Tag Archives: Centre for the Protection of National Infrastructure

Intergrated Security Manufacturing reports on successful Security and Policing event

Intergrated Security Manufacturing (ISM) has hailed the success of Security and Policing 2018, the official UK Government global security event, reporting positive interest in its latest Integrated Security Management System (ISMS): a technology that takes Physical Information Management (PSIM) technology to “another level”.

The three-day event hosted at the Farnborough International Exhibition and Conference Centre was the perfect opportunity for ISM to showcase its Genesys ISMS, a fully-integrated security management system capable of integrating and controlling multiple technologies, devices and sites from a single platform.

Attendees at Security and Policing 2018 included representatives from various police services, Government departments and the Emergency Services, key providers of national infrastructure and organisations from across the UK and overseas.

GeoffPyeISM

Geoff Pye of ISM

Genesys is the ideal ISMS platform for operators of Critical National Infrastructure sites. It’s already proven and operating in sites across the world. ISM recently received formal notification from the Centre for the Protection of National Infrastructure (CPNI) that Genesys has met its standard for CAPSS, which means that this solution is ‘Approved for UK Government Use’.

Geoff Pye, commercial director at ISM, enthused: “Security and Policing 2018 was the perfect platform to showcase Genesys, and particularly so following our recent CPNI approval for use of the system on UK Government sites. The event attracts the right audience and we received some very positive feedback.”

Advertisements

Leave a comment

Filed under Risk UK News, Uncategorized

ISM’s Genesys Enterprise ISMS technology meets CPNI standard for CAPSS

Intergrated Security Manufacturing (ISM) has received formal notification from the Centre for the Protection of National Infrastructure (CPNI) that its Genesys integrated security management system (ISMS) has met the CPNI’s standard for CAPSS.

Genesys will be included in the Catalogue of Security Equipment and can be advertised as being “Approved for UK Government Use. For details contact the CPNI.”

StephenSmithISMNew2018

Stephen Smith

Steve Smith, managing director of ISM, is delighted with the news. “Genesys goes beyond Physical Security Information Management to offer unparalleled scale, redundancy and ease of use for operators of Critical National Infrastructure sites,” stated Smith. “Already in widespread use across the world, Genesys is a proven solution.”

Leave a comment

Filed under Risk UK News

360 Vision Technology and Visual Management Systems guard against cyber attacks

As more and more security systems and devices become IP networked, it’s important for security installers and end users alike to consider how their systems will be protected against the possibility of cyber attacks. Providing a solution to the concerns around cyber security and hacking, CCTV specialist 360 Vision Technology has partnered with software control provider Visual Management Systems to provide security operators with an effective solution designed to guard against IP surveillance system cyber attacks.

Without the right level of network security measures in place, system users can be left vulnerable, resulting in exposure to the type of hacking and malware attacks that have recently hit the news headlines.

A serious security breach of an IP network can lead to system inoperability and network downtime and, at worst, direct access to corporate networks for the cyber criminals.

To provide IP surveillance system installers and operators with peace of mind, when used together both 360 Vision Technology cameras and Visual Management Systems’ TITAN SECURE Physical Security Information Management system can exceed 802.1x authentication protocols and encryption to provide “the ultimate protection” for surveillance networks via the latest patent pending technology.

360VisionTechnologySSL8022C5A19E

Designed to Centre for the Protection of National Infrastructure standards, this advanced protocol and encryption technology is said to offer a “far higher level” of hacking protection.

Advanced cyber attack protection

Ultimately, security and IT managers have much to gain by implementing the security advantages of a 802.1x authenticated network. Conversely, they also have a lot to lose should they ignore the security risks involved.

“As part of our ongoing development of products and deep integration techniques, we looked closely at the vulnerabilities of current camera systems and found that expert hackers could easily take control of standard network cameras, and even those models with HTTPS certification,” explained John Downie, sales director at Visual Management Systems. “Employing 802.1x authentication at both the camera and control end using 360 Vision Technology cameras and TITAN SECURE in combination is the most effective way in which to fully secure an IP camera network.”

Mark Rees, business development director at 360 Vision Technology, added: “Designed to protect organisations against hacking and ransomware attacks, the latest 360 Vision Technology IP surveillance cameras include advanced 802.1x encryption protection. Designed and built in the UK, our high-performance camera technology offers customers proven reliability, advanced imaging performance and effective cyber security for use within any high or general level camera surveillance application.”

