Home Archive by category Security Services (Page 4)

Security Services

NIS2: WinGuard Facilitates the Implementation of New European Cybersecurity Directive

The European Union has taken a significant step towards bolstering cybersecurity with the introduction of NIS2, the second version of the “Network and Information Security Directive.” This directive sets new standards for the security of networks and information systems in critical sectors, affecting EU member states and the Balkan countries.

The primary goal is to strengthen the resilience of networks and information systems and improve security standards across critical sectors. This includes establishing cybersecurity authorities and fostering collaboration among European countries and institutions. Companies, especially those in critical infrastructure sectors such as energy, transportation, health, and finance, are called upon to act. This involves implementing and enforcing security measures, reporting and documenting security incidents, collaborating with authorities, and implementing risk management procedures to identify and mitigate potential risks.

WinGuard can provide valuable support in this context by offering central security management functions, compliance tools, and automation options, thus enhancing the physical security of buildings as well as networks and information systems.

1. Integration of Security Systems: WinGuard aids companies in optimizing their existing security resources by integrating a wide array of existing IT and security solutions, such as access control, video surveillance, and intrusion detection systems. All integrated security systems and infrastructures are monitored and managed through a central platform, WinGuard. This enhances the monitoring and management of physical security measures, ensuring uniform and rapid identification and response to security incidents.

2. Incident Management: WinGuard facilitates the recording, prioritization, and handling of incidents, enabling more efficient responses to security incidents.

– Monitoring: Events and alarms from various systems can be monitored in real-time, forming the basis for early reactions to potential attacks.
– Automatic Alerting: When security incidents or anomalies are detected, the platform can automatically trigger alerts and notify the relevant personnel. This ensures swift responses to security incidents and the implementation of appropriate measures to maintain security.
– Automation and Orchestration: WinGuard’s ability to automate and orchestrate various security systems enables companies to implement and manage security measures more efficiently. Thus, Security responses are quicker and more coordinated.

3. Continuity Planning: WinGuard supports the creation and management of emergency and continuity plans, ensuring that critical business processes can be maintained even during physical security incidents which is crucial for the resilience of critical infrastructures.

4. Compliance and Reporting: Through automated reporting functions necessary information related to security-relevant incidents and measures are meticulously documented and analyzed. The generated compliance reports can be useful for internal audits and communication with supervisory authorities.

5. Risk Management: By integrating risk management tools, WinGuard helps companies identify, evaluate, assess, and mitigate potential risks and vulnerabilities on a regular basis.. This allows potential security gaps to be detected and addressed, minimizing risks before they lead to incidents.

6. Compliance Management: WinGuard enables companies to define and enforce security standards. This includes data encryption, secure password usage, and firewall implementation. The platform continuously monitors these security measures against current regulations and initiates immediate corrective actions in case of deviations.

7. Training and Emergency Drills: WinGuard can provide information and instructions via the platform to aid in awareness-building of employees. Additionally, it can simulate security incidents and conduct emergency drills to improve preparation for real threats.

For affected companies and managers, NIS2 presents both a challenge and an opportunity. They must ensure their IT infrastructures meet security standards and implement appropriate protective measures. The directive offers the chance to use cybersecurity as a competitive advantage and boost customer trust in data security.

Conclusion: NIS2 is a significant development for cybersecurity in Europe. Solutions like WinGuard play a crucial role in implementing these directives by helping companies effectively protect their networks and information systems. WinGuard raises security standards and enhances resilience against cyber-attacks. Through central integration and management of security systems, real-time monitoring, detailed documentation, and proactive risk management, WinGuard offers a robust solution for improving physical security and ensuring compliance with NIS2 requirements. This enables companies to meet NIS2’s demands and elevate their cybersecurity to a new level.

Milestone Systems Releases Insightful Thought Paper on Cybersecurity for Video Technology: Key Strategies to Combat Cyber Threats

Milestone Systems, a pioneer in data-driven video technology software, recently published a comprehensive thought paper addressing the critical need for robust cybersecurity measures in video technology solutions. The paper titled “Cybersecurity for video technology: Understanding and countering cyber threats” delves into the complexities of cybersecurity in video surveillance, offering invaluable insights and strategies to fortify organisations against cyber threats.

Cyber threats pose a significant risk to video technology solutions in today’s digital age, as evidenced by high-profile breaches. The thought paper underscores the urgency of prioritising cybersecurity and provides a roadmap for technology decision-makers to navigate this evolving landscape effectively.

The thought paper by Milestone Systems dives into crucial aspects of cybersecurity precautions, providing insights into essential concepts for companies to ensure robust protection against cyber threats.

Below are some key takeaways from the thought paper:

Understanding the Cyber Kill Chain:

Identifying the Cyber Kill Chain offers organisations a systematic approach to understanding and mitigating cyber threats. Breaking down attacks into seven stages makes it clear where proactive defences can be deployed to minimise the risk of breaches.

Protecting IP-Network Video Cameras:

The paper recognises vulnerabilities in IP-network video cameras and emphasises the importance of implementing strong security measures. Measures such as robust authentication protocols and regular firmware updates are vital in fortifying defences against potential risks.

Securing Video Management Software (VMS):

Highlighting the significance of securing Video Management Software (VMS), the paper advocates for proactive strategies like penetration testing and engaging ethical hackers. These measures bolster security and ensure resilience against potential threats.

Responsibility for Cybersecurity:

The paper distinguishes between the responsibilities of on-premises and cloud solutions and underscores the necessity of technical proficiency and transparent communication. By understanding their roles, organisations can effectively manage cybersecurity risks.

Openness and Transparency:

The paper stresses the importance of openness and transparency in addressing cybersecurity vulnerabilities. By openly acknowledging weaknesses, vendors empower customers to take proactive measures, foster collaboration, and enhance the overall cybersecurity posture.

Addressing the Human Factor:

Acknowledging the human element as a potential weak link in security, the paper emphasises the importance of education, training, and balancing security and usability. Prioritising human-centric security practices enhances overall cybersecurity resilience.

Download the full thought paper

Commenting on the release of the thought paper, Jos Beernink, VP of EMEA at Milestone Systems, stated, “In an era where cyber threats loom large, safeguarding your video technology against potential breaches is paramount. Our thought paper is a useful guide for organisations to navigate the complex cybersecurity landscape effectively. By implementing the strategies outlined in the paper, organisations can strengthen their defences and mitigate the risk of cyberattacks.”

