The Chamber of the Republic of North Macedonia for Private Security will organize Days of Private Security 2022 as an annual traditional campaign (organized for the 15th time) aiming at the promotion of the profession, and exchange of knowledge and practices.
The framework of the campaign Days of private security 2022 will include a security fair (21-22.11.2022) and a conference (23.11.2022).
The security fair will be organized for the second time as cooperation between private security and public security, and the local governance (the City of Skopje, Municipality of Karposh) and will bring together private security companies that offer security services for the general public and the community. The official opening of the exhibition will be on 21.11.2022 in Skopje City Mall.
The conference “The Role of Private Security in Critical Infrastructure Protection” will be held on 23 November 2022 in hotel Limak, Skopje.
Take a look at the draft of the agenda at this link.
Uniview has launched three Micro SD cards for different application scenarios, namely blue card, purple card and red card. Blue card features high cost performance, high compatibility and long term stability. Purple card features high performance for fast reading and writing speed, and is widely applicable. Red card features durability, and it is applicable for high durability and extreme temperature. All three cards can be used in consumer electronics and CCTV front-end products.
Why UNV TF cards?
1. All Supply Chain
All link strict supply of raw materials. UNV adopt the top main control chip in the industry, which means excellent write amplification control, and more data can be written with the same capacity and the same number of over writes. In the selection of flash memory particles, we strictly limit original factory particles to ensure the stability of reading and writing. Top domestic packaging manufacturers ensure annual shipments up to tens of millions levels, and good rate up to 99.9%.
2. All Scenarios
All scenario definition specification. Blue card features high cost performance and high stability control for reading and writing speed, and it is suitable for dash cameras, mobile phones, Bluetooth speakers, etc. Purple card features high-speed response, and it suits game consoles and the high frame rate of unmanned aerial vehicle scenario. The reading and writing life of the red card can reach 3000 times, and the operating temperature range is wider, which can meet the monitoring requirements in most scenarios.
3. All Process
All process quality assurance system. Multi-dimensional quality test mechanism provides a pre-sale guarantee, and the global supply system provide son-sale support.
For after-sale services, we provide global offline stores anda7*24-hourhotline, and we also introduce personalized solutions such as replacement repair and buyout maintenance.
In CCTV scenarios, all of our Micro SD cards can be applied. In the field of consumer electronics, our Micro SD cards mainly focus on blue card’s high cost performance and purple card’s high read/write speed. Different application scenarios have different performance requirements for Micro SD cards. You can adopt suitable products for different usage scenarios.
1) Scenarios such as dash cameras, mobile phones and Bluetooth speakers.
In this scenario, there are no special performance requirements for memory cards, but only stability. Customers pay more attention to the price of products. For this kind of entry scenario, we have launched blue card series featuring high cost performance and strict reading and writing rate stability control, which can match low-end flash memory cards of other manufacturers.
2) Scenarios such as game consoles and high frame rate drones.
This scenario’s instantaneous speed will be high. In order to have a better application experience, an A2-level read/write card with a fast response to applications and a high read/write rate of small files is required. It can be our purple card, main for a high-speed response, and improve the game/shooting experience.
3) Scenarios such as IoT and CCTV.
In this scenario, the red card requires 7*24 hours of uninterrupted frequent reading and writing of high-capacity data, as well as the impact of extreme environments in some areas. The reading and writing life of the red card can reach 3000 times, and the operating temperature ranges from-25℃to85°C, which can meet the monitoring requirements in most scenarios. Coupled with the UNV camera, it also introduces the read-write compression technology, which reduces the write magnification and increases the life by 130% compared with other manufacturers’ cards.
In a word, if you are looking for a TF card which offers long time storage, UNV TF card is what you should not miss!
How do you get a startup noticed among the myriad competitors that vie for attention across increasingly crowded markets?
A valid question…to which we respond with the second one: how about partnering with a venerable format such as a trade show event, but in a wholly new way, as expected of a startup?
Three companies from SE Europe – Robotiq, Zuluhood, and Glog have recently discovered that joining forces with a well-established trade event such as Adria Security Summit is a shortcut to getting oneself noticed, growing a partnership network, and getting a glimpse of competitors.
Yes, all under a single roof.
Adria Security Summit, the largest conference, and exhibition dedicated to security and converging industries in SE Europe, recently premiered the official award-laden presentation of the trailblazing startups as part of its latest event in Zagreb (October 5-6 2022).
As part of the program, the most successful startups were handed out three awards for their achievements in this business segment.
The first award went to Robotiq – an AI-first startup that wears its “No BS” badge with pride. It offers to free you from time-consuming and repetitive administrative tasks that are now handled by its software automation tech. By automating your business, you not only phase out the mind-numbing tasks that nobody wants to do in the 21st century, but also bring your costs down, and remove the burden from your precious human and IT resources, all with a promise of 6-12 months for a proper ROI.