Leave a comment

Filed under Risk UK News

Five key security scenarios for OPTEX’s sensors at IFSEC International 2017

At IFSEC International 2017, sensor manufacturer OPTEX will be exhibiting a range of different products and solutions centred around five key security scenarios from perimeter protection and tailgating detection to Internet of Things (IoT)-based alarm systems.

Within a high security perimeter protection zone, OPTEX will showcase its Centre for the Protection of National Infrastructure-approved fibre optic fence detection system. The Fiber Sensys FD-322 Series solution detects intruders climbing or attempting to cut through a fence.

OPTEX’s REDSCAN RLS-3060 can create another layer of security around the perimeter fence to warn if anyone or any vehicle is approaching.

The perimeter intrusion detection systems have been fully integrated with the GEMOS PSIM platform and can trigger video surveillance drones to fly to the point of intrusion and send a live video stream to the Security Control Centre.

OPTEXRedscanIFSEC2017

In a second zone, OPTEX will be showcasing its time of flight technology, allowing visitors to IFSEC gain a better understanding of its capabilities. This technology allows a scene to be mapped in 3D and give an accurate representation of the objects present. It’s used in Accurance 3D, OPTEX’s tailgating detection system for interlocks, and could also be used for other applications such as object protection.

The award-winning laser scan detector REDSCAN RLS-2020 will also be at the show, with OPTEX representatives demonstrating its ability to protect assets and detect people jumping over turnstiles or climbing through skylights. This solution is already proven in identifying small objects or thrown objects being smuggled into restricted areas.

For both commercial and residential security, OPTEX will be demonstrating its new wireless infrared beam (namely the SL-TNR) that works with universal batteries (CR123) and can be partly hardwired, as well as its new range of pre-built beam towers.

OPTEXStoryPanelIFSEC2017

The last zone will include live demonstrations of how OPTEX’s wireless outdoor sensors, including the new VX Shield Series, are ideally suited to IoT applications, sending alarms and other data via the cloud to a smart phone or remote monitoring station.

Jacques Vaarre, managing director of OPTEX, stated: “We feel that the live demonstration route is the best way to show the range of applications that can be achieved with our sensors. In addition to exhibiting at IFSEC International 2017, we’ll also be making presentations in the Borders and Infrastructure and Security Management Theatres to discuss innovations around access control systems and deliver Case Studies focused on protecting critical infrastructure against intrusion.”

Leave a comment

Filed under Risk UK News

Honeywell’s Galaxy Dimension intruder portfolio approved for use in UK critical infrastructure projects

Honeywell has announced that its Galaxy Dimension intruder detection portfolio has been approved for use by UK Government security contractors on high-risk critical infrastructure projects involving the utilities, healthcare and communications sectors, etc.

Along with selected accessories and sensors from the product family, Galaxy Dimension will be included in the Centre for the Protection of National Infrastructure’s trusted Catalogue of Security Equipment.

In addition, Honeywell is offering an extended four-year warranty on the Galaxy Dimension control panel series exclusively for UK critical infrastructure projects.

“This is a testament to the performance of our Galaxy Dimension range and its status as a product that’s fit to protect the assets, networks and systems critical to our national security,” said Daniel Wan, channel marketing manager for the UK at Honeywell. “The solution is a perfect choice for any security application that requires robust, guaranteed performance in complex or challenging scenarios and surroundings.”

Since launch, Galaxy Dimension has become one of Honeywell’s most successful and widely used security systems across a range of different industry sectors, and is frequently the solution of choice for hundreds of security installers in the UK.

Leave a comment

Filed under Risk UK News

Southwest Microwave awarded CPNI certification for INTREPID MicroPoint II perimeter security sensors

Southwest Microwave, the developer of integrated electronic perimeter intrusion detection systems, has recently received Government certification from the UK’s Centre for the Protection of National Infrastructure (CPNI) for its INTREPID MicroPoint II intelligent fence-mounted perimeter intrusion detection sensor.

Focused on the protection of national security and reducing the UK’s vulnerability to terrorism or criminal threats, the CPNI provides protective security advice spanning physical, personnel and cyber/information security. Tasked with recommendation and specification of specific security measures and protocols that deter, detect or minimise the consequences of attack, CPNI employs a range of stringent professional standards to rigorously test and approve physical security equipment for the protection of Critical National Infrastructure (CNI) sites.

Certification of INTREPID MicroPoint II by CPNI qualifies the system as a reliable perimeter fence detection solution for the fortification of CNI installations.

