Tag Archives: CCTV

Zaun develops SR3 fencing for Critical National Infrastructure applications

A high-security fence for rail and other Critical National Infrastructure (CNI) applications that resists sustained attack with specialist power tools for more than five minutes has been developed by steel mesh fencing manufacturer Zaun.

Zaun has received a revised Certificate of Product Approval from the Loss Prevention Certification Board to include its brand new CorruSec SR3 approved to Security Rating 3. The fencing system incorporates corrugated HiSec 3-5-10 mesh sandwiched between further panels of HiSec 3-5-10, a special welded steel wire fence panel similar to the type of mesh usually used for prison fencing, whose name is derived from its mesh size: 3″ × 0.5″ × 10 gauge.

The original concept was the idea of Zaun co-founder and director Alastair Henman and has been developed by R&D manager Adam Christie. Christie explained: “Alastair conceived the design by looking at the construction of cardboard, in particular the corrugated kind and how the corrugated element created a much stronger three-dimensional material. We started experimenting with a corrugated mesh centre section to give fencing greater rigidity and increase its thickness without adding much to the material content and weight in order to counter the kind of tools attackers might use.”

ZaunSR3Fencing

CorruSec SR3 has been subjected to sustained attack by testers from the Building Research Establishment wielding a range of hand and power tools, yet they couldn’t breach the CorruSec SR3 in less than five minutes.

The fencing system is manufactured to BS 1722 Part 14 and is approved at heights from 2.4 metres to 6 metres above the ground, in ground or base-plated options.

Each individual panel features a 76.2 mm x 12.7 mm mesh configuration with 3 mm horizontal and vertical wires. The corrugated section is pressed to approximately 100 mm in depth. All three layers are bolted together using bolts fixed into place in a grid pattern throughout the combined fence panel.

CorruSec SR3 provides good through visibility for use with CCTV cameras, while security toppings can be added to suit.

Alastair Henman explained: “The current specification for CrossRail stations is a ‘5-minute fence’, so we set about seeing if we could create a viable product. Across our customer base, operators of CNI are upgrading their most sensitive sites given  the heightened fear of terrorist threats and advances in technology.”

As well as rail applications, SR3 fencing is ideal for protecting assets at water utilities, oil and gas compounds, Data Centres and other CNI sites.

 

Advertisements

Leave a comment

Filed under Risk UK News

IDIS strengthens integrity of video surveillance with critical failover

IDIS has debuted a powerful suite of features designed to bring critical failover capabilities and peace of mind to users of the company’s innovative technology offerings. Bringing together existing, improved and new failover features, IDIS addresses multiple threats to crucial video surveillance operations with IDIS Critical Failover, a collection of five capabilities that strengthen the fault tolerance of end users’ CCTV infrastructure.

“If any part of video surveillance infrastructure fails, it’s critical to first recognise the failure and then initiate appropriate alternative or redundant technologies to minimise loss of data,” noted James Min, managing director of IDIS Europe. “Full redundancy of every component in your infrastructure is prohibitively expensive and adds unnecessary complication in most cases, while manual recognition and resolution costs precious time and risks gaps in footage. IDIS Critical Failover reduces both issues through a multi-layered collection of capabilities spread across the devices in your infrastructure.”

IDISCriticalFailover

IDIS Critical Failover consists of five parts: Temporary Smart Failover, Smart Failover, Storage Redundancy, NVR Failover and Dual Power Supply.

If you experience a problem with network instability, Temporary Smart Failover starts recording to an internal recording session buffer (of at least 60 MB), ensuring there’s no break in the data being sent to the NVR. For longer network issues, such as a complete failure of the link between the camera and the NVR, Smart Failover takes over. When the IP camera and NVR become disconnected, the camera instantly begins recording to an internal SD card. It records at the original quality until half of the SD card is filled up and then adjusts the quality to ensure a full 24 hours of footage is captured on just a 32 GB card. H.265 cameras add support for SDXC cards, with a theoretical limit of 2 TB. Once the network link is restored, all of the data is automatically transferred to the NVR, leaving no incident unrecorded.

Storage Redundancy exists inside the NVR (DR-8364D) in the form of native RAID 1 or RAID 5 support. With RAID 1 support, the NVR stores two identical copies of the data: if one disk fails, the data is then retrieved from the second one. RAID 5 stores the data and additional parity data in separate locations, providing the same redundancy, but more efficiently than RAID 1.

NVR Failover protects against the failure of the entire NVR. Both the primary and standby NVR continuously monitor one another to quickly switch to the functioning NVR during a failure, reducing the risk of data loss and decreasing failover response times.

