level of risk and threat
assessment was required before designing
the risk mitigation strategy for the Cosmos
bank. Three key risk areas were identified:
threats to people; to property; and to the
image of the Bank. In order to come up with
a complete security system to minimise the
risk impact, Cosmos bank engaged
professional Bajaj Electricals for the design,
engineering and solution implementation.
The Bajaj Electricals first went through the
study of the plans, in order to distinguish the
key threat areas. The flow of vehicles and
pedestrians was studied and reviewed, thus
a surveillance system that not only ensures
the easy flow of pedestrians and vehicles but
also guarantees the comfort of employees
and customers could be proposed.
A detailed project plan was developed
which was tracked and updated on weekly
basis to ensure compliances to the scope
statement defined in the risk mitigation plan.
A third party audit team was also brought on
to ensure that the requirements were met
and gaps if any in the security were mitigated
by appropriate measures. At the end of this
extensive research, one security solution
provider was found to be able to meet all the
challenges facing Cosmos Bank.

The challenge
Cosmos Co-operative bank is
headquartered in a building with an in-built
data centre and high security safe in the

The solution
A total of 132 VIVOTEK network cameras
were installed across the headquarters of the
bank. For interior spaces, including the main

www.securitybuyer.com

floor area, the lifts and the lobby, 103 FD8136


Ultra-Mini Fixed-Dome Network Cameras
were employed. The FD8136 features a
megapixel sensor enabling viewing
resolution of 1280x800 at 30 fps, while its
tiny size of only 90 mm in diameter and an
inbuilt microphone and speaker further
enhances this tiny but might camera. The
small profile but wide view of the camera
means that Cosmos bank can now secure its
employees, customers and property, without
the need to install unsightly large cameras.
For the basement parking area, 29
IP8335H Bullet-Network Cameras were
deployed. This camera features an HD WDR
CMOS sensor for use in challenging lighting
conditions. The day and night functionality
and the IP67-rated weatherproof housing of
the IP8335H allowed Cosmos bank to build a
cost-effective IP surveillance system without
additional accessories. Incorporating an
IR-cut filter that can be removed
automatically at night and built-in IR
illuminators with coverage for up to 20
metres, the IP8335H secured Cosmos
Banks parking area all day, every day.
Finally, four SD8326 Speed-Dome network
cameras secured the periphery of Cosmos
Banks headquarters in central Pune. This
cameras Verifocal lens, IR and 36x zoom,
empowered Cosmos Banks security team
to identify and recognise objects and
number plates, even in the dark of night,
while its rugged housing ensured that bad
weather would never mean a lapse in safety
for Cosmos Banks real treasure, the people
of the city of Pune, the Oxford of India.
www.vivotek.com

ISB 055

Security
management

at a leading US
childrens hospital
Shayne Bates explores how Seattle Childrens
Hospital have improved their workplace,
health and greenhouse gas emissions

ou may be surprised to learn


that as established hospitals
and healthcare facilities
grow in the USA, they are
not generally relocating to
accommodate that growth.
With a significant investment
in infrastructure and facilities which are well
established, healthcare organisations are
under pressure to better utilise their space, as
demand for healthcare services continues to
skyrocket. Satellite facilities, community
centred clinics, and other initiatives are
among the relief points for expansion.

Steps Forward website, established by the


American Medical Association AMA, which
states: The design of a practice influences
the relationship between physicians and
patients. You can take simple design steps to
enhance workflow efficiency and patient
safety, as well as patient and team
interactions and satisfaction. The implication
is that good space planning has many more
benefits than just bottom line, and that a wellplanned environment is good for workers and
patients alike.

Case study
Space utilisation
Then there is the scrutiny for space
utilisation at main campus facilities. Even
more surprising, many facilities expect to
double their business while utilising the same
campus footprint. So how is this achieved?
Among many initiatives is space planning and
commute management, coupled with
business strategy.
There are now many sources which provide
information about space planning. One is the

056 ISB

An interesting case in point is Seattle


Childrens in Washington State. A quick read
of the hospitals website shows that it claims
superior patient care, advancement of new
discoveries and treatments through
paediatrics research, and serves as the
paediatric and adolescent academic medical
centre for Washington, Alaska, Montana and
Idaho the largest region of any childrens
hospital in the country. In 2015, U.S. News &
World Report ranked Seattle Childrens
number one on the West Coast and number
six in the country overall placing it among

the nations top childrens hospitals.


Enter Lisa Brandenburg, President at
Seattle Childrens, who has served in that role
for more than four years and has been at the
organisation for about eight and a half years.
In total, Brandenburg has 26 years of
experience leading complex service
organisations, including the University of
Washington Medical Center. Brandenburg
has been deeply involved in all aspects of the
hospital including patient care, transportation
initiatives, human resources, and supply
chain management, among other areas.
Brandenburg is an advocate for positive
patient outcomes and also creating a better
environment for workers and patients alike.
In order for Seattle Childrens to continue to
expand and increase its ability to provide
world-class healthcare to every child in the
region who requires care, the hospital made a
commitment to its neighbours and the City of
Seattle to reduce the percentage of staff
driving alone to work to just 30% by 2030.
With this goal in mind, the transportation
department was tasked with developing
innovative commuting solutions that reduced
demand for parking so that campus space
could be optimised and the hospital could

www.securitybuyer.com

HEALTHCARE

Figure one: Employees Driving Alone to Work


continue to increase capacity in order to meet
the growing needs of children in the region. In
working to address climate change, Seattle
Childrens also sees a direct connection
between asthma hospital admission rates, air
pollution and the transportation choices of its
workforce. Seattle Childrens felt strongly that
working to grow the number of employees
who choose to commute by bike, carpool or
use another form of alternative transportation,
would not only lead to space optimisation, but
it would also reduce the hospitals
environmental footprint and contribute to the
health and wellness of its staff and the
broader community.

halving the number of employees who drive


alone to work this year, to 37.4%, down from
78% in 1995. Although the actual number of
employees driving to work in 1995 relative to
2015 was not stated, Seattle Childrens says it
now avoids contributing a whopping 3.5
million pounds of CO2 annually, an impressive
1603 metric tonnes in 2015.