Zuluhood, the second-ranked beneficiary of the best-presented startup award, earned its chops for understanding that an omnipresent app format is an ideal umbrella to put all of your home security systems under it. Now, smart home monitoring, family alerts, neighborly response, and professional assistance are literally all under your fingertips.
To round off this trio of tech whiz-kid companies we give you Glog – a startup in which the power of AI is harnessed as an every-watchful eye that remedies all security vulnerabilities in your source code, stamps out false flag positives, and acts as a triage tent between your products and the public that is being presented.
So, just as no startup promoted under the wing of the Summit is a flash in the pan, the same goes for our startup promotion program – the preparations for its second iteration are already underway for the eighth edition of the Adria Security Summit. Stay tuned and learn how we can multiply the value of a trade show format for startups that deserve your attention and our help to get a loud enough voice.
Axis Communications has added a new cyber security feature for its body-worn cameras. Available with firmware release 11.0, signed video provides an additional layer of protection for body worn solutions helping to enforce trust in video evidence. This valuable feature adds a cryptographic checksum into the video stream allowing the video to be reliably traced back to the unique Axis camera where it was produced and verifying that the footage hasn’t been tampered with.
Whether in criminal or civil investigations, it’s vital that the authenticity of video surveillance can be presented without question. Because any doubt, however small, can be used to undermine the relevance of the video evidence. Now, thanks to signed video, it’s possible to verify the authenticity of video throughout the entire chain of custody.
Within Axis cameras, signed video uses the Axis Edge Vault hardware component, one of the key security features built into Axis products. Axis Edge Vault is a secure cryptographic compute module which can be used for cryptographic operations on securely stored certificates. It provides tamper-protected storage, enabling each device to securely store sensitive data and provide for secure execution of applications. In addition, the feature is easily integrated thanks to open-source framework.
Axis body worn solutions allow wearers to view video files on a mobile device or even in the VMS/EMS after the camera is docked and synched. However, for security purposes, camera wearers cannot access or share footage directly from the camera. Signed video provides an additional layer of protection for body worn solutions so assurance is promised that the authenticity of video evidence is protected—from the point of capture to the court room.
ASSA ABLOY has acquired Bird Home Automation GmbH, a German manufacturer of high-quality IP door intercom for single and multi-family buildings, for indoor station or smartphone control, marketed under the trademark Doorbird.
“Doorbird is a strategic technological addition to the ASSA ABLOY Group and will reinforce our offering with IP door intercom and provide complementary growth opportunities,” says Nico Delvaux, President and CEO of ASSA ABLOY.
“I am delighted to welcome the Doorbird team to the EMEIA Division. This acquisition supports our efforts to accelerate our growth in the Smart Residential segment and continue our journey as a leader in home security. Doorbird has built a successful and attractive product and service offering, that is highly respected in the markets they serve, and I look forward to working with them on their evolution within the ASSA ABLOY family,” says Neil Vann, Executive Vice President of ASSA ABLOY and Head of EMEIA Division.
Doorbird was established in 2014 and has around 110 employees, with its main office located in Berlin, Germany. Sales for 2021 amounted to about MEUR 21 with a strong EBIT margin.
Adria Security Summit 2022, the largest conference and exhibition dedicated to security and converging industries in SE Europe, closed its doors on October 6 following a two-day event that took place in the Croatian capital of Zagreb.
The organizers have reported report that this event has been the largest and the most successful one so far, continuing the upward trend that the Summit experienced since its inception.
With 2500 visitors from more than 30 countries and 136 sponsors and exhibitors, the event has not only signaled the full recovery of a whole range of industries following the pandemic but rather its potential to cover new grounds as it breaks new records. For the sake of comparison, let us recall that the last year’s event in Belgrade has seen more than 70 exhibitors and 1500 participants.
Next, a total of 48 presentations and side events, all helmed by eminent experts, touched upon every hot issue across the industries, including security, smart cities, home automation, mobility, cyber security, ICT, and IoT.
Case studies also figured prominently during the event, with top-ranking presenters being handed over awards for the most innovative projects. This time, the honors went to the 1st ranked company Securitas Croatia for its achievement in managing the projects involving perimeter protection along the Croatian borders.
The second award went to Konica Minolta for its case study of the way in which modern-day video technologies can easily extend their application and usefulness beyond security implementations, while Hikvision secured the third place for its case study of the implementation of converged technologies in the Amadria Park resort in the Croatian town of Šibenik.
To round things off, the Summit also premiered the official presentation of the trailblazing startups across industries. They were presented with appropriate awards for their achievements in this business segment which was dominated by Robotiq (1st award), Zuluhood (2nd award), and Glog (3rd award).
