Home Archive by category Security Services (Page 5)

Security Services

Bollards for More Advanced Storefront Safety

We often discuss electronic security systems such as video surveillance and access control. Yet certain physical barriers are also important elements in security. Among them are bollards, which have various applications.

By: William Pao, asmag; E-mail: asmag.com

Bollards serve many purposes. For store owners, bollards can play a key role in protecting customers/staff against vehicle crashes. “They can be used as delineation devices to separate moving traffic from another area. Sometimes this can be to delineate a vehicular traffic lane from a bike lane, or they can be utilized to differentiate a pedestrianized area (for example outside a stadium at the ticket lines) from a parking area or roadway. We also see them utilized many times to protect critical infrastructure (for example electrical equipment) or retail storefronts from vehicular impact,” said Joseph Hauss, President of Gibraltar Perimeter Security.

The Most Expensive Bollard in the World

Retail storefront safety can be much enhanced by bollards, the lack of which can be quite devastating. This is underscored in an incident in which, according to an article by the Security Industry Association, a Chicago-area man lost both his legs after an accidental crash in 2017 outside a 7-Eleven store where bollards were not installed. According to the article, the man in February received a record-breaking US$91 million settlement from 7-Eleven.

To this, Rob Reiter, Principal at Reiter and Reiter Consulting and Co-Founder of the Storefront Safety Council, commented: “What’s the most expensive bollard in the world? The one that was not installed in front of the sidewalk at a 7-Eleven store in Chicago. I have been studying the problem of storefront safety and vehicle-into-building crashes in the United States since 2010. We founded the Storefront Safety Council in 2012 to bring focus and hard data to a serious public health and safety problem that was being overlooked. What we have found after all these years is that safety has been very often neglected in those retail and commercial areas where Americans most often eat, work, play and shop.”

Thousands Injured Annually

Using the council’s statistics, Reiter cited certain figures that are particularly alarming. “Vehicles run into commercial and retail properties more than 100 times per day or more than 36,000 times per year. Each year, more than 16,000 customers, pedestrians, and employees are injured, and as many as 2,600 are killed. Many of these crashes are low-speed parking lot incidents that are easily preventable,” he said.

He added: “In the recent 7-Eleven legal settlement, evidence was revealed that confirmed more than 6,300 storefront crashes occurred at unprotected 7-Eleven stores over 14 years. Approximately 800 stores were struck three times or more, with more than 100 struck more than five times. The totals worked out to 1.3 storefront crashes per day or about 500 crashes per year at unprotected stores.”

These incidents highlight the importance of installing bollards at these premises. “Some of these areas have no protective bollard devices in place, while other places have bollards in place, but it is the wrong bollard and they still have an incident. The best practice is to procure a crash test-certified bollard from a reputable U.S. manufacturer,” Hauss said. “Bollards can be designed with aesthetics in mind with a number of decorative sleeve designs and marketing wraps that can be utilized as a revenue driver for the end user, as it can be ad space.”

Selection

The next question, then, becomes how to choose the right bollard solution for the storefront. According to Hauss, most bollards are made of carbon steel or stainless steel that is crash test-certified. “However, there are some products in the marketplace that combine proprietary materials outside of this in their design with some combination of carbon steel and/or stainless,” he said.

He adds that the user should also identify what their threat vehicle is and the location and traffic directions around the facility. “Is it just nose-in parking and pedal error that you are concerned with, or could a vehicle come off the road directly into your building at 50 miles per hour (for example errant vehicle at high speed)? Do you have high-value assets in your store that make it a target for ram raid attacks where someone will try to physically knock down the security bollard with multiple impacts from a vehicle to leave it and make a getaway in another vehicle? These are just a couple of questions to look at when identifying the correct bollard and the vehicle type and penetration necessary for your facility,” Hauss said.

Installation

The installation of these bollards is also important. According to Hauss, bollard spacing depends on vehicle vector analysis. “There are sites where nose-in parking is at a 45-degree angle and others at 90-degree. ADA (Americans with Disabilities Act) spacing also must be looked at when implementing bollards, which can differ by the municipality on what their minimum requirements are for gaps. Can the vehicle actually come in at 90 degrees? This is an important question on the spacing,” he said.

Hauss adds that spacing can also depend on the manufacturer and how they were tested and certified. “Typically, 48- to 60-inch maximum clear spacing between bollards will accommodate the angled and nose in parking and meet ADA, but you must look at how the product was tested and certified,” he said. “If a product was tested with 36-inch spacing and it is installed at 48-inch clear, it may change the loading, as two to three bollards would be impacted in the test, but only one bollard would be hit in the actual 48-inch installation, as most vehicles are less than 8 feet in width. It all starts with utilizing a well-versed consultant that knows what products are in the marketplace and then utilizing a reputable U.S.-based manufacturer.”

More Sustainable and Efficient Energy Storage Systems

With the company’s strategic adjustment and business upgrade, Uniview has gradually transformed into a global AIoT product and solution provider, exploring new growth opportunities. Energy storage is one of the most important directions.

By: Tsing Tang, CEO, East Europe, Zhejiang Uniview Technologies; E-mail: tangsiqing@uniview.com

Battery energy storage systems are a crucial component of the new energy industry and have the potential to revolutionize our daily lives. They can provide power to homes during outages and enable off-grid energy solutions. Uniview constantly integrates power electronics and digital technologies to meet the ever-changing market demands. Uniview hopes to bring cleaner and more sustainable energy to consumers around the world.

The First System for Residential Environments

Among the latest exciting developments is the release of the Uniview ESS SAH5B10 A EU, the company’s first whole home energy storage system designed for residential consumers. This all-new solution serves as an excellent option for those seeking a more sustainable and efficient way to power their homes.

Uniview RESS is an energy storage system that keeps your home powered during an outage and provides energy independence from the grid. It’s just like an energy bank account where you can make deposits and withdrawals as you see fit. By storing sufficient power within the batteries, Uniview RESS can reduce or eliminate your reliance on the utility electrical grid, make electricity more affordable, and get well-prepared for unexpected blackouts, emergencies, and other disasters. Recharging UNV RESS with lower prices of off-peak grid power can also effectively reduce monthly electricity bills.

Features

To meet the market demand, Uniview RESS bears the following highlights:

  • Easy installation: With just 3 step cable connection, you can set up a residential ESS
  • Good components, good quality
  • Smart control and monitor: With the APP, you can control and monitor ESS just by fingertips
  • 7% increase in usable capacity: Uniview B10 provides 97% of the rated battery capacity to be usable, while others only 90%
  • As long as 15 years lifespan: 6000+ cycles over 70% SOH, 3500+ cycles over 80% SOH
  • On-grid & off-grid hybrid ESS system: Minimize the modification of home circuitry

Multiple Uses

Uniview provides accountable, high-quality, easy-to-use, and safe products, ranging from portable power stations (Portable RESS) and portable solar panels to residential energy storage systems (RESS) for homes and businesses worldwide. With the integrated and applied technologies of both lithium-ion battery energy storage and AIoT technologies, Uniview is dedicated to developing the state of art ESS products to meet the various demands of different scenarios, products to meet the various demands of different scenarios, from portable power stations to residential ESS.

More information please visit www.uniview.com. If you have any business queries, please contact

chenkexin@uniview.com

The new firewall from DoorBird: Effective protection for your building network

The new DoorBird A1051 Internet Firewall is now available worldwide. DoorBird is the first in the industry to launch a user-friendly solution that provides additional protection for the network of door communication systems.

The easy-to-install firewall increases security for all networks where DoorBird products are used – both inside and outside. The Berlin-based manufacturer Bird Home Automation GmbH creates another unique selling point in the field of smart IP video communication with the DoorBird A1051 Internet Firewall product. The firewall reliably stops unauthorized network traffic without the need for complicated configurations. The product is pre-configured at the factory and ready for immediate use. The installation takes place between the local Internet router and the DoorBird IP video door communication network – easily and without any prior technical knowledge. The network is protected against unauthorized access at main and side entrances, underground garage entrances, floor accesses` or other rental areas indoors. This makes the Internet firewall suitable for large office complexes, commercial buildings, apartment buildings, and single-family residences. For example, a tenant could misuse the network cable connected to an IP video indoor station to surf the Internet or gain unauthorized access to other network components in the building. Implementing firewall solutions for this purpose with well-known firewall products is expensive, complicated and most of all very time-consuming to implement on a day-to-day basis. Part of ASSA ABLOY 2 In order to meet individual network requirements, smart home systems from third-party providers (e.g. DoorBird Connect partners) can be whitelisted. The Internet Firewall can be configured comfortably remotely via app or browser.

