• Covid-19 – click here for the latest updates from Forum Events & Media Group Ltd

Posts Tagged :

CCTV

Easy to deploy thermal imaging camera systems for the fight against covid-19

960 640 Guest Blog

By FLIR

Keeping workers and customers safe from the 2019 coronavirus disease (COVID-19) is an important goal for commercial businesses,  industry, and government agencies during this pandemic. Most have already instituted some type of protective measure, whether it’s disinfecting equipment, encouraging hand washing, requiring six feet of distance between people, or any of the other recommendations for reducing risk. These methods help customers avoid potential contact with the virus and help businesses avoid unexpected shutdowns or loss of workforce due to illness.

Unfortunately, none of these measures can prevent a sick person from entering a shop or building. What’s needed is a fast method of screening workers and/ or customers for signs of a fever – one of the known symptoms of infection. FLIR thermal imaging cameras can be an important element of the solution by offering an easy, non-contact, frontline method of screening for elevated skin temperature.

Options for high-traffic areas

Beyond social distancing, hand washing, and asking people whether they’re experiencing symptoms, what are the most efficient options for helping to reduce risk of transmission? While the most comprehensive solution is to use medical device like a thermometer, there are several disadvantages: individual temperature checks require time, proximity, personnel to use the device, and protective gear to keep workers and other customers safe. A thermal imaging camera that can measure skin temperature from a safe distance would be more efficient and  have less impact on throughput. Thermal screening can also reduce the number of people who need direct checks with a thermometer. Only those people who appear to have an elevated skin temperature would need secondary screening with a medical device.

Building thermal into your workplace

How would you incorporate this kind of imaging in your frontline screening plan? You could set up a FLIR thermal camera on a tripod at an entryway to screen people as they come in. Each person will need to stop briefly at a marked point in front of the camera for a quick screening.

Anyone monitoring the thermal image won’t really be able discern the person’s features or tell who it is. But they will   be able to measure apparent skin temperature and see it displayed on screen. If the person’s skin temperature appears normal, they can proceed past the check station while the next person is screened.

Many FLIR thermal camera models include FLIR Screen-EST™ Mode, a built- in temperature screening that makes this process even easier. First, this mode can help you find the average skin

temperature for people moving through your location. This is important because ambient factors such as air conditioning, outside temperatures, and even time of day can affect body temperature. Based on this average, you can then see who appears to have a higher skin temperature. You can even set an audio or color alarm on the camera that will go off when the camera detects an above average temperature. From there, you will know who to check for a fever using a thermometer or other medical device.

In addition to on-camera screening mode, FLIR offers a desktop software that works in conjunction with the thermal camera further enhancing the screening process. FLIR Screen-EST™ Desktop Software has features like auto face detection and auto average sampling. Cameras are connected to the software by standard cabling or Wi-Fi.

Thermal camera’s can’t detect fever or illness 

It’s important to understand that no thermal camera can diagnose illness or see a virus. They also should not be relied upon to determine if someone has a fever. What thermal cameras can do is tell you whether the person being screened is displaying an above-normal skin temperature. That means you can screen a lot of individuals quickly and only pull aside those who appear to have a high skin temperature for secondary checks with a medical device.

More to explore

FLIR has many resources to help you better understand thermal imaging for elevated skin temperature screening, including camera recommendations, tips for using screening mode, and an FAQ page.

To learn more, go to FLIR.com/EHS

Verkada drives UK expansion with Distology

960 640 Stuart O'Brien

Verkada and Distology have entered a strategic partnership to drive adoption of the former’s hybrid cloud video security and access control systems within the UK and Ireland via channel partners.

Since launching in the UK, Verkada says it has seen traction with customers across industries, including Bath Spa University, GAIL’s Bakery and Border Biscuits.

The company, which recently ran a series of cloud security webinars, has extended its global infrastructure to the UK, including a dedicated HQ and logistics hub in London, as well as a regional AWS data centre in Ireland. With Distology, Verkada adds a distribution network to reach new growth opportunities with leading resellers.

Built on industry-leading computer vision and edge-based technology, Verkada cameras analyze events in real-time to provide users with actionable insights to simplify and speed up investigations. 

Verkada joins a list of existing Distology vendor partners, including security leaders such as Okta and Yubico.