Using EPA numbers for analysis, the


Greenhouse Gas saving by Seattle Childrens
is the essential equivalent of removing about
350 vehicles from the road annually. This is
calculated by using the stated saving of 1603
Metric Tons and dividing it by the EPA stated
average of 4.7 metric tonnes, per vehicle, per
year [ 2]. The number is more impressive when
you consider that the EPA maths includes all
use of the car (an average of 11,400 miles per
car), therefore the effective achievement is
multiplied and removes many more cars from
the work commute.
How did they incentivise single occupancy
drivers to ride share or use alternative
transport for the daily commute? Several
tactics eventually made up that strategy.
Besides financial incentives for employees
who choose to alternatively commute, they
made commute choices more attractive.
Seattle Childrens also changed their monthly
parking pass to a daily system to encourage
more granularity about daily commute and
parking choices.

Greenhouse gases
The US Environmental Protection Agency
website states that CO2 emissions from one
US Gallon of Gasoline (nearly 4L of petroleum)
is nearly 9000 grams. Diesel is 15% more.
That is about 400 grams per mile, meaning an
average of 4.7 metric tonnes of carbon
dioxide per year, per vehicle[1] is produced.
Fast forward to 2016 and through
innovative transportation management
programs, the hospital has made tremendous
strides in reducing its carbon emissions,

As optimisation and automation options to better manage access


requests were discussed, Seattle Childrens Physical Security Program
Manager Dylan Hayes realised that the unique workflow and data
exchange capabilities of Seattle based RightCrowd, might help piece
together and make efficient the solution that Seattle Childrens was seeking. This required tracking access to parking areas and integrating the
data with several different systems.

Shayne Bates
ISB 057

HEALTHCARE

Integration
Technology plays an enormous role in
underpinning and executing such a strategy.
Since Seattle Childrens uses a physical
access control system for its parking entry
and egress, coordination between the
various systems to exchange data and create
a workflow was critical. Those systems
included the HR system, physical access
control system and an enterprise commute
management platform from newcomer
Luum, who offer Enterprise Mobility as a
Service.
A critical component to pull all of this
together is integration of the identity
workflow. Ideally an out of the box solution to
allow the identities of employees who badge
in as a single commuter, or together in a ridesharing scenario. Several years ago,
enterprise solutions that integrate systems
together were expensive, time consuming
and cumbersome to design, develop and roll
out.

Technology solution
During a meeting onsite with innovative
software developer RightCrowd Software,
the discussion centred around optimising
physical access workflow. Seattle Childrens
handles an enormous volume of change
requests to different physical locations for
their team, consistent with the tightly scripted
regulatory and safety requirements imposed
by HIPAA and several other regulations.
So Hayes introduced RightCrowd to the
Transportation team at SCH. RightCrowd
reviewed requirements then configured their
solution to integrate with the HR, Access
Control, and Luums Enterprise Mobility
platform.
When commuters enter Seattle Childrens
parking facility, all occupants in a vehicle,
whether one or several, badge in. When
employees opt-in to the system, they receive
commute benefits which are tracked by the
data collected. Commuters are grouped
together as they enter the facility in a vehicle,
sharing the cost of parking at the facility. The
badge-in transaction data is transferred to the
Luum system used by Seattle Childrens
which gathers statistics about the behaviours,
and accounts for the financial incentives.

058 ISB

www.securitybuyer.com

HEALTHCARE

WE ARE PROUD OF OUR


ACCOMPLISHMENTS, AND
ARE COMMITTED TO FURTHER
MINIMISING OUR ENVIRONMENTAL
IMPACT TO IMPROVE THE HEALTH
AND WELL-BEING OF OUR
PATIENTS...

Hayes continues by saying: The integrated system


works very well and seamlessly transfers the relevant
data from the many thousands of parking transactions
produced each week which is shared between the
various systems. What we particularly liked was the
relatively straight-forward implementation by RightCrowd
which integrated the systems together to allow visibility
about the level of participation.

Outcomes
Providing feedback about the project so far,
Brandenburg states: We are proud that Seattle
Childrens has been on the forefront of offering innovative
commuting solutions and has become a healthcare
leader in environmental stewardship. In working to make
alternative commuting easy for faculty and staff by
offering flexible commute options, we have significantly
reduced our greenhouse gas emissions; 800 trips per
day are supported by carpooling and, since 2010, we
have reduced the drive alone rate among daily
commuters from more than half of our employees, to
about one third.
Brandenburg elaborated further by saying: We are
proud of our accomplishments, and are committed to

further minimising our environmental impact to improve


the health and well-being of our patients, families,
workforce and our local and global community.