New data center security tech for integrators to utilize

Data centers are like many mission-critical facilities, overwhelmed by an ever-increasing volume of data generated by many siloed safety and security systems. While all these systems provide valuable information, the sheer volume of unfiltered and uncorrelated inputs results in data “noise” that drowns out what’s essential and overloads operators.

By Prasanth Aby Thomas, asmag.com

“Today, more data centers are implementing situational awareness platforms that allow operators to focus on critical insights and execute the necessary actions to help protect what matters most,” explains Alan Stoddard, President of Cognyte Situational Intelligence Solutions. “These types of technologies identify the data needed to protect an organization’s most significant assets — in this case, network infrastructure — and are also part of the power of the intelligent security operations center.”

Additionally, the data visualization framework empowers security leaders to present historical data from systems into a live dashboard. With this type of centralized, real-time view, security teams can transform the way they track, visualize, analyze, and reach their security goals.

Focus beyond the data in data centers

 Data centers should consider deploying the same types of countermeasures that you would in any mission-critical facility, such as multi-factor authentication, anomaly detection, identity management, access control, and video surveillance.

But John Rezzonico, CEO of Edge360, points out that often the focus is still on the data security side. If the same protocols in establishing cybersecurity measures were used across physical security, these facilities would be better prepared to protect physical assets from threats.

“It’s also crucial for data centers to closely evaluate their video management platforms to ensure they can scale as risks and needs evolve,” Rezzonico said. “New VMS solutions today are built on modern IT infrastructure and containerization. A containerized system leads to better security because full-application isolation makes it possible to set each application’s primary process in separate containers. This also provides ease of maintenance and sustainment across an enterprise, which is more important when maintaining critical systems remotely.”

Physical security without compromising cybersecurity

While physical security integrators do need to look beyond data to get their work done, this should come at the cost of cybersecurity. In fact, ensuring both physical and cyber security with equal importance should become a prerogative for integrators because of the interconnected nature of modern devices.

“Security integrators need to ensure the vendors they are working with follow a security-first strategy when developing physical security systems,” Stoddard said. “Manufacturers should be providing physical security products that are cyber secure and tested regularly to ensure optimal compliance. This is non-negotiable in today’s evolving risk environment.”

Cyber security and physical security go together, and integrators need to know how to consider the impact of both physical and cyber breaches as part of their deployments. They must invest in understanding both sides of the security equation to deliver comprehensive service to mission-critical businesses like data centers. If not, they are opening the door to risk.

What integrators should know

Worldwide IT spending is projected to total $4.5 trillion in 2022, an increase of 3 percent from 2021, according to the latest forecast by Gartner. Spending on data center systems is forecast to experience the strongest growth of all segments in 2022 at 11.1 percent. This suggests the potential growth for physical security in this segment.

But while data centers offer a great business opportunity for security systems integrators, they need to make the customer realize its relevance. It’s essential for security integrators to work closely with the customer to make sure they know the considerations that need to be completed and the requirements for physical security within these complex environments.

“If integrators cannot teach the customer why they need to deploy the protections necessary, they shouldn’t be working within the data center market,” Rezzonico said. “To be truly successful in this market, integrators must understand the needs of the market and facilities as it relates to physical security and the customer’s complete business strategy.”

In short, to take advantage of the demand in this sector, integrators must have a clear understanding of the market and should be able to impart this knowledge to the customer. There are a number of solutions at their disposal for data center projects, but working with the unique requirements of each customer would prove to be the key.

Data centers often receive more attention for cybersecurity because of the nature of the assets they hold. While this is important, it leaves the physical side of things vulnerable to theft, robbery, and vandalism. Post the pandemic, this has become an even more critical issue because of the increased amount of data entrusted to these places.

The seriousness of the situation is not lost on most major data center managers. A quick search on Google for data center physical security would throw up specific pages on how AWS and Microsoft Azure protect their sites. That these companies feel the need to explain the measures they take indicates the severity of the matter.

But the biggest challenge in protecting data centers is the rapid pace at which they grow and evolve. Integrating physical and logical systems in such a dynamic environment requires careful consideration of various factors and optimized strategy. Asmag.com spoke to some of the top industry professionals to understand the biggest threats to data centers and how integrators can go about protecting them.

Major threats to data centers

Most data centers focus on software and implement data security tools such as firewalls to identify and mitigate cyber threats. But the need for the physical security of these facilities is paramount. A breach in physical security can lead to data theft and cause breaches that compromise data security.

“With the increasing threat of cyberattacks and natural disasters, we must work to ensure the security of data centers to protect intellectual property, ensure compliance and maintain security and resiliency standards to keep these facilities safe,” said Alan Stoddard President at Cognyte Situational Intelligence Solutions. “Additionally, we must be cognizant that data centers are evolving. The increased deployment of cloud-based and edge data center facilities will increase the demand for physical security solutions in the coming year.”

But perhaps the real problem now is not the lack of technology to protect data centers but the lack of its appropriate use. John Rezzonico, CEO of Edge360, pointed out that the lack of timely upgrades and maintenance is a major cause of concern.

“Data centers typically have many physical security devices in a small space or area, which can be challenging to manage,” Rezzonico said. “On top of that, many data centers establish security systems and then allow physical security software, like video management platforms, to become outdated. But this fact must change: As more businesses shift to remote work and the storage of critical data via the cloud and within these data centers expands, the need for solid security in these facilities is growing, and protecting them becomes more critical.”

It’s also important to note that the focus for these facilities has primarily been on protecting the network, which means physical security programs have taken a back seat. But the protection of the brick-and-mortar facility is just as, if not more, important as ensuring captured data is protected.

Checklist for data center physical security

Data center security should follow a specific formula for protecting assets, with the idea of concentric circles. The outer layer represents perimeter security; the next is the hardening of the facility itself and preventing unauthorized access.

Next, security leaders should focus on securing the racks where the data and servers are stored. Finally, there must be another added layer of security around the controls for those server rooms to prevent any bad actors from accessing them.

“At each level, there needs to be a standard amount of physical and cyber security protection, which should be common practice across data centers, whether public, private, co-located, or on-site,” Rezzonico said. “The same policies and methodologies should be applied no matter the size, type of data center, or location. Still, they are often not, creating a facility that lacks the proper security measures for protecting critical data.”

Stoddard agrees that the best way to secure a data center is to manage it in layers. A multi-layered approach best supports proactive planning and makes identifying and mitigating a failure or breach easy. Here are some best practices that he suggests to consider:

1.Conduct regular audits: Internal audits ensure that systems and processes are working as intended. Audits should check for vulnerabilities in the data center facilities as well as across systems and devices.

“Access control systems, video surveillance cameras, and electronic locks must be checked to ensure proper function,” Stoddard said. “Security leaders should also continually assess whether a change in personnel calls for an update in the procedures and systems.”

2. Strengthen situational awareness: Any facility requiring extra protection, like a data center, should adopt an intelligent security approach. Funneling all data and systems into one centralized platform provides a higher level of oversight over security and operations.

3. Establish redundancy: Avoid the opportunity for downtime or system failure that results in a shutdown by creating redundancy across your data center operations. Data center failures can be prevented with proactive planning, testing, and awareness.

4. Enhance video surveillance: Video systems should be comprehensive and cover indoor and outdoor areas. Additionally, 24/7 video monitoring is critical to helping identify potential anomalies before they become more significant issues. Security guards can also be an essential component in augmenting technology.

5. SOP updates: Standard operating procedures need to be evaluated and tested regularly. This process also includes refresher training on the emerging or new security measures that need to be followed. Because risks are changing and evolving rapidly, regular checks of existing processes and procedures are recommended.