Building a Strong Cybersecurity Foundation for Your Video Solutions

In today’s digital world, it’s little surprise that cybersecurity is top of mind in many boardrooms. Indeed, 96% of CEOs say that it’s essential to their organisation’s growth and stability, according to Accenture.

And they are right to be concerned, because cybercrime is projected to cost the world a staggering $9.5 trillion USD in 2024 according to research firm, Cybersecurity Ventures. Such losses can be business-ending, without even considering the cost of reputational damage and unscheduled downtime.

By Jos Beernink, Vice President EMEA at Milestone Systems

The cyber-risks of video

Being aware of the risks of an insecure video surveillance system – and how to mitigate these – is therefore a critical skill for all security leaders. Cameras, connected sensors, and video management software (VMS) can present attractive targets for malicious actors, thanks to the data collected by them. This data can be used for blackmail or to gather confidential information. Hackers can sell footage of your building layout and staffing levels at different times of the day to criminals, for example.

IP cameras can also be used as gateway devices for larger attacks, including global distributed denial of service (DDoS) attacks that use connected cameras and other devices to send a flood of traffic to targeted websites and other infrastructure.

When it comes to protecting businesses, no two systems will be the same. The protections for a school will be very different to that of a data centre or solar farm. The first step in protecting your organisation and its surveillance systems, therefore, is understanding what needs to be protected, how, and from whom. Plus the potential damage that can occur when (not if) an attack happens.

The NIS2 Directive

Protecting your camera and video systems is about to become even more important due to the incoming NIS2 Directive, a Europe-wide legislation that aims to boost the overall level of cybersecurity in network and information systems. Any surveillance installation that falls within targeted “essential” industries will be impacted by this (these include the energy sector, transport, banking, public administration, and digital infrastructures).

Under NIS2, users are required not only to assess their own systems, but also conduct a comprehensive risk assessment to ensure their entire supply chain is compliant. In today’s interconnected systems, achieving compliance across the supply chain can be challenging.

By way of an example, the Log4j vulnerability recently affected millions of computers across the world, and highlights the direct impact on systems utilising this open-source logging library as a small part of their software suite. It’s notable that a few software manufacturers, including Milestone Systems, which prioritize secure design and avoid any use of open source, remained unaffected.

The NIS2 Directive recognises that physical security threats pose a significant risk to organisations with digital operations. Installing cameras and other systems to control access to digital assets like server rooms and data centres is vital. Such organisations will need to take active, ongoing, steps to ensure their video network’s security is as robust as possible.

The importance of physical security

One unique aspect of video networks is how many devices are located in public, potentially vulnerable, areas. Most organisations need to install cameras to monitor busy areas, entrances and exits to restricted areas, or remote parts of a site. This can have the effect of putting cameras at higher risk; making it easier for attackers to gain access and disconnect devices. This means that multi-layered security to keep devices safe and separate from the wider IT network is essential. It also means that without adequate protection, a video surveillance system can be less secure than a classical IT system. That’s worth bearing in mind when addressing your video and IT network cybersecurity as a whole.

Everyone’s responsibility

The NIS2 Directive emphasises that IT and security work together to build a robust cybersecurity strategy. Your IT team will need to be closely involved when implementing your video cybersecurity strategy. They will work with you on some of the foundational elements of protecting your VMS and connected devices, because of their experience in areas like virtual private network (VPNs) and virtual local area networks (VLANs).

Knowing who takes care of what, can help you to assign accountability for things like upgrades, auditing, and penetration testing. Sometimes an external party, like a manufacturer or installer, is responsible for some aspects of your cybersecurity. Therefore, when starting your cybersecurity strategy, you’ll need to check:

  1. Assess the nature of the business – and its goals.
  2. Determine the local rules and regulations.
  3. Confirm who is responsible for maintaining your system.
  4. Ask who monitors your system. Unusual traffic or alerts of technical errors can be an indication of a cyber-attack.
  5. Be clear about who has access to your video and computer network. Is the level of access appropriate to their needs? Does an operator have too high a level of access, or does someone who has left your organisation still have login credentials?

Speaking of access, you’ll also need to consider physical elements like who has access to a VMS server room. Alarms and access control measures can help to prevent unauthorised individuals from getting into sensitive areas where your video data is located.

Consider the human element

It’s worth considering your overall training program, as the human factor can be a significant weakness in your cybersecurity — accounting for between 88 to 95% of data breaches, according to a joint study by Stanford University Professor Jeff Hancock and security firm Tessian. Even something as simple as re-using a personal password to log into a VMS account, or falling for social engineering attacks (like an ‘urgent’ email from a manager requesting account details) can undermine every technical cybersecurity feature you implement.

Hence why regular training for your security team is important, as it can keep them updated on the latest threats and new ways to protect themselves and your system from harm. User control can also assist here, with admin and data access rights only given to those who require it. Assigning different VMS user credentials will (hopefully) prevent password sharing and allows you to remove a user’s access when they leave your company.

Foundational cybersecurity measures

Alongside this, there are some basic foundations that you can ensure you’re following to make your video system less attractive to attackers. These include updating your cameras’ firmware and VMS device drivers to the newest versions. Updates are typically made on an ongoing basis, so make sure your camera manufacturer issues regular security updates that include vulnerability patching and additional protections against new threats. Much like how keeping your smartphone or laptop updated reduces the risk of a hack, staying up to date with your VMS and camera updates will make them less attractive to hackers.

Disabling your cameras’ built-in admin account, or changing the default password is one of the first things to do when installing a new device. Then you can ensure your cameras are only supporting HTTPS (the secure version of HTTP).

To ensure the best protection, your chosen password should be a combination of lowercase and uppercase letters as well as special characters and numbers. They should contain no easily guessable words or phrases – using the word ‘password’ is an absolute no! Passwords also shouldn’t contain any information that identifies a user, or that a hacker could gain off of their public profiles and social media. As importantly, VMS accounts shouldn’t be shared by multiple users.

Keep your networks separate

Generally speaking, it’s a good idea to keep your video network separate from your wider IT network. You can do this through VPNs (which is essential if you have people accessing your systems remotely, outside of your local network), and through VLANs that keep your video system partitioned and isolated from your other computer systems. If your cameras or VMS are compromised, for example by someone accessing a device located on the street or from an operator unwittingly using a USB with malware on it, a hacker cannot use your video system to access more of your organisation’s data. It serves to limit the damage.