All MicroPoint II system components, including Processor Module (PM II), Control Module (CM II), MicroPoint MC115 (standard) and MC315 (armoured) sensor cables, JB70A Lightning and Surge Protection Module and PS49 Power Supply are now itemised in CPNI’s Catalogue of Security Equipment, published to support key public and private sectors partners in the selection of equipment approved to protect essential national services and assets.

“Our INTREPID MicroPoint II fence-mounted perimeter intrusion detection system has been deployed worldwide to secure critical energy, transportation, Government and industrial sites along with many other facilities linked to CNI,” explained Martin Lomberg, Southwest Microwave’s European general manager.

“The successful accreditation of the MicroPoint II by CPNI reinforces its capabilities as an effective counter-terror solution for the highest security applications, both here in the UK and abroad.”

Leave a comment

Filed under Risk UK News

BSIA issues White Paper on Information Destruction and revised guidance on Lone Working

The British Security Industry Association (BSIA) and its Information Destruction Section has announce the publication of a White Paper designed to be used as a guide for public sector agencies and any organisation wishing to benchmark against that sector and provide the correct protocols in the destruction of sensitive items and materials.

The guide references previously published guidance documents from the Cabinet Office and the Centre for the Protection of National Infrastructure (CPNI) in order to promote the required specifications for data destruction and the importance of secure information destruction.

Entitled Information Destruction in the Public Sector, the document specifies which sensitive materials should be securely destroyed. Furthermore, it defines the varying levels of secure information and documents that should be disposed of in the appropriate manner.

Threat profiles are assessed and analysed in tiers of severity, while the White Paper also affords organisations guidance on specifying the desired outcomes that information destruction should produce.

Adam Chandler, chairman of the BSIA’s Information Destruction Section, has expressed how the White Paper might serve private sector companies and the public sector as a whole.

The security of information is an issue of paramount importance in the 21st Century,” asserted Chandler. “Data breaches can be more than costly. They can ruin a Government’s credibility as well as a private sector company’s reputation. British organisations must fortify their infrastructure by ensuring standards are upheld and that data is adequately disposed of. By adhering to the standards set by the Government and referenced by the BSIA in this White Paper; citizens, employees and civil servants will be better protected.”

*Download the guide in full at: http://www.bsia.co.uk/publications/publications-search-results/257-information-destruction-in-the-public-sector.aspx

BSIA publishes revised lone worker guidance documents

The BSIA has also just published revisions to two of its lone worker guides.

The revisions have been made to Form 144: A Guide to Buying a Lone Worker Service and Form 288: Lone Workers – An Employer’s Guide in order to reflect recent changes in the lone worker services market.

Form 144: A Guide to Buying a Lone Worker Service provides end users with advice on how to go about procuring a lone worker service that will be right for their business and what information needs to be prepared before a potential supplier is approached.

Form 288: Lone Workers – An Employer’s Guide provides employers with essential information about their responsibilities towards their lone workers as well as detail around what they should expect from a lone worker device, its supplier, an Alarm Receiving Centre and the response.

Steve Lampett, technical officer at the BSIA, explained: “The BSIA’s Lone Worker Section decided to update these very useful guides to reflect changes within the lone worker services market. While many of these changes are minor routine amendments, educating the marketplace is a key objective of the Association. On that basis, ensuring industry guidance is up to date is of vital importance.”

Amendments to the guides include the following:

Form 144: A Guide to Buying a Lone Worker Service

  • Reflection of the new requirement placed on the supplier highlighting the need to be flexible in terms of alarm escalation contacts (including at different times of the day/week, escalation and prioritisation processes)
  • Inclusion of a greater emphasis on the supplier to provide ongoing training options for the customer

Form 288: Lone Workers – An Employer’s Guide

  • Changes from BS 8484:2009 to BS 8484:2011
  • Addition of the provision for using the services of BS 8591 Category 2 Alarm Receiving Centres
  • Health and Safety Executive guidance updates
  • Reflecting the name change of the Association of Chief Police Officers by replacing it with the National Police Chiefs’ Council

Craig Swallow, chairman of the BSIA’s dedicated Lone Worker Section, stated: “We wanted to ensure that our guidance remains up to date and continues to be useful for end users to refer to when procuring a lone worker service. The Section therefore felt it necessary to update both Form 144 and Form 288. We expect further changes will need to be made to these forms and other BSIA lone worker publications when the current revision of BS 8484 has been completed in 2016.”

*The updated versions of Form 144 and 288 are available to download free of charge from the BSIA’s website: www.bsia.co.uk

Leave a comment

Filed under Risk UK News