Conclusion

The technology needed for physical security at data centers is not complex. But what is often not up to the mark is the maintenance and operation. Steps like regular audits and SOP updates that Stoddard suggested highlight this concern.

In the coming years, we will likely see the number of data centers increase worldwide as more customers become aware of the importance and convenience of cloud-based solutions. This means more opportunities for physical security systems integrators. While challenges are a concern, it presents new growth areas with the right approach.

The Future of Access Control Industry Driven by AI

Artificial Intelligence Solves the Common Problems of Security which is Inconvenient and Inefficient

By: Seongbin Choi, the head of Suprema R&D Center, Suprema Inc.

In ‘Knight Rider’, ‘KITT’ listens to people and finds a fast route, and ‘Airwolf’ detects and identifies all types of aircraft. These are the imaginary machines familiar to those who grew up in the late 80s. At the time, people used to think of KITT and Airwolf as products of the imagination that only exist in fiction. However, around 30 years later, voice recognition-based navigation systems and image-based object recognition products are being easily found all around us. Whether we realize it or not, over the past 30 years, the world has been transforming the imagination into reality.

Artificial Intelligence — The Driver of Change

Artificial intelligence is driving these changes. AI-based voice recognition and image recognition enable machines to understand and recognize things better than humans.

Artificial intelligence, which first appeared in the 1950s, was briefly revived in the 1980s, then again fell off the radar. In the late 2000s, AI re-emerged and became a driver of the IT industry. Artificial intelligence requires large-scale data for training, but the relevant data was not available until the 2000s. By the late 2000s, things began to change with the spread of the Internet, smartphones, and then cloud-based services.

The Internet and smartphones enabled data collection from myriad sources to the cloud, and the advent of the Internet of Things accelerated data collection. With this massive data collection, artificial intelligence has done what we could only dream about in the past. And the term “the 4th Industrial Revolution” describes the emergence of, and the transformation led by, an industrial platform consisting of IoT (smartphones), cloud computing, data, and AI.

The Dilemma of Access Control

Now, let’s see today’s access control industry. Security is supposed to be inconvenient and inefficient. This is something everybody agrees on. Greater security comes with a more significant number of procedures, which increases inconvenience and inefficiency to the individuals who are handling the tasks. The situation is the same in the access control system industry. Conventionally security enhancement approaches require a thousand people to follow a procedure to prevent a one-in-a-thousand problem. Balancing security with efficiency is an irreconcilable dilemma for all security managers.

And so, what kind of system do these security managers envision? Perhaps a system that offers enhanced security with easy operation and usability. We have discovered that AI can make such dreams of security managers into reality.

Increased Convenience, Efficiency, and Safety

We could effectively save time and money by monitoring the specific area with a higher probability of errors occurring instead of monitoring the whole procedure where the problem occurs one-in-a-thousand. Also, if we could predict possible problems by detecting signs of symptoms, then we can enhance security without sacrificing convenience and efficiency.

Such intelligence-driven operations are possible through AI training in large-scale data sets. Suppose we can collect user activity data and train AI with individual-specific behaviors and patterns; in that case, we can detect unusual undesired behaviors and patterns that are highly likely to cause problem. In addition, if a problem occurs, AI can learn behaviors and patterns to detect the action beforehand and prevent the problem from occurring next time. This is possible only when AI is deployed, and trained with highly accurate access, behavior, and location data in the cloud, collected continuously through the access control systems.

One thing that needs to be clarified here is whether accurate access and behavior data can be obtained and how. Currently, most access control systems determine physical access through authentication/tagging as evidence of presence or attendance. However, some people may decide not to enter after authentication, or others may circumvent authentication by following in someone who has tagged. This means it is impossible to obtain accurate access and movement data from existing access control systems.

However, real-time location systems (RTLS) can be a game-changer by enabling accurate access and movement information. It allows you to identify cases where authentication/tagging is abused (leaving after the first tag or following others without authentication). RTLS-enabled access control allows us to collect data with accuracy and quality sufficient for training AI.

Recently, smartphone manufacturers such as Samsung and Apple have been competing to make the best use of UWB, one of the typical RTLS technologies. If UWB is integrated with mobile credentials in smart devices, it can be easily deployed to access control systems. In the coming years, various RTLS-enabled access control systems with precise location intelligence will be available on the market.

In the future, we will realize what many security managers have dreamed about: access control systems that predict possible problems based on accurate entering in and out data preventing problem occurrence.

In the middle of the 4th Industrial Revolution

In 2018, I visited the Salesforce.com head office in San Francisco as part of the Korea Information and Communication Agency’s overseas training program. What caught my eye was a banner for Einstein from Salesforce.com service, covering the entire building starting from the entrance. Einstein is an AI-powered service that leverages the big data of Salesforce.com to recommend customers with a high possibility of conversion and forecast future sales volume to take preemptive measures. I was kind of skeptical about the feasibility of the technology. But it was simply enormous; AI trained massive amounts of data called big data outperforms humans, and cloud services powered by these AI engines deliver new value that on-premise solutions cannot provide.

Simply put, the industrial revolution represents a change in creating exchangeable value. That is a change in the way we make money. I think I saw how the way to make exchangeable value was changing in San Francisco in 2018, which helped me understand why such changes are collectively called “the 4th.” This also explains why developers in Suprema, including myself, are dedicated to AI to improve the convenience and efficiency of cloud-based access control offerings.

Intelligent Control

As buildings become increasingly complex and we see the rise in smart buildings, the use of building management systems (BMS) will only continue to grow to control the many systems installed in a building. Vladimir Zrnic, Sales Manager for Southern Europe at Advanced explains more.

 BMS is a relatively new addition to modern buildings. Thirty years ago, each individual system in a building was controlled separately and manually. This evolved into each system being controlled and monitored by a computer. The next step was to unify the equipment into one master control system that networked all the mechanical, electrical, IT, and security systems of a facility. And so BMS was created.

Integrating all the components into a single cohesive unit allows the various systems to share information so they can work more effectively. The resulting interoperability is greater efficiency, lowered operating costs, and a more secure, safer, and responsive building environment. It also improves reporting, information management, and decision-making with facility-wide insight and control for better performance.

Early BMS was limited to connecting to building systems from one manufacturer but there has been a rise in open communication protocols such as BACnet and Modbus which allow third-party devices, such as fire panels, to be easily integrated with the BMS. So how do third-party devices communicate with the BMS?

Fire Safety

A field controller for integration, such as the Advanced Commander, is a powerful IP-based solution for customers that need protocol translation between an Advanced addressable fire panel and a BMS. The Advanced Commander is a simple bridge between manufacturers’ components. It’s also bi-directional so it can monitor and communicate with other systems the BMS is connected to. For example, the BMS can send messages to an Advanced fire panel and the panel can send messages back – so, in a fire, it could close dampers in the ventilation system to stop smoke spreading, shut down fans, start the smoke extraction system, and send all the elevators to the ground floor and park them to prevent people from using them. This two-way communication is particularly useful in complex buildings, such as data centers which rely on power and cooling systems. Here through integration with the fire panel and the BMS, there may be a connection with HVAC, allowing control of dampers and fans, as well as the access control system and power supply system monitoring and control.

It’s also beneficial if a field controller offers flexibility by being able to work with both the BACnet and Modbus open networks, such as the Advanced Commander, which also goes one step further. If a field controller is incorrectly specified to one of the protocols by the customer, they can simply call Advanced and have the protocol changed remotely.

Easy configuration is also vital. With the Commander, users can configure exactly what they require to meet the fire safety needs of each building e.g. the number of connected devices and loops etc. The Commander supports up to 640 Objects/Tags of information, which can be configured and passed between network components and delivered to the BMS using TCP/IP technology. TCP/IP connectivity allows the Commander to be located locally to the distributed network of fire control panels, but at the same time caters for remote programming and BMS access. The Advanced Commander has a built-in Webserver to provide advanced control, display and management.