“As we sell exclusively through channel partners, they are the foundation of our success,” said Edoardo Cannarsa, Head of EMEA Channel Sales at Verkada. “As we expand globally, partnerships with leading distributors like Distology will allow us to more effectively support our existing UK and Ireland reseller network. At the same time, we’re accelerating new VAR enthusiasm and enrollment while ensuring our customers receive the quality and best-in-class experience we strive to deliver.”

Stephen Rowlands, Sales Director for Distology, said: “Whilst there is a constant emphasis on the importance of IT security, physical security has too become a critical need for organisations, and we’re proud to be offering Verkada as our solution.

“Companies have a responsibility to keep their employees, customers and property safe, and if you’re one of the many businesses with multiple locations to manage, a solution that can be managed remotely is key for centralizing the responsibility of physical security management within an organization.

“Verkada offers a true security-focused product unlike any other, and I have no doubt we’ll see extremely high adoption rates of this product across the UK&I over the coming months.”

For additional information, please visit the Distology website at www.distology.com or call 0161 914 7798.

WEBINAR REWIND: Moving Beyond CCTV for Video Security

960 640 Stuart O'Brien

Last week Verkada hosted the latest in a series of webinars packed with key insights for modernising your video security solution – if you missed this essential session you can re-watch it again now.

Organisations are quickly moving to the cloud to enable remote access, support greater video monitoring scale, and improve usability of video security systems away from the traditional CCTV models.

In the webinar, you’ll receive expert guidance from Brendan Cherry, Regional Sales Manager – UKI at Verkada and Lenny Eskin, Head of Demand Generation at Verkada, on how to deploy smart, cloud-based video security that is simple and scalable for anyone in your organisation, including:

  • An intro to the Verkada platform
  • CCTV vs The Cloud
  • A live demo of the technology
  • A full Q&A

To watch the webinar again, click here.

If you’d like to request a risk-free trial with Verkada, sign up here.

WEBINAR REWIND: ELIMINATE THE NVR, MOVE TO THE CLOUD

960 640 Stuart O'Brien

Last week Verkada hosted a webinar packed with key insights for modernising your video security solution – if you missed this essential session you can re-watch it again now.

Organisations are quickly moving to the cloud to enable remote access, support greater video monitoring scale, and improve usability of video security systems away from the traditional CCTV models.

In the webinar, Verkada shares how to deploy smart, cloud-based video security that is simple and scalable for anyone in your organisation. Here are just a few reasons why Verkada stands out from the rest:

  • No NVRs, DVRs, or severs
  • Low bandwidth usage (5-20 kbit/s at rest)
  • Up to 365 days of video retention
  • Share a live camera feed via SMS to first responders within seconds

To watch the webinar again, click here.

If you’d like to request a risk-free trial with Verkada, sign up here.

WEBINAR: Moving Beyond CCTV for Video Security

960 640 Stuart O'Brien

Thu, May 28 2020 2:00PM BST / 9:00AM ET

Click here to register

Organisations are quickly moving to the cloud to enable remote access, support greater video monitoring scale, and improve usability of video surveillance systems away from the traditional CCTV models.

In this Verkada webinar, we’ll share how to deploy smart, cloud-based video surveillance that is simple and scalable for anyone in your organisation.

To register for the webinar, click here.

If you’d like to request a risk-free trial with Verkada, sign up here.

WEBINAR: Eliminate the NVR, Move to the Cloud

960 640 Stuart O'Brien

Want a custom branded 20oz YETI tumbler? Join Verkada’s webinar on Thursday, 14 May 2020 to learn how to modernise your video security solution.

Organisations are quickly moving to the cloud to enable remote access, support greater video monitoring scale, and improve usability of video security systems away from the traditional CCTV models.

In this webinar, Verkada will share how to deploy smart, cloud-based video security that is simple and scalable for anyone in your organisation. Here are just a few reasons why Verkada stands out from the rest:

  • No NVRs, DVRs, or severs
  • Low bandwidth usage (5-20 kbit/s at rest)
  • Up to 365 days of video retention
  • Share a live camera feed via SMS to first responders within seconds

All attendees will receive a custom-branded 20oz YETI tumbler!

CLICK HERE TO REGISTER TODAY

WEBINAR: How To Modernise Your Video Security Solution

960 640 Stuart O'Brien

Organisations are quickly moving to the cloud to enable remote access, support greater video monitoring scale, and improve usability of their video surveillance systems. These technology forward organisations are now beginning to replace their outdated traditional CCTV networks with a more modern approach.