Summary
The plan used by Seattle Childrens to utilise
RightCrowd and Luum technologies to integrate with the
parking security technology, brings significant business
benefit, and once again shows that there is value in
security technology practitioners engaging with the
business leaders to understand their requirements and
deliver solutions. New life can be breathed into existing
security technology by integration, which produces
additional business value beyond the core requirement
for safety, security and compliance.
This assumes the average gasoline vehicle on the road
today has a fuel economy of about 21.6 miles per gallon
and drives around 11,400 miles per year. Every gallon of
gasoline burned creates about 8,887 grams of CO2.
Source: US Environmental Protection Agency.
[2]
Source: EPA document EPA-420-F-14-040 May 2014.
[1]

We have
significantly reduced
our greenhouse gas
emissions;
800 trips
per day
are supported by
carpooling
and, since
2010,
we have
reduced
the drive
alone rate
among
daily commuters
from more
than half
of our employees, to
about one
third...

About the Author


Shayne Bates, CPP, FABCHS, CCSK has extensive
experience in working with leaders to identify and exploit
risk opportunities to create business value, by fusing
business process with security technologies. A
co-inventor of multiple successful patents, his
experience includes working with Fortune 50 and
international security technology companies. Bates is
Industry Editor for Security Buyer Magazine and writes
frequently to educate about industry best practices and
emerging trends for security and business.

Lisa Brandenburg, President of Seattle Childrens Hospital


www.securitybuyer.com

ISB 059

PERIMETER PROTECTION

Reducing false alarms in


Perimeter Intrusion Detection Systems (PIDS)
George Redpath PhD CEng FIET, Technical Director of Sensurity,
takes a look at the science behind perimeter protection systems

ll Perimeter Intrusion Detection Systems are susceptible to


false alarms and it is critical that all PID manufacturers
continuously strive to lower these false alarm rates.
Microwave PID Systems have a low false alarm rate in
comparison to other systems, however to make microwave a suitable
PID system for a wide range of sites (over water, very close to fences,
areas of dense foliage etc.) it is imperative to continuously strive to
reduce false alarm rates.
Microwave PIDS work by analysing changes in the received signal
between a transmitter and a receiver. From a historical point of view
they have suffered from an inability to discriminate between a human
target and false alarm events from animals, weather and the movement
of trees and foliage. False perimeter alarms create considerable
additional effort and headache for operators to manage. Even a very
low Nuisance Alarm Rate (NAR) has a severe effect on Perimeter
security system performance.
Microwave PIDS are susceptible to reduction in performance and
increased system costs due to false alarm rates. False alarms rates in
any alarm system reduces the effectiveness of that system and creates
additional costs for operators. Therefore reducing false alarm rates of a
system whilst not compromising system performance, is a key factor
for PIDS manufacturers. False alarms in microwave PIDS are generally
caused by three different categories:

Weather
Foliage
Animals

The way these three categories affect the system varies


considerably and therefore the three categories must be dealt with

separately in order to ensure a false alarm free system. Microwave


systems operate on detection of motion. An electronic field is
generated between a transmitter and receiver unit as depicted in
Figure 1. The electronic field is disturbed by motion within the field. If
the disturbance is great enough an alarm is generated. The amount of
disturbance an object generates in the field is dependant on a number
of system attributes such as operating frequency, antenna design and
the Digital Signal Processing (DSP) techniques used.

THE AMOUNT OF DISTURBANCE AN


OBJECT GENERATES IN THE FIELD IS
DEPENDANT ON A NUMBER OF SYSTEM
ATTRIBUTES SUCH AS OPERATING
FREQUENCY...
Three attributes of a microwave system affect how an object is
viewed by the system;

Operating frequency

Design of the antenna

Algorithms used to analyse the signal.


These three attributes are outlined in detail.

1. Operating frequency
In bistatic radar systems the transmitter and receiver are at different
locations. More particularly, in the case of the angle between
transmitter and receiver being equal to 180, the system may be
described as a forward scatter radar.
The strength of the reflected signal from
an object is dependent on the scattering
properties of the object at the radar
operating frequency, i.e. its Radar Cross
Section (RCS), which thereby determines
how easily the radar system can see an
object. The transmitted signal is forward
scattered away from the transmitter and
towards the receiver for analysis.

Figure 1: Microwave Electronic Field Background & Solution

060 ISB

Figure 2 below is a plot of how the


normalised back scattered and forward

www.securitybuyer.com

PERIMETER PROTECTION

scattered RCS of a metal sphere varies with the electrical size of the
sphere (where the electrical size is the circumference of the sphere
divided by the Radar wavelength). When the object size is smaller than
the radar wavelength, Rayleigh scattering occurs and the objects RCS
is proportional to the systems operating frequency to the power of 4.
When the object size is larger than the radar wavelength, optical
scattering occurs and the forward scattered RCS is proportional to the
frequency squared. Therefore in both cases (small object like a
raindrop or large object like a rabbit), a higher operating frequency
results in a higher RCS and therefore each object has more effect on
the signal and is more difficult to ignore.
In forward scatter radar perimeter intrusion detection systems
(PIDS) the traditional radar operating frequency used is 10.5 GHz or 24
GHz, i.e. a radar wavelength of 2.9 cm or 1.2 cm.
These systems typically have high false alarm rates,
especially during periods of heavy rainfall or due to
the movement of foliage within, or small animals
through the detection zone of the system. A sterile
zone is typically implemented when using these
systems to ensure that no foliage is present, and
that no small animals enter the detection zone of
the system.