BMS integration is set to go further still. With new smart buildings, a BMS will be able to control a building without anyone actually managing it on site allowing users to monitor and change things in a building from a distance. BMS is already offering building managers efficiency, reduced costs, and reliability and with the advent of open communication protocols and field controllers, like the Advanced Commander, users are able to seamlessly integrate their fire system and monitor and control their buildings. With the rise of smart buildings, BMS is set to be an essential part of any commercial building.

For further information on Advanced’s AxisGo email: vzrnic@advancedco.com or visit: https://uk.advancedco.com/

Going Deeper: Mine Security

Established long before data mining and bitcoin mining, mining the earth continues to be a major economic driver. The International organizing committee for the world mining congress issues a yearly World Mining Data report. The 2021 report states that world mining production in 2019 was 17.9 billion metric tons (roughly the weight of 96,000 Boeing 747 Jumbo jets). Most of the production (58.9%) was in Asia, followed by North America (15.8%), in terms of countries, China, U.S., Russia and Australia are the four biggest mining nations. In the last few years, Australia and China have seen the most growth and surpassed Africa, especially in the production of minerals like Lithium, Gallium and Niobium needed for the battery industry, demand for which doubled since 2015.

Challenges in mining security and safety

The mining industry faces extreme and multi-faceted challenges in both security and safety. The key concern of security managers in the mining sector are keeping employees safe, however, they are also tasked with preventing theft of valuable raw materials and equipment, choosing equipment that can work in extreme environmental conditions, maintaining compliance with health, safety and environmental regulations and more often than not, working in politically unstable countries.

Working in harsh conditions

Mining security faces three main challenges: harsh conditions, large areas and high costs for installing comprehensive solutions. Compared to commercial-use security systems, mine security systems must work in harsh environments. Dust, humidity, fog, low light, heavy water flow, flammable gases and extreme temperature are common. At the depths of mines, the temperatures could reach in excess of 45 degrees Celsius and the environment is constantly moist and humid. The outside climate in countries like Australia, South Africa or Russia can also be challenging with freezing temperatures in winter or searing desert heat in summer.

“When considering these conditions, equipment should be tested and certified with appropriate impact and ingress ratings, and this should be further evidenced and supported by the manufacturer through long product warranties. Reliable equipment ensures the system continues to do its job and the business continues to operate profitably whilst protecting its workforce” emphasized Mike Margrain, National Technical Manager for Gallagher in Australia.

Equipment therefore needs to be ruggedized and customized to mining operations. Operators need sealed, waterproof units with vibration dampers, which can function over a wide temperature range. All cables need to be secured in airtight or waterproof material, preventing dust and other particles from damaging them. Explosion-proof devices must be installed with appropriate cable management systems.

Cabling technique for example is different for mines, since drilling or attaching cables to rock can only be done by engineering personnel. The solution is pre-installed infrastructure cabling that provides power and communications for conveyor systems or vehicle workshops to most underground points.

Ensuring mine employee safety

Employee safety is the primary concern in the harsh working environments in mines, and verifying authorized personnel is the first step in accomplishing this.

Access control at mines should only admit personnel who passed safety inductions, medical checks and training. Added features include license renewal and expiry notifications. Management is increasingly aware of the cost related to worker safety failures, loss of lives and loss of material and equipment. Other than passing government regulations, increasing the level of security and safety could save money, increase productivity, reduce losses in infrastructure and cut production downtime.

“In underground operations, it is paramount that the location of workers is known due to the elevated risk in these environments. Cardholder location tracking is implemented to ensure workers can be accounted for in the event of an emergency, or to safely manage underground blasting” explained Margrain and described how this works in the field: “Providing electronic ‘tagging’ stations and implementing long-range tracking of personnel ensures the control room operators not only know how many people are in locations underground, but in which area each worker resides. Integrating this data into firing procedures ensures explosives cannot be triggered until all personnel are accounted for in safe areas. Tagging portals which provide feedback to the worker with personal information (and photo ID images) provide peace of mind that the system has indeed logged their location as they travel to different areas while on shift. Furthermore, long-range tracking of workers can be employed in underground operations where travel is required in buses, light vehicles, or machinery. This ensures the location data can be captured without requiring personnel to exit vehicles in dangerous locations to present to a physical access point. The method of access credential utilized for this safety data becomes extremely important as the risk of missed movement can have real implications for personnel health and safety”.

In addition to controlling access, monitoring the work zone is essential for protecting employees. The use of video surveillance underground helps to monitor miner safety by viewing rock falls or accidents in real time, speeding up search and rescue time, and help inhibit illegal activity such as theft or pirate miners. For large areas, radar integrated with video detects if a worker is in a hazardous area or is near hazardous materials or gases. It secures transport and storage of ammonia nitrate, explosives and other hazardous materials.

Should an accident occur, the operational health and safety (OH&S) solution must track miners by access control, sensors and RFID systems. The solution should generate “muster reports” quickly, providing the exact number of individuals in an area to the control room personnel at any given time.

Access control solutions in mines

Access control in the mining and resources sector is generally used less for security and more to manage governance, risk, and compliance; “it’s all about protecting the safety of workers and ensuring business continuity,” said Gallagher’s Margrain. “This includes managing personnel competencies to only allow access to those that hold active qualifications and inductions for the site, or within a particular onsite area.  Contractors may also perhaps only enter if they hold current insurance and have an active work order. In many countries, there are state or government legislated licenses that a worker must hold before they can work on a mining site. These competency level controls will differ depending on what role a worker has and where they are working — for example, there will be different enforcement rules for someone working underground, than those working only on the mine surface” he added.

“Fatigue is a significant risk to workers at an organization that operates 24/7, particularly to those who work night shifts or are working in dangerous environments. We see these rules being applied in more stringent ways for such personnel to prevent a worker from breaching fatigue policies during their shift. An access control system allows sites to quickly locate workers for risk assessments and a potential change of personnel – not only saving time, but also preventing disruption to the site. This type of management (with appropriate enforcement and proactive dynamic notifications) therefore becomes even more important for personnel that are working underground,” explained Margrain. To prevent theft, most attention is focused on access control and intrusion detection for storage, processing areas and areas where heavy machinery is present.

Whilst biometric access control has rapidly increased in popularity in recent years, the uptake in the mining and resources industry has been slow. The primary reasons for this are because daily work environments can impact the ability to reliably match workers via biometrics, due to workers becoming dirty or wearing PPE (personal protective equipment).

Video surveillance in mine security

Security requirements differ by the mine type. Open-pit mines are based on authority and risk levels and put emphasis on access control, while underground mines — with a higher requirement for safety — put emphasis on people location management.

The large area of mines poses a challenge to security. Fencing and lighting might be very expensive, and even with the most comprehensive security solution installed, surveillance is not considered as a viable option for many underground mines, due to harsh conditions and extended tunnel length. Large mines can have hundreds of kilometers of tunnels, which simply cannot be effectively monitored by cameras.

Intrusion detection in mines

While priority areas depend on the site, a mine’s security profile is generally developed from the outside in, making perimeter security the first concern. However, although perimeter fencing is important, it is often impractical due to the large and difficult landscape of mine sites.

Video surveillance can detect perimeter intrusion. Day and night cameras are suited for open areas with good light over long distances. Infrared cameras can perform close-range monitoring at low light entry and exit points. For dark outdoor areas, thermal imaging cameras can see intruders.

Preventing equipment theft

Some mine vehicles are worth millions of dollars and are costly for downtime and repairs, so monitoring and securing equipment is important. Other than asset tagging, sensor solutions such as onboard vehicle collision alert technology also help protect property. The collision alert system detects hazards in the vehicle’s path and alerts drivers for potential collisions, preventing damage to the vehicle and protecting worker safety. Solutions like these provide invaluable production data feedback in difficult-to-reach areas. When integrated with access control, mine companies can make sure that only authorized personnel can operate the vehicle. The option of combined driver & vehicle identification increases security as you know exactly who was driving which vehicle.