The importance of multi-layered security

A widescale breach in 2021 offers a hard lesson in what can potentially go wrong when you fail to secure your camera systems effectively. A cyber-attack on a system provider in the USA exposed video recordings from 150,000 cameras, but also the sensitive financial information of high-profile customers. Hackers gained access to the provider’s systems using a username and password that was exposed in the public domain. This illustrates the importance of good password habits (regular password changes, using hard-to-guess passwords, and training people not to share their passwords with others).

Over 100 employees had ‘super admin’ privileges in the provider’s system, which gave access to footage from thousands of customer cameras, unknown to them. Setting the right access level for each user, ensures that the risk and potential spread of a hack is limited. Put another way, the more admins you have, the more targets there are for hackers to exploit.

Finally, alongside camera footage, hackers could also access sensitive financial and customer information through the breach. Separating your video network from your IT network limits how far a hacker can go if they do access your system. It prevents them from accessing your business’ financial and product data, operations, and other sensitive systems.

Cybersecurity is continuous

With all that said, every system will have vulnerability and the cybersecurity space is constantly evolving. Being aware, in control, and responsible when using video will go a long way in protecting your organisation.

To help you on your journey towards a cybersecure video network, Milestone Systems is hosting a series of cybersecurity webinars. Whether you are starting out on cybersecurity or are looking at building on existing cyber measures, these webinars and events will help you build resilience in your video system. More details of these webinars, including the first webinar on the foundational elements of a video cybersecurity strategy, can be found here: t.ly/nuvno.

Learn what Milestone can do for your organization. Our video management software (VMS) can be customized to meet your every need. From keeping people and property safe to operating businesses more efficiently. We invite you to experience the power and functionality of Milestone’s VMS software through the exclusive Demo Trail, providing a hands-on experience with our state-of-the-art video management solutions.

About Milestone Systems

Milestone Systems is a leading provider of data-driven video technology software in and beyond security that helps the world see how to ensure safety, protect assets, and increase business efficiency. Milestone enables an open platform community that drives collaboration and innovation in the development and use of network video technology, with reliable and scalable solutions that are proven in more than 500,000 customer sites worldwide. Founded in 1998, Milestone is a stand-alone company in the Canon Group. For more information visit: www.milestonesys.com. For news and other press releases, visit our Newsroom.

 

LiDAR: How It Transforms Airport Security

Security is an important part of airport operations. More and more, LiDAR or light detection and ranging is used to boost airports’ security and efficiency. This article takes a closer look.

Source: William Pao

Needless to say, airports attach great importance to security, especially amid heightened security issues at airport facilities. According to Osprey Flight Solutions, from January to July 2022, the company issued five alerts reporting shootings at Dallas Love Field, Miami, San Francisco, Greenville-Spartanburg and Nashville airports, some of which resulted in disruption to airport operations. Osprey also issued three alerts highlighting stabbing incidents that have affected aviation workers and passengers in 2022 at San Francisco Airport and Boston Logan International Airport. To counter these issues, airports adopt advanced security systems such as video surveillance and access control.

Why is LiDAR good for an airport?

Increasingly, LiDAR is also used in airports to enhance security, operational efficiency as well as passenger experience. LiDAR works by way of shooting laser pulses into the environment; the pulses bounce off objects and return to the sensor, allowing the system to draw a highly detailed 3D map of the surroundings. More and more, it’s found its way into airports due to its various advantages.

“In 2023, several leading international airport groups initiated substantial LiDAR projects that will bring advanced people flow monitoring capabilities to tens of thousands of square meters in 2024,” said Raul Bravo, President and Founder of Outsight. “This technology is now recognized as the next generation for monitoring people flow, curbside, and parking areas. This shift to covering large zones, such as complete terminals or even entire airports, follows an initial phase where stereo-vision cameras were predominantly used in local and relatively small-sized areas to monitor touchpoints, like passport control zones.”

“The practical applications for 3D LiDAR solutions are game changers for enhanced airport physical security and business operations, and the ability to improve the traveller experience from the curb to the boarding gate. From a technological perspective, 3D LiDAR solutions can continuously track people in large and dense environments with extreme accuracy, seeing far beyond the limitations of conventional 2D video imaging and analytics,” said Enzo Signore, CEO of Quanergy Solutions.

Indeed, LiDAR offers certain advantages over other types of security systems, for example, video surveillance. In particular, privacy protection is a major benefit.

“Besides reliable detection of unauthorized intrusions with a low false alarm rate, data privacy is particularly important at airports. LiDAR captures data anonymously, ensuring the preservation of individuals’ privacy rights. With a larger field of view and more flexible mounting options, LiDARs are also more cost-effective than cameras because there is only a smaller amount needed to cover the desired area,” said Florian Petit, Co-Founder and Chief Experience Officer (CXO) of Blickfeld.

“LiDAR, when used with the right processing software, is increasingly preferred in airports due to its precision in tracking passengers’ journeys and its inherent anonymity. This technology does not capture any personal details, aligning with privacy laws like GDPR, and reducing legal and ethical concerns. This anonymity also increases LiDAR’s acceptability among passengers and staff, enhancing airport security and operational efficiency,” said Bravo. “Additionally, the industrialization of LiDAR technology has significantly reduced costs. Outsight uses RoboSense’s LiDAR in several airport applications. Because RoboSense is now able to mass-produce their LiDAR, these solutions have become more affordable than traditional camera or stereo-vision systems and deliver higher value.”

LiDAR airport application

Generally speaking, LiDAR has security and non-security applications at airports. Not only can they secure airports, but they can also enhance operational efficiency and the user experience. Below we take a closer look.

Security

According to Signore, in terms of security, a breach in the perimeter, even just one, can potentially bring airport operations to a standstill, leading to flight delays and compromising the safety of travellers and personnel. “The consequences may include significant financial repercussions for airports, encompassing substantial fines, damages, and the loss of millions of dollars in revenue,” he said. “3D LiDAR is a proven technology for superior perimeter intrusion detection applications. 3D LiDAR also provides a highly effective means of eliminating tailgating and piggybacking through security mantraps and revolving doors into secured areas, which is a prevalent security challenge in busy airport terminals.”

“Unauthorized access to critical areas, such as aircraft parking zones, must be promptly detected, triggering an immediate alarm for swift intervention by security personnel,” Petit said. “Simultaneously, the detection solution must only trigger an alarm for unauthorized human entry. Intrusion detection systems lacking 3D LiDAR data often fail in this regard, resulting in numerous false alarms, triggered for example by vegetation or animals.”

Operational efficiency

LiDAR can provide insights into occupancy and foot traffic at the airport. This, in turn, can help operators allocate resources more effectively.