Microwave PID systems typically use a parabolic antenna which


creates a narrow beam width of 3.5 in the horizontal and vertical
planes, ( as parabolic antennas are only capable of producing a
symmetrical beam.) Using a Planar Antenna Array, in place of the
traditional parabolic antenna allows different beam angles to be
applied to the vertical and horizontal axis. An increase in the horizontal
plane of an antenna allows an object to be viewed for a longer period of
time and thus allows a more informed decision to be made (following
the application of powerful DSP techniques) regarding whether the
object is a person, vehicle or animal.
At 24 GHz the Fresnel zones of the bistatic radar link will be twice as
tightly spaced as at 5.8 GHz, since the Fresnel zone radius is inversely
proportional to the square root of the radar operating frequency. This
means that a given object size (for instance a person) will occupy more

For example a typical raindrop has a radius of


Figure 4: Detection Zone vs Active Alarm Zone
approximately 0.05cm [2]. Therefore the signals
forward scattered by rain will be Rayleigh scattered
(as the raindrop is less than the wavelength of the
Fresnel zones simultaneously in a 24 GHz bistatic radar system and
system). The electrical size of each raindrop will be 0.25 at 24GHz and
hence less signature frequency information will be available for analysis
only 0.06 at 5.8 GHz. Therefore the RCS of a raindrop will be a
as less changes in the signal will be observable as the object moves
staggering 25dB greater to a 24GHz system than a system which
through Fresnel zones ( Figure 5).
operates at 5.8GHz (10*log((24/5.8)4).
Below follows a table which shows the extent to which an object is
more visible to a radar system operating at 24 GHz than it is to a
Sensurity system.
Operating at a frequency of 5.8 GHz greatly reduces the effect of
weather, foliage and small animals on a microwave field due to their
visibility being greatly reduced by the lower frequency.

2. Antenna design

Object

Approx. Dimensions

Grain of sand

Radius = 0.2mm

Raindrop

Radius = 0.5cm

Leaf

6 x 2 cm

Rabbit

50X20X20cm

Figure 3: Object RCS

www.securitybuyer.com

Antenna design, combined with reducing the operating frequency,


allows the system to make more informed intelligent decisions on what
type of object created the disturbance in the electronic field of the
system.

3. Digital signal processing

As an intruder moves through the microwave link they forward


scatter the microwave energy towards the receiver in slightly different
ways depending upon various
Extent to which object is
Extent to which object is
factors including their position. At
more visible at 24GHz than more visible at 24GHz than
some positions the reflected signal
5.8 GHz (dB)
5.8 GHz (absolute)
from the intruder will actually
reinforce the direct signal which
25dB
293 times
propagates from the transmitter to
the receiver, resulting in a signal
25dB
293 times
increase at the receiver. At other
points the reflected signal from the
12dB
17.12 times
intruder will cancel the direct signal,
resulting in a signal decrease at the
12dB
17.12 times
receiver. At other points still, the
intruder will actually block some
portion of the direct signal from

ISB 061

PERIMETER PROTECTION

reaching the receiver and therefore cause a


shadowing effect; again resulting in a signal
decrease at the receiver.
The amplitude and frequency components of
the signals change based on various factors which
include the intruding objects size (electrical size),
position, speed, crossing point along the link and
angle of movement (relative to the baseline of the
microwave link).
Establishing what patterns (patterns of
amplitudes and frequencies) are caused by which
events (walking intrusion, crawling intrusion,
foliage movement, small animals, parallel motion)
is made more trivial due to the lower frequency
(5.8GHz) and with the improved antenna design.

Operating
at a
frequency
of 5.8 GHz
greatly
reduces the
effect of
weather,
foliage
and small
animals
on a
microwave
field...

Below is a table summarising some of the main


frequency components caused by various
Perimeter Security events.
Sensurity has carefully analysed these signals in
the time-frequency domain and has uniquely
developed intelligent algorithms which alarm on
some events but not others; hereby drastically
reducing the false alarm rates often associated
with Microwave PID systems.

Conclusion
In this report we have identified the three
categories which are responsible for the majority
of false alarms detected in traditional microwave
PID systems. This report has discussed alterations

Event Type

Main Frequency
Component(s)

Walking Intruder.

0-6 Hz

Crawling Intruder.

0-1 Hz

Running Intruder.

2-8 Hz

Person walking parallel nearby (1m


from baseline).

0.5 2 Hz

Foliage moving in the wind.

0-2 Hz

Dogs running perpendicular to the


baseline.

1-3 Hz

to three system attributes that when


combined, greatly improve system
performance and significantly decrease
false alarms.
The outcome of this report is that a
Microwave PID system operating at a
frequency of 5.8GHz with a planar
antenna and using advanced DSP
techniques, provides a very attractive
solution to reducing false alarm rates in
perimeter security applications. For this
reasonmicrowave PIDS have the potential
to be deployed in many more sites than
previously thought suitable in the past;
including port applications.
www.sensurity.com