Driver-based automatic vehicle identification (AVI) ensures that a vehicle can never leave, or get access to a secured area unless occupied by an authorized driver. Vehicle and driver access traditionally requires the driver to stop and badge or present their access card. This can often result in traffic congestion around access points/gates. Current solutions allow vehicles (both trucks and cars) to activate gates far enough in advance (up to 10m, at speeds up to 200 km/h) which eliminates the need for vehicles to stop, ensuring an uninterrupted flow of traffic. This is a notable feature for mining sites where it is disruptive to stop and start heavy machinery.

Trends in mine security

The United States Mine Safety and Health Administration (MSHA) maintains a database of all mine-related accidents and fatalities in the U.S. MSHA accident reports show that footage from video surveillance is often used in the forensic investigation of accidents.

On May 2, 2020, Rodger A. Zimmerman, a 56-year-old front-end loader operator died when he was engulfed by material inside a collection container (hopper) at Enon Sand & Gravel mine. Zimmerman entered the hopper to clear a blockage caused by material inside the hopper. Once inside, a large amount of material dislodged, engulfing Zimmerman. Video evidence from the mine’s surveillance system verified entry into the hopper to dislodge blockage from underneath was a common practice and occurred repeatedly on previous days captured on the video. The surveillance video showed miners on the belt structure and/or inside the hopper not wearing safety belts or harnesses and not equipped with lifelines, while the belt was operating and without engaging in lock-out-tag-out (LOTO) procedures.

Today’s video analytics can be used to detect and stop this type of accident before happening. Video analytics can raise an alert when employees are getting too close to dangerous equipment or if they are not wearing the right safety equipment like a hard hat or safety harness. Hikvision for example installed a system in a coal mine in China that increased worker safety by monitoring the areas around winches and other equipment, and by sending alerts if employees get too close. The Hikvision solution was also configured to support specific mining-safety applications, such as constant monitoring of surface water levels in different areas of the mine. Constant seepage from rock formations means that surface water can accumulate in different areas of the mine, which is a problem in terms of potential flooding, damage to infrastructure, and worker safety risks. The Hikvision system monitors surface-water levels constantly and allows the mine staff to take action to deal with any problems that arise before water levels exceed safe limits.

Ai-driven video analytics are gaining traction as a means to minimize false alarms. Avigilon’s H4 Thermal camera for example is embedded with Avigilon self-learning video analytics to provide long-range perimeter protection and leverages thermal technology to operate under challenging conditions while minimizing false alarms. It detects the movement of people, vehicles and partly camouflaged objects in complete darkness or areas with challenging light conditions.

Security systems are also used to drive compliance with OH&S regulations. Access control manufacturer Gallagher allows cardholder information to be recorded in the Gallagher system and shared bi-directionally with existing HR/people management systems for accurate, real-time use. Staff records provide a full audit trail to ensure compulsory training and testing are undertaken. This minimizes corporate liability and enables organizations to meet their Duty of Care.

Mobile smartphone devices are commonly used to spot-check workers on-site (i.e., to validate they are trained and inducted to be where they are, or performing their current task), as well as being able to be used for mobile evacuation procedures and access control movements.

Compliance driving product requirements

Given the risks associated with mining operations, government legislation can be stringent but differ immensely in different parts of the world.  “We have seen an increase in concern around fatigue and exposure, and the need for reporting to assist with state levy calculations. Cases of corporate manslaughter against negligent management have certainly created more interest in systems which can demonstrate duty of care and protect workforces,” said Margrain. In many cases, not only do such system implementations meet those goals while ensuring business continuity, but they also demonstrate a reduction of operational cost through improved efficiency. Margrain recommended factoring this into vendor selection: “Having a system with governance, risk, and compliance solutions that can be tailored to meet changing requirements, without significant reinvestment, should be factored into vendor selection. By working with their vendor, sites operating in unique conditions like that of mining, can design a system that is tailored to the specific needs of their site and ensure health and safety requirements are met at the required level”.

(Source: asmag.com)

Feature Story: We visited the European headquarters of ZKTeco

Initially conceived as an international company, ZKTeco started out modestly, with only its products being sold abroad, without services and customization for customers. But then, at the global level, something happened that, contrary to expectations, opened new opportunities for many companies – the global economic crisis. In 2008, many security companies decided to try their hand at making it big in international markets. ZKTeco was among the pioneers.

By: Damir Muharemović; E-mail: redakcija@asadria.com

Our editorial team has covered many events in the past sixteen years. Having published no less than 178 issues of a&s Adria magazine so far, we witnessed the emergence and maturation of technologies, innovations that caused controversies only to become commonplace, the disappearance of former industry greats who were thought indestructible, the rise of new companies, we talked and hung out with the professionals who, in fact, can be said to have sown everything that has grown in the past decades. But, after all those years, one thing manages to impress us every time – a story about a name and reputation that grow together out of the vision that everything is possible, regardless of the challenges. In search of one such story, this time we went to the suburbs of Madrid, a city and a corporate “forest” in which countless businesses flourish. Madrid is also the seat of the European headquarters of a company whose access and entrance control is an evergreen tree in this corporate forest. We want to tell you a story about ZKTeco.

Watch the video report:

Creativity from all over the world

The European headquarters and warehouse were founded in 2010 and have been located in Madrid for twelve years. A pioneer in biometrics and RFID technologies, ZKTeco is now a multinational company with close to 3600 employees. From the beginning, its founders and engineers sought to independently develop algorithms to verify the biometric characteristics of the body, which over the years has become an ecosystem for identity verification and smart security. Both hardware and firmware as well as software are produced internally, at research and development centers scattered from from the India to Xiamen, Dalian and Dongguan. Today, the company’s offer is rounded up not only with biometric and RFID modules but also with access control systems, turnstiles and barriers, video surveillance, metal detectors, and integrated security solutions. At its European headquarters, where the service, sales, development, and financial departments are located together with a warehouse whose capacities will soon double by moving it to a new location, ZKTeco’s partners and distributors can receive all the necessary services. From there, they provide support to other European subsidiaries: British, German, and Italian offices, whose numbers they also intend to increase.

The economic crisis is an opportunity to change strategy

We were greeted by an extremely pleasant team of people, led by Even Wang, General Manager of the European Business Group at ZKTeco, in whose company we felt as if we were members of the personnel. Socializing took place until the afternoon and was spent in pleasant and useful conversations. Their friendly synergy, we noted later, is certainly one of the wheels that powers the company’s business on European soil, about which we will learn more later.

 “ZKTeco started as a small company, with two or three people”, says Mr. Wang from the outset of our conversation and continues: “The founder is Mr. John Che. The business started as a technology firm that was researching biometrics. At that time, biometrics were not so common in the world, so they tried to design one biometric module to offer to the market. Step by step, they decided that they could develop a time and attendance terminal. So, some money was raised to move to Shenzhen, a zone known for its electronics industry.” The company started to grow but that was not enough for a major breakthrough in the market. The business was mainly done in China, and only its products were sold abroad, without service and customization offered to the clients. But then, at the global level, something happened that, contrary to expectations, opened new opportunities for many Chinese companies – the global economic crisis. In 2008, Chinese companies decided to try their hand at making it big in international markets in order to prevent financial problems. “ZKTeco was among those who adopted this strategy at the earliest stage. In the beginning, we had a small team of people, but we were also lucky that the demand for biometric systems increased sharply”, adds our interlocutor. ZKTeco made a difference in the market by offering an attractive price, a broad range of products, and quality service. Clients knew that they could count on people who are always at their disposal, which is very important in business.

This resulted in rapid business growth. They are proud, they say, of the decision taken at the time. But it was not easy. “You go to another country where no one knows you, you have to learn to live there, find customers, talk to them in your poor English. I joined the company in 2010. I initially worked in India and I know how hard it is for a Chinese company to start from scratch outside their home country. Language, laws, taxes – these are all great challenges. But we were trying to gradually adapt, find local people and partners, understand each other and bridge the cultural gap. I can say that after 14 years of development we have a great team. We now have 3600 employees, of which 450 are internationals. I think that’s the largest number of foreign employees in a Chinese company,” says Wang.