The organizers expressed satisfaction with the event and its attendance and thanked all participants for their part in the organization of the event on the largest scale so far. A comprehensive report on the event as yet another success story for the Adria Security Summit brand will be published in the next issue of Adria Security Magazine.
Adria Security Summit will continue its journey in 2023 – stay tuned for more news.
Security Essen has long been one of the central events in the calendar of security professionals. Therefore, after a four-year break caused by the pandemic, as well as the organizer’s decision to continue holding the fair in even years, there was a great interest by our editorial team to see the latest technological innovations and meet famous faces again.
However, interest waned somewhat when we saw that only three and a half halls were open and full, compared to the former twelve. With 1,040 exhibitors and more than 40,000 visitors from 119 countries in 2018, the fair dropped to 383 exhibitors and 17,000 visitors. This is a 63.1 percent decrease in the number of exhibitors, and a 57.5 percent decrease in the number of visitors. Big players such as Bosch, MOBOTIX, Axis, Milestone, ZKTeco etc. were absent, further impoverishing the once impressive event.
Focus on higher ranking visitors
The organizers, on the other hand, interpreted the situation differently. The CEO of the fair, Oliver P. Kuhrt, said that “the exhibitor presentations were top-class and led to intense discussions”, shifting the focus to the quality of the exhibited technologies, and that “with Security Essen, they offer the industry a strong strong platform in a strong market”, meaning the German market, where turnover in this economic sector increased by 7.5 percent to more than 24 billion euros last year. Also, the decrease in the number of people who came to learn about the latest available products and solutions was interpreted as a reflection of the trend of attracting more high-ranking visitors, because, according to the organizers, 77 percent were decision makers who invest or arrange investments in their companies. Such, they say, were “very satisfied with their visit to the trade fair – particularly with the wide range of products and services covering all areas of civil security, as well as the presence of many market leaders and industry giants”.
Telenot was one of them. “We have seen a clear trend towards better quality visitors. Whether they represented industry, corporate groups or retail chains, the security professionals who came to specifically Security Essen were all highly trained experts. There was great interest in both our professional access control technology and our new motion detector, which was presented during the fair and is already available on the market. The numerous specialist installers particularly asked about our even larger range in the area of intrusion and fire alarm technology. Security Essen 2022 has surprised us in a good way. We will definitely be back in 2024,” said Peter Wunderle, CEO of Telenot.
AI, digitisation and cloud solutions as main trends
It was clear that artificial intelligence (AI), digitisation and cloud solutions will significantly shape the future of civil security. Among other things, learning robot systems were on display, which carry out site surveillance tasks or provide information as visitor assistants. There was also strong interest in complete systems, where software, terminals, administration, analysis and maintenance services all come from a single source. As the progress in AI, Internet-of-Things technology and digitisation requires storage space for use and the amounts of data generated, cloud solutions were also in demand. Associated storage systems are also becoming increasingly important.
Start-ups had brought along plenty of new ideas for the security industry. At the joint stand sponsored by the Federal Ministry of Economics Affairs, they demonstrated intelligent robot systems designed as dogs, innovative solutions for recording working time and even storage containers for valuables hidden in inconspicuous furniture.
In the next, 183rd issue of the a&s Adria magazine, we will talk more about the technological innovations that we had the opportunity to see and hear at the stands of some of the world’s largest companies.
Save the date
The high level of satisfaction among trade visitors and exhibiting companies is reflected in the trade fair surveys. Nine out of ten visitors would recommend Security Essen to others. Nine out of ten companies expect good post-fair business due to the positive course of the fair. Almost all exhibitors stated that they had reached their most important target groups. Already now, 89 percent of the visitors and 88 percent of the exhibiting companies stated that they would be present again at Security Essen 2024.
The next Security Essen will take place from 17 to 20 September 2024 at Messe Essen. Interested exhibitors can find the registration documents online at www.security-essen.de.
The national railway company of Belgium, NMBS/SNCB, has successfully deployed a real-time location service platform with BEEKs Bluetooth Low-Energy (BLE) beacons from HID to accurately monitor train location and ensure on-time departures.
NMBS/SNCB maintains and operates 3,607 kilometres of track and approximately 30 train stations throughout Belgium with passenger safety and on-time departures serving as key priorities. Prior to the HID solution, when an approaching train reached a preset GPS coordinate, an app on the onboard attendant’s smartphone would signals software at the station to start running the digital safety-check programme to ensure passengers can safely disembark and the train can depart for the next station on schedule.
However, many locations such as tunnels, have limited cellular coverage. When this happens, the train’s GPS location can appear as far as 10 kilometres away from the station, thwarting the entire safety check process.