Finally, native Dual Power Supplies (DR-8364D) provide a redundant power supply in case the first one fails, increasing uptime and reducing the risk of data loss.

*View Critical Failover in action: https://youtu.be/FvAgyOSuhTM

Leave a comment

Filed under Risk UK News

Software development manager Tina Baker celebrates 13 years with TDSi

Tina Baker, software development manager at integrated security solutions manufacturer TDSi, is celebrating 13 years of service with the company. Having reached this impressive milestone, Baker has also been reflecting on the developments and evolution of the security software industry and what this could lead to in the future. 

“Since I joined TDSi there have been enormous changes in the security industry, especially in the software systems and applications connected to them,” urged Baker. “TDSi has been leading the move towards fully-integrated security software for a number of years now, and it’s gratifying to see the rest of the industry has followed suit as well.”

Baker began her career in security when she answered a job advert for a summer placement on display at Bournemouth University while nearing the end of a degree course in Software Engineering. “I knew that software would dominate many industries and wanted a career that would allow constant growth. I wanted to gain more experience developing software using different programming languages and TDSi offered me the opportunity that I was looking for.”

TinaBakerTDSi

TDSI’s Tina Baker: reflecting on 13 years with the Poole-based security solutions developer

Baker’s personal development has fittingly mirrored that of TDSi and the security industry it supplies. “TDSi has really nurtured my personal development, right from software programmer to development manager. At the same time, the industry has become far more integrated with building management systems which now commonly incorporate intruder alarms systems and CCTV as well as access control.”

A view of the future

While reflecting on the past and present, Baker also has an eye firmly fixed on the future and is clear on how she believes the security software sector will develop: “All the signs are that there will be continued and increased integration with building management systems, especially to comply with environmental legislation.”

Baker continued: “We will also see further biometric integration to heighten security and remove the need for ID cards. The market is also demanding more bi-directional integration, with security systems working even more closely with one another. More and more, we’re being asked for our SDKs so that other security companies can integrate our systems into theirs.”

Baker also has advice for young people looking for a career in security software development. “You need to enjoy continually learning new skills if you’re to keep up with the changes in technology. It’s also important to have a keen understanding of the close connection between physical access security and software security. Further systems integration means that the prevention of cyber attacks is essential.”

Focused and interested

When asked what has kept her focused on and interested in working for TDSi, Baker concluded: “The company champions professional development of its employees and, on a personal level, I really enjoy the interesting challenges that TDSi faces with ever-increasing integration needs. It’s a great company to work for, and I very much look forward to seeing what the future will bring in terms of technology and progress.”

Leave a comment

Filed under Risk UK News

ISM introduces Enterprise version of proven integrated security management system

Intergrated Security Manufacturing (ISM), a leader in the design, development and manufacture of ISMS technology, has just launched an Enterprise version of the company’s proven Genesys integrated security management system (ISMS).

Already deployed within the Critical National Infrastructure sector, the new ISMS offers end users “unparalleled scale, redundancy and ease of use”.

As an enhancement of the existing Genesys2, the Enterprise version has been developed with the largest organisations in mind. Genesys is fully-scalable to manage and control multiple sites from a single Control Room (or even a single workstation) across a country, or even across continents. It features the most advanced levels of encryption to ensure network security, and is accredited to the highest standards of Government national infrastructure security.

Stephen Smith, managing director of ISM, believes that the extension of the Genesys range gives customers greater choice. “There have been a number of articles in the security press talking about PSIM companies starting to develop systems that go beyond the current solutions and moving to a federated architecture. With Genesys, we’re already there. Genesys Enterprise resolves those issues associated with the increasing geographical scope of clients, corporations, Governments and institutions, while also adhering to a multi-tiered hierarchy or ‘federated’ system here total control is centralised, but allows individual sites to maintain local control.”

ISMGenesysEnterprise

Smith added: “This new addition is ideally suited to those large organisations with multiple sites across multiple regions who might also want to ‘flex’ to accommodate further sites and geographies as their needs evolve. As this comes from the Genesys stable, existing users only have to upgrade from their existing version to Enterprise without the expense of a complete technology refresh.”

Multiple systems, multiple manufacturers

Crucially, the new development allows the integration of multiple systems from multiple manufacturers – all from one holistic integrated security system. Every electronic security or fire safety device from CCTV and intruder alarms through to electronic locking and Public Address can be monitored and controlled from a single platform, regardless of who made them.

Most importantly, this solution includes the existing Migrating 3+ technology, a patented automatic fail-over technology that adds higher levels of automatic configurable redundancy and power. Control is effectively distributed across multiple workstations.