Going public

Another important turning point for ZKTeco happened in 2020, and it was marked by yet another trend among Chinese security companies – going public. The higher inflow of capital enabled them to further strengthen and expand. ZKTeco started the process of the initial public offering (IPO) a little earlier in order to become a public company and increase capital investments in expanding production and opening new offices. “The money will mainly be invested in research and development, especially in the software segment. The second part will be related to the service network; we will open five new offices, new warehouses and continue to employ local people. I think we need to have local people in every country because the value is to offer services to our clients locally”, explains Wang. ZKTeco currently has 38 subsidiaries in Hong Kong, Macau, Taiwan and overseas, but they want to open many new ones. In Europe, they plan to open offices in France, Romania, and Poland, as well as in other countries.

People are the greatest resource

Just in time when the company went public, the coronavirus pandemic broke out. Yet again, as it happened in the past with the economic crisis, ZKTeco has found an opportunity to offer new solutions to its customers, this time in the form of a cost-effective and adaptable solution for measuring body temperature and detecting the wearing of protective masks. “We got a lot of great clients, such as Telecom Italia and Spanish Telefonica, as well as the opportunity to gain access to many banks and government institutions. That helped us a lot to get through the difficult period in 2020. We have kept and even increased the number of employees. We kept working in all countries and continued with our development and research. We even opened our office in the UK during the pandemic. Even in the most difficult period in May 2020, our team continued to help our clients in Italy”, recalls Wang.

The greatest strength in the focus on entrance control

Although it initially presented itself as a biometric company, ZKTeco is always trying to adapt to different applications. “We are currently fully focused on developing entrance control technologies and solutions, including those handling the passage of vehicles, people, and luggage. I think that we can offer a high value in that. As much as AI and IoT change the world, people have to start from the entrance. The entrance is a key point for home automation and office security. For the past twenty years, ZKTeco has been working on one thing only – entrance control. We try to offer the best hardware and software solutions. That is why we have no less than 10 product ranges today. Our greatest strength lies in this type of focus”, says Even Wang, General Manager of the European Business Group at ZKTeco.

Breaking stereotypes

How ZKTeco managed to expand its business in Europe year after year was the topic we discussed in detail with Kinga Zarzyck, International Business Development Manager with ZKTeco, who was both our host and the person behind the organization of our visit. For years, ZKTeco kept facing one obstacle that prevented them from stepping out of the widespread stereotypical mold. In the eyes of its users, the company was mostly seen as a supplier of access control and time & attendance hardware. In recent years, however, they have focused on delivering solutions, ranging from offering consultancy and adapting solutions to project requirements to assisting with their implementation. “Our goal in the coming years is to change this perception because ZKTeco is changing and growing constantly, not only in terms of its revenue but also in terms of its solutions and their quality. To achieve this, we have opened local branches in Germany, Italy, and the UK in the last five years. We also have salespeople in Romania and Poland. We intend to open local offices in these countries as well as in France in the near future. It is very important for us to be close to our partners and to react faster and adapt our solutions to the needs of the local markets “, explains Zarzycka.

In order to provide the best possible customer support, the European branch expanded the most in the segment of its pre-sales and project departments. It is, in fact, a new segment of ZKTeco that was created not so long ago to support partners chiefly through products. While distribution is important, integration is another channel that needs support. They currently work with more than 100 partners across Europe. Upon asking whether they work directly with installers and integrators or with distributors only, we were told that everything depends on the country. “We also work with integrators, and not only with the larger ones that have the capacity to develop their own solutions. Yet, it all depends on the strategy in a particular country and how that country is organized. Not every distribution channel in a country can function at the same level or be as good as, for example, the Adriatic region”, says Zarzycka, citing the Czech Republic, the Netherlands, and the UK as examples of countries focused mainly on integration with security system management software.

More solutions for the customers

Our host is also in charge of organizing business in our Adriatic region. She has been cooperating with partners from Southeast Europe for four years, and for that purpose, she was a guest at our Adria Security Summit on no less than three occasions. “We have tried to get even closer to our partners throughout these years through the support received at the Adria Security Summit. We plan to attend the coming Summit in October in Croatia. It’s one way to meet potential partners and companies we could work with. It is not just about offering them our access control technology, which is our best-selling product in the region, but rather about introducing them to other solutions we can offer, such as parking ramps and turnstiles. In addition to small and medium-sized enterprises, we are also getting involved in other larger and more complex projects with varied and non-standard requirements”, says Zarzycka. To achieve this goal, they are constantly investing resources in educating partners and customers about new series of products and solutions. This is done while simultaneously working on integration with different security platforms, which means that they will be able to access the projects not only with ZKTeco’s hardware but also with a full range of specialized products aimed at other complementary security segments. Regarding the manufacturing segment, ZKTeco will soon move its warehouse to a new facility in Madrid. So, it’s all about a comprehensive approach whose proper implementation will make success inevitable.No delays in production and delivery

When it comes to storing products with the aim of timely delivery in difficult times marked by the chip shortages in the global market, ZKTeco claims that they have prepared for the lack of materials and stored a lot of raw materials. “We have no production delays, and in addition, we have doubled the stock of all the products we sell here in Europe, so we have no problems with delivery. It’s all just a matter of proper planning. I am sure that with a larger warehouse, the situation will be even better, that is, it will be an even smaller problem than it is now “, says our interlocutor. However, due to rising raw material prices and multiplied transport costs, they were forced to revise the prices of their products. But, on the other hand, they compensated for this by extending their warranty to three years.

Showroom Tour

To get acquainted with the entire range of ZKTeco’s solutions, we visited a beautifully decorated showroom, which is divided into product segments, from access control and time and attendance to smart locks for hotels and smaller housing units. We were greeted by Mr. Robertodino Sebastiano Leita, an amiable International Presales Engineer with ZKTeco Europe.  As an excellent connoisseur of ZKTeco’s products and solutions, he introduced us to each product group and answered all our questions in detail.

ZKBioSecurity – the Core of ZKTeco’s Solutions

At the heart of ZKTeco’s solutions is the ZKBioSecurity web platform, which integrates multiple functionalities. It is all about the so-called modules for access control, time and attendance, online and offline elevator control, hotel and visitor management, parking lots, mobile patrols, and video surveillance. There are also new modules that allow data management from all access control devices, including body temperature measurement. VMS modules that support thermal cameras and network recorders are also included. When ProFace X [TD] or SpeedFace V5L [TD] face recognition devices are used, the person’s image is sent to the software, with the security guard being able to identify the person with the higher body temperature than usual. The people flow management feature has been added to the time and attendance module. The latest version of the platform also provides advanced security features such as FP online registration, HTTPS encrypted communication, registration using a QR code, an LCD screen to display a log of live access events, etc.

“The platform is one of our main services. I do not define it as a product, but rather as a service because it includes all the necessary solutions within the security framework. Access control is at the core of what we do, and to that, we can add more functionalities that are translated into modules. The control we provide is primarily focused on user protection. By this, I mean any type of information, such as normal entries, normal events, alarm events, and some types of anomalies – all of which are perfectly controlled. It is possible to integrate not only with our other devices but also with the products made by our partners via APIs and SDKs directly. Each module communicates with other modules, which is fundamental. This means that if you want to verify the alarm caused by an access control system or activate the alarm, open or close the door due to an event in the CCTV or sensor module, you are actually able to do it”, says Leita. The platform can be used in projects of all sizes. Its optimized architecture, which enables advanced biometric identification, and a modern interface provide users with a completely new experience and easy management of various systems.

Time and attendance from anywhere

When it comes to time and attendance data and associated hardware, the key difference is that ZKTeco generally does not use controllers but rather terminals. Still, “the market has changed a lot over the years and we are aware that mobile and cloud solutions are taking precedence. That is why one of our latest innovations is GoTime Cloud, in which a user can now use a mobile phone in addition to traditional card and biometric verification methods, while the supervisors have total control over employees: where they are, what kind of work they do, etc. You can see on the screen that each working code is marked with an image and all of them can be exported as reports”, explains Leita. Localization is available in the form of a map, which is increasingly in demand in the market, and you can also create advanced calendars, custom shift schedules, or configure all changes in your company.