Figure 6: Event Frequencies

062 ISB

George Redpath, Technical Director, Sensurity


www.securitybuyer.com

PERIMETER PROTECTION

Perimeter protection
More than meets the eye

Perimeter protection is essential in critical infrastructures such as airports


or utilities. Video analytics can greatly improve security in such environments

ver 280 perimeter breaches in ten years - this was the result of
an Associated Press investigation on the busiest 31 airports in
the United States. These incidents happened despite the fact
that after the September 11 attacks, US airports had invested
hundreds of millions of dollars to upgrade their perimeter fencing. They
basically prove two things: First, it is anything but easy to protect large
areas, and second, it is not enough to build seven-foot high fences with
barbed wire on top to keep intruders out. What is true for airports also
applies to any other critical infrastructure, be it a utility, a power plant, a
refinery or a pipeline. And although public safety may not at risk here, the
manufacturing industry has a strong interest to protect physical assets and
intellectual property.
While a fence and security guards may be an appropriate solution for
lower risk environments, critical infrastructures need more than that.
Network video surveillance has the highest potential to drastically increase
perimeter security. The most obvious advantage being image quality. In
todays video surveillance applications there is an ever increasing demand
for more detail. However, the industry does rely too heavily on higher
resolution and consequently more detail. More details and thus pixels
means more data, which in turn means more storage capacity and a higher
network load. Although highly detailed images make it easy to distinguish
individuals or minor details, we need to find ways to reduce storage
requirements and network strain. But that is not all. The number of cameras
being deployed in the market place is also rapidly increasing. Even if storage
requirements and network strain are reduced significantly we still face an
enormous amount of data. This leaves us with the manageability and
accessibility of video data.

Manageability and accessibility of video data


At the end of the day, security personnel or operators want to be alerted
instantly when suspicious events are detected. Built-in video analytics from
Bosch analyse real-time images continuously to instantly detect suspicious
events and alert when needed once predefined alarms are triggered. This
helps operators and security personnel to spend more time on other tasks,
and respond only to important events. In case an event did occur operators
or security personnel want to browse stored video data to find irrefutable
forensic evidence. If time and place are exactly known, this is quite easily
done as the videos carry timestamps. But if you want to figure out and
understand the escape route of a perpetrator on the basis of multiple
cameras recordings, your ability to do so quickly will be limited by the sheer
amount of data.

064 ISB

PERIMETER PROTECTION

Considering this, it would be helpful if network video


cameras understand what they see. In other words when
they add sense and structure to video data in order to
keep video data manageable and easy accessible. Built-in
video analytics from Bosch does all this for you and much
more. For mission critical applications like the perimeter
protection of airports, critical infrastructures and
government buildings as well as border patrol and traffic
monitoring, we offer built-in Intelligent Video Analytics.
Small and medium businesses, large retail stores,
commercial buildings and warehouses can for example
make use of our built-in Essential Analytics for advanced
intrusion detection, enforcing health & safety regulations,
and business analytics like crowd density information and
people counting.

Intelligence at the edge


Bosch ensures the highest quality and reliability of video
analytics by putting it at the edge. Thats why every single
network camera with either Intelligent Video Analytics or
Essential Analytics can operate independently without the
need for a central analytics server so no single point of
failure. This is called distributed or decentralised
intelligence. If one camera or encoder fails, the rest of the
system remains at full performance. Expanding the system
is therefore also easy. Network strain and storage
requirements can be reduced by only streaming what is
needed, since the analysis is done in the camera. With
intelligence at the edge, our focus is to significantly
enhance system robustness and flexibility while reducing
costs.

Alerting only when needed


Network cameras with built-in video analytics can be
configured to automatically identify alert conditions such as
persons approaching or attempting to climb over fences,
reliably differentiating between humans and the proverbial
cat that flits through the image. Alert conditions can also
include objects crossing one or more predefined lines,
following a defined line of movement or changing their
speed (running), shape (crouching) or aspect ratio (falling).
Camera-based, real-time processing can also be used to
issue loitering alarms and perform left object detection,
giving the security team the information it needs to react
and take action quickly. Automatically tracking moving
objects of interest can help to verify or disprove alarms,
alerting the security operator as appropriate. Such tracking
can be initiated by a simple click or automatically when
predefined alarm rules are met. Once integrated with
intrusion detection systems or access control at the gates,
intelligent video can also be used to automatically verify
alarms from these systems or to double-check the identity
of an individual presenting her or his credentials at the gate.

ISB 065

PERIMETER PROTECTION

Video analytics meets the extremes


Outdoor video surveillance brings with it many challenges. One of
them is the fact that lighting conditions vary with time, and while some
of these changes are predictable (day/night), others such as
headlights of a passing car or just scattered clouds are not. Bosch
network cameras with built-in video analytics can detect changing
lighting conditions and adapt their settings in real time, guaranteeing
the best possible image quality at any time. Intelligent algorithms can
also help dealing with unfavorable weather conditions. Network
cameras with Intelligent Video Analytics (e.g. DINION IP starlight 8000
MP ) from Bosch are specifically tailored to provide extremely reliable
(minimum false alarms) video analytics under most adverse
circumstances. These cameras can easily detect the difference
between rain or snow and an object of interest and thus greatly reduce
the number of false alarms caused by the elements of mother nature.
With more than 15 years of continuous in-house development Bosch
delivers robust video analytics, which is able to differentiate between
the movement of an object of interest and the moving of water, flying
leaves, moving branches and the like. Network cameras featuring
Intelligent Video Analytics also offer a water vehicle-tracking mode,
improving security in critical infrastructures along rivers or coasts.
Another feature is Intelligent Defog, a technology designed to
dramatically improve image clarity in low-contrast situations such as
fog, mist or air pollution. It removes the haze from the image for better
visibility and enhances image details by increasing both the contrast
and the color saturation of the images.