“From an operational perspective, LiDAR facilitates the real-time, effective allocation of resources and staff management. Advanced software solutions, such as those offered by Outsight, introduce unique features like the automatic detection of overflowing queues. If not addressed promptly, such situations can lead to a diminished passenger experience,” Bravo said.

“A 3D LiDAR solution delivers new sources of data-driven intelligence on pedestrian and vehicular movements and density/occupancy, providing airport management with insights to better allocate personnel resources and processes. This includes everything from baggage handling to queue management for deliveries and food/retail areas, and personnel and traveller transportation services,” Signore said.

Improved user experience

This, then, can lead to a better user/traveller experience at the airport. “A 3D LiDAR provides the unparalleled ability to simultaneously track up to 600 individuals in crowded terminals, including check-in areas, security checkpoints, boarding gates, retail and dining areas, and baggage transport systems and claim areas. Here, the people and vehicle counting and tracking can assist with queue management to monitor and manage wait and dwell times to ensure smoother operations, which ultimately enhances the traveller experience,” Signore said.

How to Successfully Deploy a LiDAR System in Airports

As we mentioned earlier, LiDAR is increasingly used in airports for security and non-security purposes. But how can a LiDAR system be set up right? This article takes a closer look.

LiDAR has increasingly found its way into airports. LiDAR stands for light detection and ranging and works by way of shooting laser beams into the environment and analyzing the beams that return. More and more, it’s used by airports as a viable solution not just for security, but for operational efficiency as well.

“To avoid lengthy waiting times at the security checkpoints, passenger volumes and movements in the check-in hall can be detected and analyzed. LiDAR-based people counting technology allows the staffing of the security checkpoints lanes to be adapted to the actual passenger traffic,” said Florian Petit, Co-Founder and Chief Experience Officer of Blickfeld.

Advantages over video surveillance

Indeed, LiDAR offers certain benefits to airport operators, compared to conventional security systems such as video surveillance. “3D LiDAR sensors can cover a very large area compared to traditional cameras by an order of magnitude. Coupled with its hyper-accuracy, 3D LiDAR provides a significant total cost of ownership (TCO) advantage, which becomes even greater when considering the cost of infrastructure, cabling, and deployment. In short, you only need a few LiDAR sensors to cover the same area that would otherwise require several cameras to monitor,” said Enzo Signore, CEO of Quanergy Solutions.

Raul Bravo, President and Founder of Outsight, agrees.

“While LiDAR technology used to be quite expensive and more on the prototype level, it’s now much more accessible both in terms of cost and performance,” he said. “The value you get from (Outsight partner) RoboSense LiDAR these days is impressive. Thanks to the company’s technological progress and increased production, it’s become a more affordable option compared to regular camera systems. What adds to its cost-effectiveness is using fewer units per square meter, cutting down on everything from hardware costs to installation, wiring, networking, and ongoing maintenance.”

Bravo adds that the cost saved from false alarms reduction achieved by LiDAR can also be significant. “LiDAR’s advanced features significantly mitigate the issue of false alarms, a major concern in security operations, where false alarm rates can reach as high as 97 per cent, leading to alarm fatigue and potential security lapses. In 2022, these false alarms cost an estimated US$1.8 billion in wasted resources. LiDAR, especially when paired with sophisticated software, marks a significant advancement in this area,” he said.

Working in conjunction with cameras

Yet this doesn’t mean LiDAR can’t work in conjunction with cameras in airports. In fact, both technologies can complement each other quite well.

“3D LiDAR can easily become the ‘third eye’ of any security camera system. 3D LiDAR sensors provide object geolocation with pinpoint accuracy to the PTZ cameras to enable a ‘slew to cue’ workflow so the cameras never lose sight of the people/objects identified for tracking,” Signore said.

“In many scenarios, after the detection of unauthorized intrusions with LiDAR technology, cameras are employed for verification, which can also be beneficial in airports. However, careful attention must be paid to protecting individuals’ privacy rights in this process,” Petit said. “The high resolution of the data provided by the Blickfeld Security solution can in certain cases eliminate the need for cameras for verification and distinguish people anonymously from other objects.”

Deploying a LiDAR system in airports

As with other types of security solutions, deploying a LiDAR system in airports requires careful planning and a thorough understanding of the airport environment.

“3D LiDAR deployment at commercial airports needs to be strategically planned and deployed just like a security camera-based solution to ensure that the desired wide area coverage is obtained,” Signore said.

“The optimal installation depends on the specific local conditions. Typically, an installation on the hall ceiling or other elevated areas is recommended, allowing the sensors to have a comprehensive view and minimizing the number of devices required. With Blickfeld’s Qb2 LiDAR solution, installation and operation are notably straightforward. This is due to the software on the device requiring less cabling, and the possibility of WLAN transmission of the data,” Petit said.

According to Bravo, successfully deploying a LiDAR solution hinges on three critical aspects: engaging with LiDAR technology experts, ensuring distinct expertise in hardware and software, and utilizing advanced 3D simulation software.

“The complex nature of LiDAR technology necessitates collaboration with seasoned professionals. This specialized technology requires expertise that many companies, traditionally offering old-fashioned solutions like Wifi tracking or Stereo-vision, may not possess,” he said.

Bravo added: “It’s essential that hardware and software components are provided by expert entities, keeping full inter-operability. Crafting LiDAR software is a complex task, more challenging than traditional computer vision software for cameras, and requires its own set of specialized skills, distinct from hardware design and manufacturing. For planning, advanced tools like Outsight’s 3D LiDAR Simulator are indispensable in optimizing sensor setup, a crucial step in deployment. Utilized in over 2000 projects, this tool is both a pioneer and leader in its field.”

New Akord Security at Adria Security Summit 2023: Innovations in Non-Lethal Security Solutions

In the midst of a century of technology and rapid change, security is a constant concern for our society. Companies that focus on developing security technologies and solutions are in a privileged position to respond to these challenges. A notable example of this is New Akord Security, which participated in the prestigious Adria Security Summit 2023 event on October 25-25 in Ljubljana, Slovenia. The event was dedicated to their discussions about modern security and technology challenges and developments in security, technical and physical protection, smart cities and homes, ICT, IoT, AI and more.

Brief presentation of New Akord Security

New Akord Security’s participation in Adria Security Summit 2023 was a great opportunity for the company to highlight its expertise and innovations in non-lethal security. The event gathered leading representatives from the security industry as well as technology and security experts.