“We knew we had to find a different way to mimic someone’s location within the vicinity of the station. That is when the idea of using HID beacons to transmit a specific ID came into play,” explained Nathan Willekens, Innovation Project Manager, NMBS/SNCB.
NMBS/SNCB deployed HID Global’s real-time location services (RTLS) platform and BEEKs Bluetooth Low-Energy (BLE) beacons on its platforms to ensure the safety check process would not be compromised. Now, when the system detects the Bluetooth device, it is given priority over the potentially inaccurate GPS signal.
“We were impressed not only with the accuracy — we knew with more certainty that the train was in the location identified by the beacon — but also by the efficiency with which the beacons were able to operate and the area they could cover,” said Willekens.
According to HID Global, NMBS/SNCB is planning the system to be deployed in at least 10 additional stations across Belgium.
The Open Security & Safety Alliance (OSSA®) Continues to Innovate
for the Industry, By the Industry
The Open Security & Safety Alliance (OSSA®) was founded in late 2018 by major industry stakeholders to enable an influx of innovation across the security and safety markets. Our industry body is comprised of member companies from all facets within the security, safety and building automation categories – and together we work to 1) create device harmony, 2) ensure proper matching of demand and supply between devices, apps and audiences and 3) ensure we adhere to appropriate cyber security standards.
Specifically, over recent years, our members helped guide the creation of open standards that (when applied) allow for easy and cyber-secure integration of third-party AI analytics applications to run agnostically on video cameras, gateways and other computer vision/smart camera devices. This group of industry experts drives an open platform principle to open up the industry and take IoT security and IoT surveillance to the next level.
OSSA® Application Interface Specification: This technical specification defines a set of four interfaces which collectively enables third-party software applications to run on video security cameras following the common OSSA Technology Stack.
OSSA® Compliant Camera Definition Specification: This technical specification sets the core system requirements for video security cameras following the common OSSA Technology Stack to provide a basis of trust and to ensure app interoperability across vendors.
OSSA® Camera Cyber Security Specification: This technical specification contains definitions and guidelines regarding mandatory and optional cyber security measures for cameras. The mandatory part of these guidelines will be used as an input for the OSSA certification framework that’s forthcoming.
Hardware manufacturers simply design IoT smart cameras according to OSSA specs, and end-users gain access to an unfolding forum of AI advancements and business opportunities (see Driven by OSSA details and products here). Technology company and OSSA member Azena created a corresponding and agnostic operating system (OS) that connects with the industry’s biggest online Analytics App Store in support of this collaborative issue.
Making Data Flow to Enable Flexible IoT Solutions
Now, in 2022, we are further refining the Alliance’s focus by standardizing consistent and uniform data interpretation and consumption, thereby opening the door for security and safety solutions and sensors to gain a better understanding of each other’s data sets.
Members are expanding their attention from realizing third-party applications on brand-agnostic cameras and AI boxes/gateways, to designing corresponding ontologies and communications protocols to further unlock data produced, stored and (currently) confined to millions of “things” – things that have the potential to share important digital data that can help us not only ‘see’ but more importantly ‘sense’ and ‘understand’ what’s happening across an area under surveillance. For example, providing the ability to intelligently cross-reference or combine data from a simple CO2 meter with that from other “things” such as video security cameras to detect and respectively verify if a meeting room is occupied or not.
The Alliance’s push to make the sensing data that our industry constantly produces better and more uniformly consumable and interpretable across the aisles (i.e., across brands, devices, applications and beyond) is an important next step for us all. Tapping into stagnant data reservoirs and enabling resources to securely flow data outside of current digital siloes will open up a tremendous new corridor of IoT-based possibilities.
More good work needs to be done. And we welcome additional industry experts and innovators to join our effort. Participation levels are flexible and completely up to you. We offer very affordable membership levels – and there is an open seat waiting at the OSSA table for anyone with an interest in bettering our category alongside other forward-thinking individuals and organizations.
We look forward to more good industry collaboration from the Adria Security Summit October 5-6 in Croatia. Stakeholders from all areas within the security industry continue to meet up at points around the planet to align and bring more intelligence to our security and safety systems. OSSA’s security alliance members are at the center of important orchestration – and we look forward to bringing new participants into the fold to help steer the next chapter in security. Connect with us here!
Whereas Avigilon has been a Premium Technology Partner of Advancis ever since last year already, Advancis is vice versa now also part of the Technology Partner community of Avigilon.
Avigilon Control Center (ACC) video management software is completely integrated in the Winguard open PSIM platform from Advancis, so that it is possible to observe live streams, control cameras (PTZ), request playback videos, and more. Advancis’ Winguard ACC integration is compatible with ACC6 and ACC7 versions.
Laura Flamm Technology Partner Manager at Avigilon, states: “With this integrated solution, situational awareness is enhanced for the end users and provides efficient and intuitive security information management capabilities.”