Quickly retrieve the correct data


Although reliable real time alarms are most important in perimeter
security, incidents usually result in the need to reconstruct them later.
Analysing recorded video is a time-consuming endeavour and prone
to error. Network cameras with built-in video analytics can greatly
reduce the effort and speed up forensics by introducing a level of

066 ISB

PERIMETER PROTECTION IS NOT FOR


SUNNY DAYS ALONE. WHETHER IT IS
WIND OR RAIN, A HOT SUMMER DAY OR
SUB-ZERO TEMPERATURES IN WINTER,
CAMERAS AT THE PERIMETER MUST BE
ABLE TO OVERCOME ALL
ENVIRONMENTAL CHALLENGES...
abstraction. They can generate metadata in the form of simple text
strings, describing relevant video details such as objects or movements.
These metadata are very small compared to the actual images, so they
do not add significantly to bandwidth and storage requirements.
Nevertheless, they offer a huge benefit in that they can be searched
automatically. In a typical setting, 20 seconds are sufficient to filter all
relevant video sequences out of four hours worth of video using
metadata. These data can also help to optimise business processes
based on, for example, people counting or crowd density information.

Robust cameras for harsh environments


Perimeter protection is not for sunny days alone. Whether it is wind or
rain, a hot summer day or sub-zero temperatures in winter, cameras at
the perimeter must be able to overcome all environmental challenges
and deliver high quality video no matter how severe the conditions get.
Bosch has therefore developed its new robust IP PTZ cameras,
combining all their expertise in mechanical engineering and IP video
surveillance into a single solid camera design. The intelligent MIC IP
starlight 7000 HD and MIC IP dynamic 7000 HD surveillance cameras
combine a virtually indestructible housing with self cleaning ability and
can be updated remotely, eliminating service visits along the critical
perimeter.
www.boschsecurity.com/hdsecurity

www.securitybuyer.com

KEEP UP TO DATE WITH THE LATEST PRODUCT AND INDUSTRY NEWS

Subscribe today!
an

Hand Media, Goldings, Elphicks Farm, Water Lane,


Hunton, Maidstone, Kent, ME15 0SG, UK

ia

Mail this form back to Hand Media at the following


address or fax through to +44 (0)1622 823933
d med

Please fill in the relevant details below and be sure to include your email address, so that we can keep you up to date with the publications news.

Name:
Company:
Full address:
Email:
PURCHASE OPTIONS

UK subscription: 99

Overseas subscription: 149

PAYMENT OPTIONS

Card:

Cheque:

If making payment by cheque please make payable to Hand Media and return by post.
To make payment by card please fill in the form below and return to the address as above or
call +44 (0) 1622 823920 to talk to a member of the team and well be happy to process your payment.
Please provide name & address as registered with the card company if different from the delivery address:

Credit or debit card number:


Start Date
Signature

Expiry Date

Issue Number
Security Code

www.securitybuyer.com
Subscription HP ad_SECURITY.indd 1

16/4/12 12:52:25

EVENT PREVIEW

Dont miss the


IFSEC & FIREX panel debate Would Brexit impact on the UK
Security and Fire Industries?
This years FIREX has also attracted major international names as keynote speakers

une 23 2016 is not only the last day of


IFSEC and FIREX International for
this year, its also potentially a pivotal
day in the UKs future relationship
with the European Union. The timing
couldnt be more acute for the security and
fire industries and as the leading players will
all be gathered at IFSEC and FIREX, its only
appropriate the shows gauge the mood and
discuss the key impacts of the IN or OUT
votes.
The security and fire industries are deeply
woven into the tapestry of the European
construction sectors- Europe is the worlds
second largest security market with 23%
share worth approximately $6bn (Memoori
report: The Physical Security Business 2014
to 2018). Therefore the effect of the UKs
decision to stay or leave the EU will
reverberate around the industries for years
to come. Major areas such as harmonised
standards, testing, approvals and
collaboration may be fundamentally effected
by the outcomes of the voting and these
areas will be directly addressed at IFSEC
and FIREX on the actual day of the
referendum itself.
So on EU Referendum Day, June 23,
IFSEC and FIREX will host a wide ranging
panel debate at Londons Excel in the IFSEC
End-User Seminar Theatre alongside
leading stakeholder groups such as

068 ISB

Euralarm, Loss Prevention Certification


Board, European Fire Sprinkler Network,
BSIA, FIA and the EAPFP. The debate
promises to be energetic and is the perfect
way to close the shows with the UKs
membership of the EU actively being
decided in real time.

good opportunity as the main protagonists


will be there from the industry and market so
the debate will be lively and robust as we
look at how the UKs security and fire
businesses could potentially be transformed
by an EU exit.

IFSEC and FIREX International Event


Director Gerry Dunphy says: In view of the
potential outcome the EU Referendum could
have on the security and fire industries, both
IFSEC and FIREX welcome the opportunity
to provide a platform for stakeholders to
assess how the landscape may change
should the UK leave the European Union.
The shows represent significant
opportunities for the security and fire
communities to gather in one place to find
new products, discover solutions, network
and extend their knowledge so were making
the most of the timing of this unique
occasion to address a major national event.