New Akord Security is a Romanian company specialized in developing and providing non-lethal security solutions. With a rich experience and a varied portfolio, the firm has managed to establish itself as an important player in the security industry.  The company stands out for developing advanced technologies to prevent and deter crime without resorting to lethal violence. The equipment and solutions provided by New Akord Security cover a wide range of areas, from personal security to defending the perimeters of strategic infrastructures.

One of the key elements of the company is its commitment to sustainable development and respect for human rights. This is reflected in the technological innovations they propose, which aim to minimize collateral damage and environmental impact.

“Safety Revolution: The Impact of Non-Lethal Weapons on Personal Protection and Authorities”

In an increasingly tense world, personal security and the protection of law enforcement are constant concerns. In this context, non-lethal weapons have become an essential element for maintaining peace and order. In this article, we’ll explore two of the most innovative and effective non-lethal weapons available today: the BolaWrap 150  device, the TX100P and TX200P electric shock pistol, and the  EXO2, the  portable fire gun. We will look at how these revolutionary devices have transformed the security and protection of individuals and authorities.

During Adria Security Summit 2023, New Akord Security showcased a number of notable innovations in non-lethal security. These included:

BolaWrap 150 – A safe revolution

BolaWrap 150 is a patented and innovative manual remote immobilizer designed to provide an effective and safe way to immobilize a person. Using patented technology, BolaWrap implements a durable 2.5-meter Kevlar® rope to temporarily immobilize subjects from a distance of 3 to 4.5 meters.  He uses a special projectile to launch two cables with hooks at the end, which twist around the body of the targeted person. This innovative device allows law enforcement to quickly and safely capture a suspect without resorting to brute force.

One of the biggest advantages of BolaWrap 150 is its ability to neutralize subjects without causing them serious damage. This approach significantly improves safety and minimizes the risk of physical damage. In addition, BolaWrap can be used in a wide range of situations, from interventions with people with mental health problems to controlling violent people.

Electroshock device – TX200P: a modern approach to technology

The TX200P electroshock device is an example of a non-lethal electrical immobilization technology that has been developed to be more efficient and accurate. This device uses high-tech electrodes to provide quick and effective immobilization of individuals who pose a risk to public safety.

What makes the TX200P remarkable is its ability to provide precise control over the intensity of electric shock, allowing operators to adjust the level of force used according to the situation. Also, the device is equipped with video recording technology to document and evaluate events involving its use.

On this occasion, we succeeded, for the first time in Romania, in implementing a pilot program through which public order policemen from Bucharest police stations will receive electroshock devices. This approach was possible as a result of the partnership concluded between the European Police Union EUROPOL and New Akord Security, following which the first 20 electroshock devices were offered for use to the Bucharest Police Directorate, and another 20 pieces will be supplied as soon as possible.

In the next period, the first 300 police officers will be trained on the characteristics and use of electroshock devices and on the punctual situations they may encounter during interventions. Under these circumstances, towards the end of the year, these devices can already be seen in the equipment of police officers and can already be used.

The institutional desideratum to provide public safety must be a zero priority, along with the concern to protect the policeman at work, in the interventions he participates in, but also to protect the integrity of aggressors or violent people who require restraint. Through this pilot project, Romania joins countries such as Spain, Great Britain, Italy, Switzerland, Poland, Hungary, etc., where law enforcement already uses electroshock devices.

Exo2 Fire Gun: Protection against Fire and Disaster

The Exo2 is a revolutionary fire gun developed to deal with fire and disaster threats. This innovative device uses technology to design a special substance that can extinguish type B fires, create protective barriers and ensure the safety of people.

The Exo2 pistol is designed to be easy to handle and use in emergency situations. It can be used to extinguish small to medium sized fires and provide a high level of safety and protection in critical situations.

The impact of innovations on security

The innovations presented by New Akord Security at Adria Security Summit 2023, including BolaWrap 150, TX200P stun device and Exo2 fire gun, have a significant impact on non-lethal security. These devices offer ethical and effective alternatives to traditional technologies and can change the way we handle threats in a variety of contexts.

These innovations enable security operators and police officers to act more precisely and minimise the risk of collateral damage. They represent a step towards safer and more ethical security, which focuses on protecting the life and integrity of the individual.

Reasons for equipping with non-lethal weapons:

Reducing the risk of death and serious injury: The use of non-lethal weapons significantly reduces the risk of death or serious injury during forceful interventions. This is essential to protect both civilians and law enforcement.

Improving public security: Non-lethal weapons offer a safer alternative to firearms, which can help reduce violent incidents and conflict escalation.

Efficiency in crisis management: Equipping with non-lethal weapons provides law enforcement with effective tools to manage crisis situations, including situations with people in mental health crisis, where the use of lethal force would be inappropriate.

Reducing healthcare costs and legal proceedings: The use of non-lethal weapons reduces costs associated with medical care and forensic investigations following firearms incidents.

Law enforcement protection: Equipping them with non-lethal weapons gives police and gendarmes an extra tool to defend themselves and intervene in dangerous situations without endangering their lives.

Increasing public trust: The deployment of non-lethal weapons demonstrates that law enforcement is concerned about protecting the lives and safety of citizens. This can help increase public trust in law enforcement.

Decrease incidents of abuse: The use of non-lethal weapons can help reduce incidents of abuse and unjustified use of force by law enforcement.

Operational flexibility: Non-lethal weapons give law enforcement more flexibility in handling diverse situations, which can lead to more efficient and less dangerous solutions.

Safety of implementation:

To ensure the safety of implementing the equipping of law enforcement with non-lethal weapons, it is important to consider the following points:

Appropriate training and training: Members of law enforcement must receive appropriate training in the proper use of these devices to minimize the risk of undue use.

Clear regulations and procedures: Implementation should be accompanied by clear regulations on the use of non-lethal weapons, reporting and monitoring procedures to prevent abuses.

Constant evaluation: The use of non-lethal weapons must undergo constant evaluation to ensure that they are used appropriately and that the expected benefits are achieved.

Public consultation: Implementation should be preceded by a public consultation and community involvement to ensure transparency and understanding of the reasons and benefits of this decision.

Equipping law enforcement with non-lethal weapons can bring significant benefits to public safety and law enforcement. However, it is essential that the implementation is carefully managed, taking into account all the aspects mentioned above to ensure proper and safe use of these devices.