“We take power to your PC and multiple it by the number of PCs on your network,” added Smith. “What this means is that, if one PC fails, control is migrated to another PC on a seamless basis with no interruption or downtime. Our system isn’t restricted in its performance by the size or capability of a server, and nor does it require the expense of moving to server farms or using clustering software. It means we deliver the most extreme redundancy characteristics for the threats you’ve thought of, not to mention those that you haven’t.”

Continuing this theme, Smith observed: “The Enterprise development within the existing Genesys isn’t a development waiting for a trial site, but rather it has already been installed within a high-security Critical National Infrastructure project. It is tested and proven at the highest level and under the most demanding of conditions and has been very successful.”

‘True’ ISMS

Genesys is a ‘true’ ISMS built around intuitive software that combines a range of industry-leading features and benefits including an enhanced graphical user experience, 3D modelling and a comprehensive event management database. Events and alarms are presented to the operator clearly as and when they happen.

“Operators can be quickly trained to gain maximum advantage,” highlighted Smith. “The system also enables end users to make better use of their staff and resources since they don’t have to have all of their Control Rooms working on a 24-hour basis. Genesys is a truly unique solution offering advanced system architecture, unparalleled ease of use for the operators and the very low lifecycle costs.”

The ISMS software operates as a standalone platform over LAN or WAN networks for remote and local sites with workstations that can be transferred to any operating Security Control Room on the network. This offers the end user flexibility when closing down sites or buildings for off-peak or out of normal working hours or in the unlikely event of any system failures.

Leave a comment

Filed under Risk UK News

AMG Systems to discuss integrated technologies at Global MSC’s Security 2017 event

Network transmission solutions specialist AMG Systems will discuss the latest developments in environmentally robust fibre, analogue, IP/Ethernet, wireless and hybrid communication systems when the company exhibits at the Global MSC Security Conference and Exhibition 2017 in Bristol.

The two-day event is hosted by consultancy Global MSC Security, with this year’s theme being that of ‘Integrating Technologies’. The conference and exhibition is designed to bring together experts from across the security industry, sharing their knowledge with delegates from local authorities, hospitals, universities and both private and blue chip companies. This year’s event looks into the ways that security is changing, integrating with other disciplines and adapting at a rapid pace to meet the demands of what end users now require from their security solutions.

Speakers and topics include:

*Daffydd Llywelyn (Dyfed Pewees Police and Crime Commissioner): Public Space Surveillance initiative

*Professor William Webster (director, Centre for Research into Information, Surveillance and Privacy): Body-Worn Video Research

*Tony Porter (Surveillance Camera Commissioner): National Surveillance Camera Strategy for England and Wales

*Detective Inspector Edward Heath (Avon and Somerset Police): Cyber Crime

*Bernadette Bashford-Payne (estate Control Centre manager, Canary Wharf): ‘Inside a Large Control Room’

*Jim Burgess (associate director, Perform Green): ‘Integrating CCTV in Bristol’s Smart City’

*Mick Neville (ex-Metropolitan Police Service: SeeQuestor Review

Discussion of key security challenges

At the Global MSC Security Conference and Exhibition, AMG Systems is exhibiting on Stand 25. The company’s business development director Sara Fisher said that the organisation is looking forward to meeting delegates and discussing the key security challenges that they face in their day-to-day operations.

SaraBullockAMGSystems

Sara Fisher of AMG Systems

“Our specialist transmission knowledge can provide enormous benefits for integrated projects, saving on infrastructure expenditure, time for install or upgrade and reducing complexity,” said Fisher. “I’m keen to talk to any delegates who’d like to learn more about the way that legacy systems can be transitioned relatively simply to IP and Ethernet, with all the advantages that brings, and to those who’d like to discuss any other aspect of security and data network provision.”

AMG Systems manufactures intelligent, industrial grade, robust edge-of-network transmission solutions which have been used extensively in CCTV and security systems, as well as in sectors as diverse as the oil and gas, Critical National Infrastructure, defence and transport industries.

AMG Systems is the only UK-based IP and Ethernet transmission product manufacturer and solution provider. The company’s degree of in-house control mean that its products are less vulnerable to cyber security attacks than those from other companies, which rely on third party hardware and software.

The Global MSC Security Conference and Exhibition 2017 takes place on Monday 13 and November 14 at the Bristol Hotel on Prince Street in Bristol. For more information and to book a delegate place visit www.globalmsc.net/seminars-2/

Leave a comment

Filed under Risk UK News

360 Vision Technology and Visual Management Systems guard against cyber attacks

As more and more security systems and devices become IP networked, it’s important for security installers and end users alike to consider how their systems will be protected against the possibility of cyber attacks. Providing a solution to the concerns around cyber security and hacking, CCTV specialist 360 Vision Technology has partnered with software control provider Visual Management Systems to provide security operators with an effective solution designed to guard against IP surveillance system cyber attacks.