Register for Verkada’s next webinar on Thursday, 14 May 2020 at 2:00pm BST to learn how to:

  • Deploy smart cloud-based video surveillance
  • Eliminate the NVR, one of the most vulnerable points of entry to your network
  • Scale coverage effortlessly without impacting your network footprint
  • Securely share live camera feeds via SMS in seconds

All attendees will receive a custom-branded 20oz YETI tumbler!

CLICK HERE TO RSVP TODAY

WEBINAR: Introduction to Hybrid Cloud Camera Security

960 640 Stuart O'Brien

Organisations are quickly moving to the cloud to enable remote access, support greater video monitoring scale, and improve usability of their video surveillance systems. These technology forward organisations are now beginning to replace their outdated traditional CCTV networks with a more modern approach.

Register for our next webinar on Thursday, 23 April 2020 at 2:00pm BST to learn how to:

  • Deploy smart cloud-based video surveillance
  • Eliminate the NVR, one of the most vulnerable points of entry to your network
  • Scale coverage effortlessly without impacting your network footprint
  • Securely share live camera feeds via SMS in seconds

Can’t join us for the webinar? Not to worry. Everyone who registers will receive access to a copy of the recorded webinar.

Register using the following link: https://www.verkada.com/webinars/uk-introduction-to-hybrid-cloud-security/?date=2020-04-23&utm_campaign=7012T000001gsenQAA&utm_source=forumeventsblast&utm_medium=email

Providing The Keys to The Smart City

960 640 Stuart O'Brien

 Sean Wray, VP NA Government Programs, Certes Networks

Smart cities seem inevitable. According to IDC, Smart City initiatives attracted technology investments of more than $81 billion globally in 2018, and spending is estimated to grow to $158 billion in 2022. Similarly, in 2018, the number of major metropolitan cities relying on or developing a comprehensive smart city plan – as opposed to implementing a few innovative projects without an overall smart plan – dramatically increased. 

In the US, for example cities like Philadelphia, Newark and Chicago all have goals to upgrade and to become leading ‘SMART’ cities, while UK innovation is being spearheaded by major conurbations such as Bristol, London and Manchester.

A significant investment is being made by cities in data connectivity providing a number of new technologies such as Wi-Fi 6, smart grid, and IoT sensor devices, all promising to enhance overall visibility and security. However, as we extend the reach of technology and connectivity, there will increasingly be cyber-risks to take into account. As part of their transformation, smart cities serve as a technology hub and gateway to major institutions such as banks, hospitals, universities, law enforcement agencies, and utilities. This means the storage and transmission of customer data such as social security numbers, addresses, credit card information, and other sensitive data, is a potential goldmine for malicious actors. Not to mention an increasing number of projects monitoring roads, traffic, traffic light and metro services, all of which must be kept secure from threats at all times.

Security Challenges

When connectivity and innovation meet such large city infrastructures, they immediately become vulnerable to cyber threats from malicious actors waiting to bring all that hard work to a standstill. And, the routes in are manifold. 

We are increasingly dealing with connected versions of devices that have existed for a long time, such as CCTV cameras, and as a consequence, digital security is not very often incorporated into their designs.

In addition, cybersecurity will have to extend far past personal, or internal corporate networks, to encompass far-ranging technological protection for vast city networks at a scale and a pace many are struggling to respond to.

Moreover, the sheer volume of data being collected and transmitted across a multi-user network, with numerous locations, can be extremely challenging to protect. London’s City Hall Datastore, for example, holds over 700 sets of big data that helps address urban challenges and improve public services, and the rise in cashless payment methods for transport.

It is the complexity that the above factors represent that often overwhelms a network security team’s ability to ensure sensitive data is protected with encryption, especially when network infrastructures can be constructed using different vendor technology, many of whom do not provide strong encryption. This also includes many municipalities who have older Legacy, third party or disaggregated networks.

It is therefore not a matter of if but when sensitive data may fall into the wrong hands. Network security teams have to ensure that any data breach must be detected immediately before the infection spreads from network system to network system, potentially shutting off critical services for thousands of companies, notwithstanding for those who reside in the City itself.