 

Conclusion

New Akord Security’s participation in Adria Security Summit 2023 was a special moment for the company, allowing it to showcase its innovative products in the field of non-lethal security and underscore its commitment to a safer and more humane world. The presence  of New Akord Security  at ADRIA Security Summit aimed to promote non-lethal concepts for law enforcement, but also to create partnerships and collaborations for the dissemination and implementation of these equipment and technologies in the Adriatic countries. This presence underscored the crucial role technology and innovation play in shaping the future of security. With a strong vision and commitment to innovation, New Akord Security continues to assert itself as a leader in non-lethal security and a promoter of ethical and sustainable values in the industry.

www.stungun.ro

Aziguard: Video Analytics Meets Man Guarding with Aziguard

Vigilance and economy are the most important factors in the world of security. The convergence of traditional man guarding and state-of-the-art video analytics is revolutionizing physical security. One of the most important advantages of this integration is budget optimization

By: Doru Asmarandei, CEO, AziTrend; E-mail: doru.asmarandei@azitrend.ro

Historically, organizations have relied heavily on man guarding as the primary means of safeguarding their assets. Trained security personnel, equipped with surveillance equipment, have diligently patrolled facilities, monitored access points, and responded to potential threats. This human-centric approach undoubtedly provides a level of security but comes with several limitations, including high labour costs, the potential for human error, and limited coverage due to the finite number of personnel available.

The advent of video analytics, powered by Aziguard’s cutting-edge technology, has redefined the security landscape. By seamlessly integrating video analytics with man guarding, organizations can unlock a multitude of benefits that significantly enhance their security measures while simultaneously optimizing their budgets.

Enhanced Surveillance Capabilities

Aziguard’s video analytics modules are equipped with advanced algorithms that can identify and track suspicious activities, unauthorized access, and anomalies in real time. This means that even in the darkest corners of a facility or during the late hours when human guards may be fatigued, Aziguard’s vigilant eye remains unwavering. The software can instantly alert security personnel to potential threats, ensuring rapid response times and minimizing the risk of security breaches.

One of the most compelling advantages of integrating video analytics with man guarding is its substantial cost savings. Aziguard’s intelligent algorithms can monitor vast areas simultaneously, reducing the need for a large number of on-site guards. This optimisation can lead to more than 40% cost reductions, freeing up financial resources for other critical aspects of your business or organisation.

Data-Driven Decision Making

Aziguard’s video analytics generates valuable data and insights that go beyond security. Organizations can make informed decisions about facility management, resource allocation, and customer experience enhancement by analysing patterns, foot traffic, and occupancy rates. This data-driven approach not only improves security but also contributes to overall operational excellence.

Aziguard’s flexible architecture allows for easy scalability. Whether you’re securing a small business or a sprawling industrial complex, the software can adapt to your needs, ensuring that your security solution remains robust as your organization grows.

Conclusion

In an era where security threats are ever-evolving, and cost-efficiency is a top priority, Aziguard’s integration of video analytics with man guarding stands as a beacon of innovation. This powerful synergy empowers organizations to bolster their security measures, respond swiftly to threats, and achieve substantial budget optimization. Embrace the future of security with Aziguard and experience a transformative shift in the way you protect your assets. Say goodbye to the limitations of traditional man guarding and unlock the full potential of video analytics to safeguard what matters most. Your security and your bottom line will thank you.

How Much Does a Security System Actually Cost?

When buying a security system, decisions often come down to the price tag of cameras, storage, and installation, yet taking this approach can leave the end user with major challenges ahead. Surveillance systems last anywhere from five to 20+ years, so condensing all cost considerations down to the initial expense fails to consider the bigger picture.

By: Ricardo Marranita, Product Growth Manager, Axis Communications; E-mail: ricardo.marranita@axis.com

The initial costs to purchase and set up a security system tend to account for just 30% of the total costs experienced during the lifetime of the system – also known as the total cost of ownership. Despite this, many end users may even make their decision based on the price of cameras alone. In effect, they are making their choice with just a 10-15% view of the total security system costs. The reality is that roughly 70% of expenses come after the system has been installed. Sadly, these can come as a nasty surprise for those end users who have not considered the indirect security system costs.

Taking some time to think about how the system will be used and the costs associated with that use can create significant savings in the long run. Initial choices – such as the type of device to deploy –impact future expenses, from power consumption to monitoring and maintenance. While we’ll focus on cameras specifically here, this principle applies to any device within a surveillance system. Considering the total cost of ownership will help you to identify the questions to ask as you make your decision on which new security system to purchase.

Look Beyond the Cameras’ Price Tag

Filtering is an important step in the purchase process: setting out your surveillance requirements and the available budget is key to narrowing down your choices. Unfortunately, too many initial conversations around requirements focus on the cameras alone, without considering the broader requirements of the system as a whole – from energy use to storage needs.

It might be tempting to focus the budget conversation on cameras, rather than where money will need to be spent to operate and maintain those cameras. Yet the security system will need to support your needs for the foreseeable future. It’s worth remembering that the costs to operate, monitor and maintain certain cameras often exceed the devices themselves and must therefore be weighed up before the purchase is made.

Forecasting Storage Costs

If you’re in the market for a new surveillance system, it’s very likely that you’ll need to consider how to store footage once recorded. On average, legislation requires potential evidence to be stored for a month. Yet in some regions or use cases, this is extended to 180 days – making storage a considerable factor in overall security system costs.

To avoid being caught out with significant server and electricity expenses after cameras are installed, it’s critical to consider the different storage costs associated with each camera model you’re considering. It can be a false economy to purchase cheaper cameras to cut down the initial outlay if they come with vast storage requirements, forcing you to spend more on servers and energy costs in the long run.

Equally, if you plan to reduce storage costs by shrinking the size of the video stored, you will need to carefully choose the right devices to ensure that compressing the video doesn’t compromise evidence quality by pixelating or blurring images to the point that it’s no longer possible to identify a suspect. Ending up with poor-quality footage that cannot act as useful evidence can defeat your objective of installing the security system in the first place. Some cameras come with sophisticated technology that can reserve all the important forensic detail you need while lowering bandwidth and storage requirements, and therefore long-term costs. It’s worth checking any claims of high-quality footage with low storage requirements before you install the system to ensure it meets your expectations.

Each set of requirements is unique. For example, you may require high-quality images even in the dark. While some cameras might compensate for low light levels by increasing the gain and therefore, storage requirements and costs, other options use alternative light-optimizing technologies that do not have the same large-scale impact on storage costs. They might even help you to save your budget by removing the need for additional external lighting.

Anticipating All Indirect Costs

The type of device you choose will influence costs far beyond storage. To forecast the full security system cost, monitoring, maintenance, and electricity use must also be considered.