Colonel Tim Collins OBE, Kate


Adie OBE and James Cracknell
OBE to headline a stage of 300+
speakers at Protection &
Management Series

Martin Harvey, Head of Regulatory Affairs


EMEA Tyco/ADT, Fire Industry Association
Chairman and Euralarm states: Were very
pleased to be able to participate in this
debate at our industrys main trade events.
As Euralarm has a direct interest in the
promotion of harmonised standards across
Europe, the referendum could have a far
reaching influence on the future of the
European security and fire sectors. Its a

IFSEC International and FIREX


International have also unveiled the speaker
line-up for the Protection and Management
Series 2016, Europes leading events for
security, fire, safety, facilities and service
management, taking place at Londons
ExCel from 21-23 June 2016.
Headlining a programme of more than 300
speakers will be keynote addresses from
Colonel Tim Collins OBE, Kate Adie OBE and
James Cracknell OBE, truly inspirational
speakers who have shown grit and
determination in the face of adversity.
Further speakers will cover sector specific
case studies, best practice, training and
legislative updates.
Commenting on the line up, Charlotte
Wright, Senior Content Manager for

www.securitybuyer.com

Protection & Management at event


organisers, UBM EMEA, said: A wealth of
18 month research with the security, fire,
safety, facilities and service management
communities has resulted in the most
focused programme that the Protection &
Management Series has ever seen. Stages
this year will welcome a mix of inspirational
stories from our headline speakers with
practical and insightful sessions from top
speakers and trainers. We cant wait until
June!
IFSEC International and FIREX
International are part of UBM EMEAs
Protection & Management Series, the UKs
largest event dedicated to protecting and
managing property, people and
information.
The series incorporates major events
Safety & Health Expo, IFSEC International,
FIREX International, Facilities Show along
with Service Management Expo and
attracts more than 40,000 attendees
annually over three days to ExCeL London.
The series of events will run from June
21-23 in 2016 at ExCeL London.
Colonel Tim Collins OBE will speak on
Tuesday June 21 from 11.30 12.30, Kate
Adie OBE will speak on Wednesday June
22 from 11.30 12.30 and James
Cracknell OBE will speak on Thursday

www.securitybuyer.com

June 23 at 11.30 12.30. The Inspirational


Speaker Series will be hosted in the
Keynote Theatre at ExCel London.

household name as BBC Chief News


Reporter, covering the Gulf War, the
demise of the Soviet Union, the protests in
Beijings Tiananmen Square and NATOs
campaign in Kosovo.

About the keynotes


Colonel Tim Collins OBE will be
speaking June 21, 11.30 12.30
Colonel Tim Collins attracted attention
on both sides of the Atlantic for his rousing
speech to the troops before going into
battle in Iraq. His autobiography, Rules of
Engagement, subsequently went straight
into the bestseller lists and he is now CEO
of a security company.
Tim is a naturally inspiring speaker,
combining extensive experience of active
service with broad knowledge of military
and political history. An authority on
teamwork, leadership and motivation, his
speeches show a clear parallel between
military problem solving and the
challenges faced by leaders in any walk of
life.
Kate Adie OBE will be speaking June
22, 11.30 12.30
It used to be said that if you found
yourself in the same place as Kate, you
should leave straight away. She became a

Aside from her autobiography, The


Kindness of Strangers, Kate has published
Corsets to Camouflage and Nobodys
Child. She has won the Royal Television
Society Journalism Award and the Monte
Carlo International Golden Nymph. Kate
has also received BAFTAs Richard
Dimbleby Award.
James Cracknell OBE will be
speaking June 23, 11.30 12.30
James Cracknell is one of Britains
greatest ever oarsmen. After victory
alongside Redgrave and Pinsent in the
coxless four in Sydney, he went on to
achieve another Olympic gold in Athens.
James will talk about his adventures, the
build-up to both Olympics and how they
were nowhere near as straightforward as
the public seemed to think. He reveals the
highs and lows of his training regime, the
different characters that make a
successful team and what drives him to
seek out new challenges.
www.firex.co.uk

ISB 069

DATES FOR YOUR DIARY

What's On?
Our latest round-up of recommended shows and exhibitions
Securex

Secutech Vietnam 2016

24-26 May 2016


Johannesburg, South Africa
www.ifsecsa.com

24 Sept 2016
Hanoi, Vietnam
www.secutechvietnam.com

The leading event for the African security


industry, with nearly 300 exhibitors and
over 6,500 visitors

Secutech Vietnam 2016 is an ideal platform


for manufacturers & distributors of security
and safety products from local and around
the world to connect and explore new
business opportunities in Vietnam.

Infosecurity 2015
7-9 Jun 2016
London, UK
www.infosec.co.uk
Europes largest information security industry gathering, featuring a diverse range
of new products and services

IFSEC International
21-23 Jun 2016
London, UK
www.ifsec.co.uk
IFSEC provides a global offering of face to
face events, education, news and networking to the global industry

Security Expo 2016


20-22 Jul 2016
Melbourne, Australia
www.securityexpo.com.au

Total Security Summit


26 - 27 Sep 2016
Los Angeles, USA
www.forumnetworkingevents.com
Total Security Summit is specifically
organised for senior managers, directors
and buyers

Security Essen
27-30 Sept 2016
Essen, Germany
www.security-essen.de
The No. 1 for more than 40 years: security
essen is the worlds most important trade
fair for security and fire prevention. The
world market for security is booming it is
presenting itself with all its facets in Essen.

The Security Exhibition & Conference is


the largest event for security professionals
in Australasia

SSA

IFSEC Southeast Asia

SSA 2015 will present an array of issues


to increase awareness of the importance
of maintaining security

7-9 Sept 2016


Kuala Lumpur, Malaysia
www.ifsecsea.com

30 Sept-2 Oct 2016


Singapore
www.safetysecurityasia.com

The leading exhibition for the Chinese


security industry, and an ideal opportunity
to meet officials

ISC East 2016


16-17 Nov 2016
New York, USA
www.isceast.com
ISC East will feature end-users of physical
security, such as corporate security directors,
financial risk managers and retail loss
prevention professionals and campus
security professionals.