Integration of mechanical entrance control and access control

The entrance control product series features several categories. There are several types of turnstiles and barriers available, which are divided based on the level of mechanics and electromechanical control one needs. The showroom featured various three-arm turnstiles and turnstiles with curved and flat flaps and barriers for parking lots, together with vertical tripod barriers used in football stadiums. But the real benefit is found not only in the products themselves but in the fact that they can integrate with their own access control. “It is important to mention that we can perform any mechanical and software integration ourselves because we are the proprietors of our technology. This means that no matter what kind of reader or controller is demanded for turnstiles, we can offer it to our customers. This greatly simplifies the work of the installers who install them in the field”, says our host.

Innovation at work

To get an idea of the designing prowess of their engineers, we were introduced to the ZPad Plus, one of ZKTeco’s best-selling products. Originally, it was a device used for time & attendance, but during the pandemic, there came a need to check the green certificate. So, they used the original public applications certified by the Italian government and integrated them with their hardware, which can now make decisions and open doors or activate an alarm relay based on the validity or invalidity of the certificate. “It is one of our best designs so far and it has been a great success, especially because we have improved the algorithm that has the ability to check personal documents, so we can be sure that the certificate belongs to the person who shows it”, says Leita.

We also had the opportunity to check the Mars Pro series of turnstiles with flat or curved flaps, designed for spaces with a large flow of people. It has a modular structure and comes with new features, such as frame modularity, which can be easily assembled and disassembled. No matter what level of damage is done to your turnstile, only its impacted part will need to be replaced. However, the most important functionality is the number of ten million cycles, which is a rarity on the market.

Radar-equipped barriers

There are two types of barriers on the market: those with strong mechanical components, which can raise arms up to six meters long, and cost-effective barriers for residential and commercial areas. ZKTeco offers both types. The parking solution is based on LPR bullet and dome cameras integrated with barriers equipped with VR10 radar, which completely eliminates the need for any induction loop. When the vehicle leaves an area, it is not necessary to re-read the plates so a copper spiral is usually installed in the ground and it detects the weight of the vehicle and sends a signal to the barrier to open. With radar, there is no need for that, because it is simply pointed to the right side and calibrated. The license plates are controlled locally by a camera, while the VR10 controls the arms without the need to install a magnetic loop, which also makes the job easier for installers. Another good thing is the anti-shock mechanism, which detects an obstacle (e.g. a child passing by) and prevents the arm from falling. “An additional important functionality of this solution is that it can work independently or you can connect it to our ZKBioSecurity platform. So, in addition to all the information about vehicles that pass through the barrier, you can also link each car with a user in the system”, concludes Leita.

We ended our showroom tour by checking the solutions with smart locks for hotels and smaller housing units, with ZKTeco offering four series: online hotel management, offline hotel management, smart locks with local Bluetooth connection, or smart locks with cloud connection via an e-mail account. This enables remote management of credentials, without the need to go to the site.

Thirteenth security company in the world

After a full-day tour of ZKTeco’s European headquarters and the meetings with the leading people from its management, business development, and technical departments, we were left with the feeling that the company has made a lot of progress during all these years. When we reflect on its first appearances at major security fairs only ten years ago and its modest biometric solutions which focused on cost-effectiveness back then, we simply have to compare it with what we had the opportunity to see and hear during our visit. It is no wonder, then, that ZKTeco ranked 13th among the top fifty security companies in the world according to Security 50 list. They have come a long way from one product group to multi-series solutions but managed to keep the focus on one thing – entrance control. And that is the biggest advantage of ZKTeco.

Take a look at the photos:

 

Computer Vision Is Transforming the Transportation Industry

Computer vision is helping to reshape the transportation industry at every level from streamlining the passenger experience to preemptive fleet maintenance to fuel optimization. As the transportation industry continues to evolve, converging technologies such as 5G and powerful edge compute will enable the next generation of prescriptive and adaptive data-driven outcomes benefiting passengers, the industry and sustainability.

Byline: Wayne Arvidson, Global Director, Market Development and Strategy, Dell Technologies

Whether moving people or goods, transportation environments are in constant motion. Railways, airports, cargo ships, and public and private transportation are complex use cases for computer vision. They require real-time situational awareness, based on the analysis of many different data points, which taxes compute and storage resources at the edge—defined as where the physical world meets the data world.

The challenge is being met using a real-time federated approach with scalable, high-performance hyperconverged infrastructures (HCI), allowing organizations to capture and process large amounts of data at the edge, and provide real-time insights. The results, not the actual data, are then sent back to a centralized location for re-training of the analytics model which then is pushed back out to all edge locations, thus delivering better quality insights in near real-time.

Although computer vision has not yet been widely adopted industry wide, transportation organizations that have invested are realizing gains in terms of safety, customer experience, operational efficiency, sustainability and revenue generation, and are looking to take advantage of further advances in technology in the future. Automation and touchless processes integrated with computer vision greatly enhance transportation services as well.

Collectively, this has a big impact on adopters, especially when organizations are hard-pressed to maximize profits amidst rising costs and reduced resources.

 What transportation industry challenges are addressed or resolved with computer vision?

 All facets of the transportation industry have seen tremendous loss in revenue and resources over the last few years. As the economy began to turn around, public and private transportation organizations were under pressure to rebound with lower budgets and labor shortages, spurring efforts to find ways to be more efficient.

In addition, safety is a key requirement across rail, water, air, and roadways, often requiring split-second decisions that can often be enhanced by machine learning. And predictive maintenance, where parts are replaced before equipment and vehicles break down, is extremely valuable to operations but often difficult to do well due to the number of variables involved.

In any of these situations, different data points can be ingested once, and analyzed for multiple uses. A security infrastructure can provide a foundation which captures audio and video data, and data from IoT devices, which the computer vision system then combines and analyzes, producing insights that can be used to positively impact safety, the customer experience, operational efficiencies, sustainability and revenue generation.

How can computer vision improve passenger, personnel and facility safety?

 A significant part of passenger and personnel safety is to ensure that the facility and equipment itself is physically secure. Through the use of cameras and sensors, computer vision enables more precise inspection of passenger baggage and cargo.

Certain types of behaviors or objects can also be monitored. Electronic devices, such as smartphones and laptops, each have a unique MAC address. Airports today can capture device MAC addresses to track devices throughout a facility. When combined with data from sensors, those devices can be automatically tracked and decisions made in real time. If an unauthorized person enters a secure area, security personnel are alerted to take immediate action. Computer vision systems can also determine how many people are in a location, for example if an evacuation is necessary.

Examples of computer vision affecting the customer experience

 An important focus of airports is to get people through the facility as quickly as possible. Part customer experience and part operational efficiency, computer vision with artificial intelligence can improve queue management by proactively determining when to add customer service personnel to an airport check-in counter or open another security line.

The touchless passenger experience is also gaining traction, which aims to minimize time from curb to gate while enhancing the passenger experience throughout the journey (Figure 1). For example, passengers could be automatically checked in upon arrival, prechecked to walk through security, be alerted to gate changes, order a coffee that’s waiting at the shop closest to the gate and use frictionless boarding. This scenario is possible through the correlation of data, with the computer vision system making the decision that you are the correct passenger.

 

Figure 1. Use of computer vision to streamline the passenger experience

We briefly mentioned the value of predictive maintenance to organizations; it also has a considerable impact on fuel consumption and costs, and can reduce an organization’s carbon footprint. Cameras and thermal vision technology are used to visually inspect vehicles for wear and tear, and when integrated with IoT sensors, can more accurately identify parts that should be replaced.

Airports can use computer vision to greatly increase the efficiency of ramp operations and plane turnaround. The system monitors the location of planes that just landed and whether the luggage offboarding equipment is in place. It also automatically notifies the catering truck, fuel truck, and ramp personnel.

Public transportation also benefits from the efficiencies brought on by computer vision. As municipal transit agencies look to increase ridership and fuel efficiency, some communities are experimenting with dynamic routing of buses to reduce instances of empty buses on routes. For passenger vehicles, some cities charge a fee when your vehicle enters the city center. Pollution sensors detect elevations in airborne chemicals, such as carbon monoxide, triggering an alert that results in varying fees paid by those vehicle owners.