Once you crunch the numbers, the costs can start to build up quite quickly but crucially, the devices you choose will have a knock-on impact on the extent of these figures. Opting for more economical cameras and devices at the start can result in staggering indirect costs. By contrast, choosing higher-quality cameras and devices at the outset can enable you to cut those indirect security system costs in the long term, introducing savings that you can use to reinvest in and grow your business faster.

As one example, owners of surveillance systems installed in tough environmental conditions, such as a maritime port or chemical plant, may face significant maintenance bills to clean salt water and dust off cameras. By upgrading to more sophisticated cameras that offer remote cleaning functions, or have been designed with self-cleaning materials and components, such as a hydrophilic dome, they can reduce the maintenance – and therefore costs – required.

Turning a Purchase Into an Investment

By considering how your initial decision on which type of camera to buy can impact the chain of future costs, you can shift the purchasing decision into an investment. Achieving this can be as simple as asking yourself just a few questions.

The first concerns the features you want to get with the camera, as well as the need for storage space that getting such a camera entails. Another question concerns the projected costs of powering such a system in the long run. It is important to get a picture of the role of supporting technologies in the camera in the formation of total costs. Finally, it is worth looking at their share in general costs.

The question ‘How much does a security system cost?’ goes far beyond the initial purchase. Making the right choice for you based on the bigger picture can mean a slightly higher initial outlay, but it pays itself back in the long run.

In short, taking the time to ask the right questions at the outset – and finding partners who are open to answering those questions and helping you calculate the long-term costs – allows you to avoid any nasty surprises in future electricity, storage, operational, or maintenance costs. Importantly, it will also ensure that you end up with the security system that is right for your specific requirements.

Five Steps to Optimize Your Investment

Deciding which security system to purchase demands careful consideration. After all, security systems can last for five years or more, so weighing up all relevant factors at the start can lead to significant cost savings and an improved return on your investment (ROI) in the long run. While it may feel daunting, there are five straightforward steps you can follow to ensure you are making the most of your investment. Following these steps enables you to decide on the right security system for your organization, while also optimizing your investment.

Choose the Camera According to the Value It Adds

It may seem obvious but as an initial step, ask yourself “Why are you buying cameras?” Device price and features are important considerations, but it’s vital to understand what your organization needs the cameras to do before you start to weigh up the value of the different functions on offer in each.

Clarity here is vital to figuring out if the cameras on your shortlist will perform in the way you need or provide the evidence you require. For example, are you installing a security system to protect profits in a retail environment by tackling theft and fraud? Are you aiming to optimize production and avoid downtime in a factory? Or are you looking to ensure the safety and security of your employees and passengers in a public transport setting?

There are many different ways in which security systems can be deployed to help your organization – from improving security to creating business value. Narrowing down why exactly you are purchasing the system is a key first step to ensuring you are set up to optimize your investment.

Calculate How the Device Influences the Rest of the System

Next, you will need to figure out how your camera choice affects the rest of the system. Storage is an obvious factor in this calculation. More inexpensive cameras may seem appealing but if their compression technology is limited to reducing bitrate to lower bandwidth and storage requirements, that saving comes at the cost of quality footage – jeopardizing the very reason you’re installing the system in the first place. On the other hand, more sophisticated cameras may have a higher initial cost but come equipped with intelligent algorithms that preserve relevant forensic information in full resolution and at a full frame rate while requiring a lot less storage space. As a result, you can recoup the initial price through lower storage costs in the years to come.

Yet storage requirements and costs are only one piece of the calculation to consider at this point. What about ease of installation? Or how fast it will be to configure the devices and add everything to your system?

It’s also worth thinking about what accessories you will require to ensure the security system meets your objectives if you choose certain camera models. For example, if the cameras you have chosen require extra accessories to mount, this will have a knock-on impact on installation – making it slower and more costly than initially predicted. If you realize this on the day of installation, there is a significant risk of delays to the whole project. To optimize a security system investment, the full picture of all costs – not just the devices themselves – is important.

Estimate the Cost of Using and Running the System

It’s also important to ask, ‘What happens once the system is up and running?’ This step is often overlooked: some may accept the system’s operational costs as the natural cost of doing business, while others may not put too much thought into it if it ends up under another department’s budget. Yet spending some time to think about the costs required to keep the system up and running is important for all decision-makers involved in purchasing a security system: it’s where the bigger losses creep in. While it might not affect you or your department directly, it impacts your organization. And if your company loses money through the system’s high running costs, it could eventually impact your budget too.

This means that it is worth thinking about the electricity usage, required maintenance and the costs of monitoring the system. But how can the different cameras in your shortlist affect these costs? You can assess this by writing down a few key questions.

First, you need to consider how much power your cameras use and how this might affect your electricity bill? On a related note, how much storage do you need for specific cameras and how does that affect your electricity costs in the long run? Finally, you need to know if the cameras offer any smart functionality to reduce the overall cost. For example, do they offer superior analytics performance such as deep learning and edge analytics, reducing false alarms and speeding up forensic search to reduce operational costs? The devices you choose will ultimately impact all the costs to come throughout the security system’s lifecycle.

Predict the Impact the System Will Have on the Business

Once you have mapped out the bigger picture cost implications for the cameras on your shortlist, consider the end result: how will the system help your business? Will it drive greater efficiency, reduce theft, improve the service you provide to customers, and improve employee retention by creating a safer workplace?

Ultimately, the correct security system for your organization can create business value, which translates to improving the bottom line. It’s important to quantify how the security system will impact your business so you can weigh those benefits up against the total costs when making your decision.

Thinking this through often involves collaboration across departments, ensuring the bigger picture of the system’s impact on the business as a whole is considered. As an added benefit, cross-departmental cooperation also opens up the possibility of tapping into bigger budgets and getting additional buy-in on the surveillance system as well as the advantages it can bring to the business.

Make the Best Decision for Your Organization

This final step is about evaluating the information you have uncovered in the previous stages and factoring all of those insights into your final decision. As long as you are taking some new insight from this process, whether considering the value added of the device you are choosing or calculating its associated running costs, you are taking a step in the right direction – moving from purchasing a security system to making an investment that can reap better rewards for your organization.

Completing this exercise of working through the various scenarios attached to purchasing different security devices will set you up to optimize the system you buy to your company’s benefit. Rather than making a choice based on upfront cost, you are making a decision with the long-term view in mind and reducing the risk of unpleasant surprise costs cropping up in the years to come.

Working with the right partner to select the right system

Importantly, you don’t need to do this alone. The process of asking these questions helps you identify which partners are invested in your organization’s long-term success. It’s critical to find the right partner who will work through these scenarios with you to find the system that works in your best interest – both in terms of a total cost of ownership that works for you and a system that meets your requirements to drive long-term value.