Providing the Keys

Choosing the right encryption solution is critical and can be key in mitigating damage caused by a data breach. Most cities find implementing these solutions disruptive and complex, especially for organisations that operate large and diverse networks. For example, manual configuration of encryption can lead to human error unknowingly exposing risk and managing multiple vendors can be burdensome and inefficient. Most importantly, network visibility is lost with many encryption solutions, which is a significant issue as it reduces the ability for security teams to detect and thwart malicious actors and cyber threats. 

The vulnerabilities and threats associated with trying to protect large volumes of data moving across a vast multi-user network involves a security strategy that is simple, scalable and uncomplicated in order to avoid any disruption of critical infrastructure services provided to businesses or citizens, not to mention be compliant with governmental cybersecurity regulations and / or code of practices

Whereas traditional Layer 2 & 3 encryption methods are often disruptive and complex, a Layer 4 solution enables encryption of data in transit independent of network applications and without having to move, replace or disrupt the network infrastructure. This is a significant savings in resources, time and budget.

In addition, network blind spots due to problems, outages, and cyber-criminals using encryption to conceal malware, increase network security risk and are potential regulatory compliance issues. According to a recent survey from Vanson Bourne, roughly two-thirds, or 67 percent, of organisations say that network blind spots are one of the biggest challenges they face when trying to protect their data.

With network monitoring one of the strongest defences against blind spots, Layer 4 encryption and encryption management tools offer network visibility by keeping a close and constant eye on network traffic. Network visibility tools allows existing applications and net performance tools to work after encryption is turned on without blinding the network.

Finally, adding in network observability allows smart cities to analyse and gain deeper understanding of network policy deployment and policy enforcement by scrutinising every application that tries to communicate across the network, all the while monitoring pathways for potential threats now that each policy is observable in real-time.

Conclusion

For organisations and teams tasked with implementing smart technology in residential, commercial and public spaces, plans on how to do so will have to be part of the design and planning stage – including how we securely implement and maintain these smart spaces. It is integral that all connected aspects of smart cities have undergone extensive planning and designing, with a smart city architecture for service key management at the core. Defining standards and enforceable policies that can be analysed to help identify network vulnerabilities and thwart potential threats is critical.

Providing better technology is an ever-evolving, fast-paced race and caution should be given to those cities who move so fast that they risk building an infrastructure without equally giving precedence to the protection of data of those who work and live in their city.

GDPR compliant facial recognition CCTV arrives in UK

960 640 Stuart O'Brien

DVS has become the first UK electronic surveillance distributor to provide the Facewatch facial recognition crime deterrent system to its installer and reseller network.

Over the past 18 months, Facewatch has been successfully trialed across a range of retailers, with demand for the system as a deterrent to stop shop theft and violence in stores particularly high.

DVS says making Facewatch available through established UK reseller channels will ensure the product, training and support is provided at the highest level and a rapid roll out can be achieved.

Facewatch, which is sold as a licenced product, is GDPR compliant. The uploaded criminal data is the responsibility of Facewatch under a data sharing agreement, which has been signed by the user. 

Facewatch will be available to ‘approved’ installers who have been trained on both the practical setup of the cameras and aspects of managing and running the system.

“Facial recognition is being discussed within businesses and the wider world by those who understand that the best technologies can deter and prevent crime,” said Gavin Dunleavy, commercial director, DVS Ltd.

“Facewatch is the leading facial recognition solution with a focus on the retail sector and other verticals alike. With GDPR compliance and privacy controls built into the system the solution becomes powerful and legally deployable. Facewatch combines simple CCTV hardware with a secure cloud-based software solution, so accredited training and support is of the upmost importance for our installers to deliver this incredible solution. 

“We will be running training from our HQ initially then across the UK with a plan to have trained and accredited strategic partners in place throughout 2020.”

Nick Fisher, CEO Facewatch, said: “DVS are a perfect partner for us. They have a highly technical team; they are used to working with the very latest CCTV technology and have a great team on the road and at their HQ offering sales and technical support. 

“Facewatch is a sophisticated SAAS (software as a service) product that requires training and support and DVS have a well-established training team who will work with us to establish a network of approved Facewatch installers. Facewatch is supplied on licence and therefore creates a new recurring income stream for installers who will provide lifelong technical, product management and training support to their customers. We are very excited to announce DVS as our channel partner.”