Without the right level of network security measures in place, system users can be left vulnerable, resulting in exposure to the type of hacking and malware attacks that have recently hit the news headlines.

A serious security breach of an IP network can lead to system inoperability and network downtime and, at worst, direct access to corporate networks for the cyber criminals.

To provide IP surveillance system installers and operators with peace of mind, when used together both 360 Vision Technology cameras and Visual Management Systems’ TITAN SECURE Physical Security Information Management system can exceed 802.1x authentication protocols and encryption to provide “the ultimate protection” for surveillance networks via the latest patent pending technology.

360VisionTechnologySSL8022C5A19E

Designed to Centre for the Protection of National Infrastructure standards, this advanced protocol and encryption technology is said to offer a “far higher level” of hacking protection.

Advanced cyber attack protection

Ultimately, security and IT managers have much to gain by implementing the security advantages of a 802.1x authenticated network. Conversely, they also have a lot to lose should they ignore the security risks involved.

“As part of our ongoing development of products and deep integration techniques, we looked closely at the vulnerabilities of current camera systems and found that expert hackers could easily take control of standard network cameras, and even those models with HTTPS certification,” explained John Downie, sales director at Visual Management Systems. “Employing 802.1x authentication at both the camera and control end using 360 Vision Technology cameras and TITAN SECURE in combination is the most effective way in which to fully secure an IP camera network.”

Mark Rees, business development director at 360 Vision Technology, added: “Designed to protect organisations against hacking and ransomware attacks, the latest 360 Vision Technology IP surveillance cameras include advanced 802.1x encryption protection. Designed and built in the UK, our high-performance camera technology offers customers proven reliability, advanced imaging performance and effective cyber security for use within any high or general level camera surveillance application.”

Leave a comment

Filed under Risk UK News

Cougar Monitoring and BT Redcare to run joint Roadshow for fire and security installers in Midlands region

Led by Cougar Monitoring, the Roadshow will be hosted on Friday 6 October at one of BT’s key buildings in Birmingham city centre near to Birmingham New Street Station. In addition to presentations from representatives of Cougar and BT Redcare, there will also be representatives from the technical departments of both companies available for advice, guidance and training.

Eric Roberts, CEO of Cougar Monitoring, said: “BT Redcare has been in the alarm signalling market for over 30 years. The company is tried and tested and the majority of its products are third party certified. Having met with the new BT Redcare management team recently, it’s abundantly clear that they have a renewed focus and intention to work closer with both ourselves and installers. We’re delighted to join them to reinforce that message to our installers.”

CougarMonitoringLogo

BT Redcare sits at the heart of home and business security, bridging the gap between customers, installers and Alarm Receiving Centres (ARCs). Backed by BT’s trusted technology and the largest R&D budget in the UK, the business has been leading the way in reliable alarm signalling. Having recently undertaken a refresh of its brand and approach to the market, the company has now pledged to work closer with ARCs and installers to help grow their businesses.

Cougar Monitoring was established in 1996 and holds a number of nationally-recognised accreditations. The business is registered by the Security Industry Authority as an Approved Contractor for key holding, security guarding and Public Space (CCTV) Surveillance and has also received the National Security Inspectorate’s Gold standard EMS and Health and Safety accreditations.

Cougar Monitoring is part of the Prime Interaction Group that also includes Securenett and Kings Security, making it one of the largest independent security groups in the UK. The company invests heavily in cutting-edge technology to provide clients with an “innovative and inclusive” security service. Its high specification alarm receiving and monitoring set-up enables the company to keep response times enviably sharp and to provide reliable and professional assistance.

SecurenettLogo

Going forward, Securenett will be recommending BT Redcare alarm signalling products to its customers.

Commenting on the Cougar initiative, John Ware (general manager of BT Redcare) said: “I met personally with the senior leaders of Cougar Monitoring recently and it’s clear that they, like us, are looking to the future and wish to expand their operation. We’re perfectly placed to help them do this. The combination of our expertise in the market and Cougar’s reach to installers means attendees at the Roadshow will receive the best advice, value and support from both companies.”

*Details of the Roadshow will be issued soon. In the meantime, installers wishing to register an interest in attending can do so online at www.formwize.com/cougarroadshow

 

Leave a comment

Filed under Risk UK News