Suprema: Ultra-Wideband Positioning

Whereas conventional RF technology measures distance by signal strength using the RSSI method, UWB measures distance by TOF. In the TOF method, signals are sent similarly to how radar works. Signal strength often decreases due to environmental influence, making it difficult to use this measurement as an absolute standard. However, signal speed is always constant.

By: Artem Arifov, Business Development Manager, Suprema Europe and North Africa; E-mail: aarifov@supremainc.com, sales_eu@supremainc.com

As of 2023, smartphones from both Apple and Samsung now come equipped with ultra-wideband (UWB) technology. Apple devices use UWB for AirDrop proximity sharing with iPhones and for location tracking via digital tags to keep tabs on users’ important items like wallets and bags. The SmartThings Find feature on Samsung’s Galaxy phone models uses UWB to find lost digital devices.

At first glance, it may seem that finding devices and objects is a very simple function. However, from a technical standpoint, it is actually very difficult to achieve high enough accuracy to instantly find devices and objects in a complex indoor space such as a home or office. UWB is an RF technology that makes this accuracy possible.

TOF–Based Distance Measurement

 It is known that UWB can measure an object’s exact position within an error of only about 5 to 10 cm. To achieve such high accuracy, UWB makes use of wideband communication and Time-of-Flight (TOF)–based distance measurement technology.

While 2.4 GHz-based short-distance wireless communications such as Wi-Fi or Bluetooth Low Energy Protocol (BLE) generally have a communication band of several MHz, UWB has a communication band of several GHz. This much higher bandwidth allows for far fewer communication failure retries and a faster response speed.

Whereas conventional RF technology measures distance by signal strength using the RSSI (Received Signal Strength Indicator) method, UWB measures distance by TOF. In the TOF method, signals are sent similarly to how radar works, with distance measured as a time difference when the signal returns. Signal strength often decreases due to environmental influence, making it difficult to use this measurement as an absolute standard. However, signal speed is always constant, making TOF-based ranging more accurate than RSSI-based ranging, and a much better measurement for use as an absolute standard. Furthermore, if a signal’s angle is added, even more precise position measurement is possible.

Will UWB Change Access Security?

GPS-based positioning is subject to a general error of about 50 meters. In an outdoor environment, a 50-meter error may not be significant. However, in the case of indoor positioning, it is important to have a much higher degree of precision.

Increased accuracy indoor positioning technology has been continuously studied for decades through various methods such as Wi-Fi, Bluetooth, and geomagnetism. With UWB, it has finally reached a level of performance that can satisfy the market and users. UWB makes it possible to identify the user’s exact location information within a building, and this information can be used as data to work with various services.

Now let’s shift the perspective and consider how accurate location information will change access security:

Accurate distance measurement, when used together with face recognition or mobile access credentials, will enable walk-through entry and exit without any need for special authentication procedures — finally making possible a highly futuristic technology that everyone in the access security industry has been imagining for decades.

Accurate location measurement will lead to the emergence of an access security system that no longer requires the installation of authentication readers on every door. It will be possible to check and verify the credentials of every person trying to access each door without using individual door access readers at all.

UWB will enable accurate distance and location measurement. These two features will enable safe and convenient access for both companies and users, without any need to install separate access readers or go through a separate authentication process for each door one is trying to access.

UWB Advances With Smartphones

One important prerequisite must be met before UWB can enable this change: it is necessary for UWB to be supported in all smartphones on the market.

That being said, UWB is already supported in Apple iPhones and Samsung’s Galaxy series, and mid-range smartphone brands such as Xiaomi have also announced plans to enhance their new products with UWB technology. Considering the rapid adoption rate in existing smartphones, there is a high probability that almost all smartphones will support UWB within just two to three years, making our prediction for the future of access security that much closer to becoming a reality.

AEM testers just got even better

Are you fed up with using testers that don’t meet your expectations, or had to carry multiple testers to find a fault? Finally available through EGAL, d.o.o., Ljubljana in Central and South-Eastern Europe, AEM is a company that not only values customer feedback but also strives to offer the best products available.

AEM’s award-winning CV-100 platform and its Network Service Assistant (NSA) has been improved with the New Enhanced Range of testers, which has now become the company’s standard range. AEM has made several enhancements based on customer feedback – the most notable being a capacitive touchscreen that is easier to use and navigate, with much-improved screen resolution.

Feature packed

It’s not just the screens that have improved. All CV-100 platforms, including the K50E, link adaptors even more rugged and durable, which means more time on-site and less downtime. For installers that need to carry out optical fiber testing, the K51E and K61E kits now come with more standard equipment including an inspection probe. This allows you to inspect fiber ends for dust or damage, ensuring your fiber connectors are always clean and ready for testing. The testers come with SC connectors and launch leads included, making both the K51E and K61E, LC, and SC ready right out of the box!

Perfect solution

Companies that specialize in smart/intelligent buildings should look at AEM’s K60E and K61E testers, which are the perfect solution for those requiring even more advanced features. Both testers get all the additional kit mentioned above but also come with a Category 6A patch cord adaptor, allowing you to carry out modular plug terminated link (MPTL) tests – essential for any installer installing Wi-Fi access points or IP CCTV cameras. This ensures that all Internet of Things now come with a new set of permanent link adaptors. These adaptors feature a ruggedized cable that is built to last and they have also been upgraded to meet Cat 8.1 standards. The shroud to plug has also been improved, making these permanent (IoT) devices can be installed to the correct standard, ensuring your work is always up to par.

Don’t just take our word for it – AEM testers have been tried and tested by real customers who have given glowing testimonials about their effectiveness and value for money.

Smart thinking

AEM CV-100 testers have always had advanced smart/intelligent building capabilities and are designed for more than just straight cable certification. They offer features like power over Ethernet (PoE) under load to determine if IoT devices have enough power, network tests that produce MAC and IP addresses, and traceroute to identify faults outside the local network. Plus, now they’re even better!

AEM understands that investing in equipment can be a significant expense, which is why it offers a 3-year care plan, including calibration and accidental damage. All adaptors can be swapped out once a year when worn, ensuring that your equipment is always ready when needed. AEM even protects your tester if it’s accidentally damaged – if it cannot be repaired, AEM will replace it.

Get in touch

For more information about AEM in the Central and South-Eastern European countries, call our EGAL sales team on + 386 (0)31 737 831 or send an email sales@egal-eu.com.

https://egal-eu.com/en/aem/