IFSEC India
8-10 Dec 2016
New Delhi, India
www.ifsec-global.com
Conference and exhibition focusing
on the security industry in Southeast
Europe, Central Asia and the M. East

Intersec 2017
22-24 Jan 2017
Dubai, UAE
www.intersecexpo.com
The Gulf regions largest and most comprehensive trade and networking exhibition
for the security industry

Convergence India 2017


8-10 Feb 2017
New Delhi, India
www.convergenceindia.com
Themed as digital India the 25th Convergence India 2017 will bring together the
best minds in ICT

IFSEC Southeast Asia provides visitors the


opportunity to network and hear the latest
industry developments

CAIPS 2016

ASIS 2016

CAIPS Central Asia is the International


Protection, Security and Fire Safety Exhibition for Central Asia

The worlds best-attended tradeshow


for the professional AV and electronics
industry

ISC China

ASIS Middle East

12-15 Sep 2016


Orlando, USA
www.asisonline.org
For the past six decades, ASIS has been
at the forefront of the security industry
around the world

070 ISB

TBC Oct 2016


Tashkent, Uzbekistan
www.ca-ips.com

25-28 Oct 2016


Beijing, China
www.securitychina.com.cn

ISE
7-10 Feb 2017
Amsterdam, Netherlands
www.iseurope.org

TBC Feb 2017


Dubai, UAE
www.asisonline.org

www.securitybuyer.com

DATES FOR YOUR DIARY

ASIS Middle East 2015 will address a full


spectrum of topics in security management

SICUR 2017
TBC 2017
Madrid, Spain
www.ifema.es/sicur_06

www.isnrabudhabi.com
Infosecurity Middle East is a launch
event from Infosecurity Europe, rated as
Europes number one information security
exhibition and conference with 20 years of
successful history

TBC Apr 2017


New York City, USA
www.asisonline.org
Join 3,000 professionals for the largest annual
conference in the northeast USA for the security community

ISC Brasil

ISC West

20-22 Mar 2017


Sao Paulo, Brazil
www.iscbrasil.com.br

5-7 Apr 2017


Las Vegas, USA
www.iscwest.com

Latin Americas biggest security industry


event, established to meet the growing
demand for innovation

ISC West is the largest physical security


show in North America, featuring over 1,000
exhibitors

Securex W. Africa

Secutech

21-23 Mar 2017


Lagos, Nigeria
www.securexwestafrica.com

12-14 Apr 2017


Taipei, Taiwan
www.secutech.com

The only show in the West Africa


region that brings together the entire
security supply chain all under one roof

Secutech expos are the largest


security, fire and safety events
across the South East Asian region

ASIS Europe

Security & Counter Terror Expo

MSE offers a platform to exhibitors to


showcase their solutions for maritime
and port security challenges

29-31 Mar 2017


Milan, Italy
www.asisonline.org

3-4 May 2017


London, UK
www.conterterrorexpo.com

Cloud Europe

Gain valuable new insights and


perspectives on security challenges faced
regionally in Europe and globally

he event offers the opportunity to visit


an exhibition of over 300 leading suppliers
of counter terrorism and security solutions
as well as see a number of product
launched and demonstrations.

SICUR 2016 is the leading international


security, safety and fire exhibition. The
event brings together the safety and security industry.

Total Security Summit


TBC 2017
London, UK
www.forumnetworkingevents.com
Total Security Summit is specifically organised for senior managers, distributors
and buyers

Maritime Security Expo


TBC Mar 2017
Norfolk, Virginia
www.maritimesecurityexpo.com

15-16 Mar 2017


London, UK
www.cloudexpoeurope

ASIS NYC

Cloud Expo Europe is Europes biggest,


best attended and multi-award winning
cloud conference and exhibition

MIPS
15-18 Mar 2017
Moscow, Russia
www.mips.ru
MIPS exhibition has been taking place for
the last 20 years, and is the largest security event in Eastern Europe

Infosecurity Middle East


16-18 Mar 2017
Abu Dhabi

ISB 071

Leading Suppliers

World leading experts in network video


www.axis.com

Helping you improve your physical security,


your business processes & your bottom line
www.axxonsoft.com

Top Leading Solution Provider in Video


Surveillance
www.dahuasecurity.com

Leading provider of access control and


integrated security management systems
www.cemsys.com

See Everything
Find out what you been missing. In HD
www.avigilon.com

First-Class Visual Display


Solutions for Control Rooms
www.eyevis.de

Leaders in Innovative IP Security Solutions

Others make cameras. We make people safe

www.genetec.com

One of the worlds leading suppliers of video


surveillance products and solutions
www.hikvision.com

Leading experts in surveillance storage solutions


www.toshiba-storage.com

Transmission built to perform in


non-conditioned environments
www.kbcnetworks.com

www.parabit.com

The world-leading DVR manufacturer

Leading expert in driver based vehicle


identification & vehicle detection
www.nedapavi.com

Leading sensor manufacturer providing perimeter protection, intrusion and piggybacking detection solutions.
www.optex-europe.com

www.idisglobal.com

World leader in LED lighting


for security and safety
www.rayteccctv.com

Siemens offers integrated security solutions


with its innovative Siveillance portfolio
www.buildingtechnologies.siemens.com

www.indigovision.com

www.flir.com

VIVOTEK is a leading brand known for


delivering world-class IP surveillance solutions
www.vivotek.com

www.sesys.com

Technologically advanced products


that satisfy customer needs
www.tamron.co.jp

You might also like