Railways equip trains with cameras and install them in stations to inspect and monitor parts as the train rolls down the track, increasing safety, efficiency and revenues. For a detailed look at how computer technology is used to inspect railcars, browse this Duos Technology Group case study.

Does computer vision affect sustainability in transportation?

In the context of transportation, sustainability focuses mainly on the consumption and proper management of power and fuel. Airports, for example, deal with large amounts of fuel and are concerned about the release of potentially dangerous amounts of vapors and chemicals that could increase air pollution or contaminate groundwater. Deicing planes also requires the use of chemicals, so cameras and sensors can assist in deicing a plane just enough to make it safe without an excess of chemicals flowing from the tarmac or runway into the ground. Airports and railways deal with vegetation control as a means of fire suppression. Computer vision technology monitors fuel usage, air and ground contamination, and even the height of vegetation around landing strips and railyards.

Similar to smart cities, airports, train stations and cruise ships can use computer vision to control power consumption, water usage, air conditioning and heating. Based on where people are and their usage patterns, smart lighting can be automatically controlled to turn off or use downlighting during the brightest part of the day and light other areas 24/7 for safety purposes.

Generating revenue for transportation companies and the public sector

 This gets back to doing more with fewer resources as well as enhancing current revenue streams. For an airport, that means steering passengers toward retail within the facility to maximize their spend and turning aircraft around quickly, to allow more flights per day. A single flight can generate tens of thousands of dollars in fees, so getting one more flight through a gate per hour has a significant impact on revenue.

Depending on how crowded an airport is, dynamic pricing could be implemented automatically to adjust parking pricing. States and local municipalities also benefit from dynamic pricing. Drivers typically need a tag or pass for high-occupancy lanes on freeways. Computer vision technology can increase the fee for high-occupancy lane usage based on the current amount of traffic.

How do mobile edge computing and 5G affect computer vision in transportation?

 Real-time actionable insights and learning is critical to situational awareness in the field, and technologies like 5G and mobile edge computing enable faster response times.

Consider rolling stock, like a public bus. The driver needs to focus on the road and passengers. A bus equipped with cameras and a compact hyperconverged infrastructure can use computer vision to create real-time situational awareness for the driver as well as for transit hub staff. As the vehicle approaches a bus stop, the system captures the number of waiting passengers, or passengers with special needs. The increased bandwidth of 5G enables fast transfers of the insights back to a central location for analysis, with the results of the analysis streamed back to the bus in near real time.

Computer vision is truly transforming the transportation industry, aided by automation, touchless technologies and 5G. Edge computing and machine learning capabilities make faster and better-quality decision making and situational awareness in the field possible, which in turn increases efficiencies, makes environments safer, lowers carbon emissions, raises customer satisfaction and helps organizations be more profitable.

For an overview of computer vision and its impact on industries, see The Future Is Computer Vision – Real-Time Situational Awareness, Better Quality and Faster Insights.

For more information:

 

 

 

How sanctions on Russia could impact US security buyers

Source: Prasanth Aby Thomas, Consultant Editor, asmag.com

The US and many nations have imposed sweeping and severe sanctions on Russia after it invaded Ukraine. These sanctions could have certain downstream effects for US security buyers.

Asmag.com recently spoke to Brian Schwab, Founder and Principal Consultant of S3SDC and partner at eSRX, to understand the extent of these effects. This category includes video surveillance equipment, access control, intrusion detection equipment, etc. The current sanctions list prohibits the export of advanced, dual-use technology to Russia. This will seriously curtail that country’s ability to produce physical security components or equipment of any value for export purposes. But the impact will not be the same for buyers in the US.

“When analyzing the overall global physical security equipment market, in my opinion, Russia does not produce any equipment in this area that is qualitatively or technologically distinctive from any other global producer,” Schwab said. “Generally speaking, physical security equipment, or components thereof, are what economists call “substitutional goods.” This means that given price and availability, a consumer can simply switch from one equipment manufacturer to another and still be able to meet their immediate security needs with little noticeable loss in quality.”

That said, Russia is not a major global market player in equipment production. Most of the top physical security equipment manufacturers are in Asia, western Europe, and the Americas. The market for Russian physical security goods in the US is already minuscule, and these sanctions may not have any noticeable impact on US buyers in sourcing products.

 More impact on cybersecurity

Any tangible impact of the sanctions is likely to be felt in the cyber security realm. The COVID-19 pandemic transformed the everyday work environment making telecommuting or remote work the new norm. Online communication devices and info sharing platforms (such as Zoom, Teams, and Dropbox) have become extremely popular. This has increased the number of potentially vulnerable devices and network connections, resulting in a sharp rise in the number and type of potential threats US businesses and other organizations face.

“One major Russian cyber security firm, Kaspersky Labs, has already said it will be unaffected by the sanctions and that it will fulfill its contracts and obligations to international customers and partners,” Schwab continued. “This seems to be because Kaspersky opened a security network data center in Zurich, Switzerland, to handle information voluntarily shared with users in North America, Europe, and Asia.” This allows Kaspersky to mollify any concerns that Russia can exploit data, with or without the company’s cooperation or consent. Yet, Kaspersky’s sales in the US market were flat in 2020 and were estimated to have increased by 2.8 percent in 2021.

Any specter of doubt in the minds of many US security buyers, already cautioned by the 2017 National Defense Authorization Act and actions taken by the US Department of Homeland Security that same year, will likely have already caused many to switch their service provider to a non-Russian organization.

Cybersecurity threats also impact buyers

A second-order effect of the sanctions would be hacktivist or state-sponsored cyberwarfare activities aimed at disrupting business activities, compromising data, and other nefarious activities conducted on behalf of the Russian state.

“This is where I would anticipate the largest financial impact to US security buyers will likely be seen through an increase in costs associated with data protection measures,” Schwab said. “However, with increasing ransomware attacks over the past few years, many US firms have already begun to move in this direction. As such, the second-order effect of implementing these security activities may already be factored into these US firms’ acquisition process and not as much of a heavy lift as one may at first think.”

For those who have not switched but remain committed to using one of several large data analytics firms of Russian origin or location, there are legal issues that must be measured and assessed as part of those firms’ Enterprise Security Risk Management process. This will likely require US buyers to assess their contracts with these Russian firms to determine whether force majeure measures exist, whether these protections would apply (i.e., the undeclared war Russia launched may not be included under force majeure provisions), and how any potential risk of data exposure, compromise, or loss may impact the US company’s downstream clients. If force majeure is not viable, protections may be available under “Restatement of Contracts,” which would allow cancellation of existing contracts due to either supervening impracticability or frustration of purpose. While these will not protect against possible misuse/abuse of data these Russian firms maintain, they will provide some measure of legal protection if data is breached or maliciously compromised.

Impact on the supply chain

 Russia plays a small but essential role in supplying specific raw materials used to create security- and defense-related equipment. Russian raw materials, such as titanium, are integral parts of defense and aerospace equipment.

“However, many US firms had begun to diversify their raw materials suppliers following the 2014 Russian takeover and annexation of Crimea,” Schwab pointed out. “Firms may now begin to look to China to pick up the slack, but this is not a guaranteed way to eliminate supply issues caused by sanctions, given the trade war between the US and China that began during the Trump Administration as well as the growing Sino-Russian “strategic partnership.”

Conclusion

 In short, Russia’s penetration into the US security market was limited even before this war started. Given Russia’s lack of market share, it is unlikely that US security buyers will see a significant impact from the sanctions imposed on Russia in the wake of its invasion of Ukraine.

The real impact will likely be a drop in immediate supplies of raw materials needed to create security-related equipment and devices. This will potentially cause short-term shortages that will increase prices and the availability of some equipment. However, as new raw material sources are developed, this is likely a short- to mid-term impact only for US buyers.

Finally, US firms will have to assess their existing contracts with Russian firms to protect themselves legally. While this is a time-consuming process in itself, US firms may also experience a corresponding increase in cyber security spending above pre-invasion levels to protect themselves against anticipated Russian cyberwarfare and other state-sponsored malicious hacking activities.