security training

BSIA responds to cash courier shooting in London

Walthamstow shooting The trade body representing the private security industry in the UK has issued the following statement relating to the recent shooting of a cash-in-transit courier in Walthamstow, north-east London. The cash-in-transit courier was injured from the shooting ambush. James Kelly, chief executive of the British Security Industry Association (BSIA) said in a statement: Every day, cash-in-transit couriers perform a vital public service, transporting cash around the country and supporting banks, retailers and businesses by facilitating millions of financial transactions across the UK.

However, in doing so, they place themselves at risk of extreme violence, as today s incident sadly reminds us. Kelly goes on to point out that the number of attacks on cash-in-transit couriers remains at an all-time low. There were 76 injuries to cash-in-transit crew members, police and the wider public in 2016. However, the risk of violence and injury remains a very real threat to couriers. This is something that the private security industry together with its partners in police and government is continually working to reduce through initiatives like SaferCash, which shares intelligence about attacks and suspicious incidents between couriers and the police, continued Kelly. Our thoughts are with the injured courier and his family who have made a very personal sacrifice for the sake of our nation s economic security and we wish him a full and speedy recovery. The BSIA is a longstanding and valued partner of, and exhibitor at, IFSEC International, Europe s biggest fire and security trade show taking place 20-22 June 2017, London ExCeL. Get your free badge now. Take your security knowledge to the next level at IFSEC International 2017 Experts from across all areas of the industry will attend to share their expertise on critical topics on 20 22 June 2017.

Choose from over 80 hours of seminars to attend across four theatres, the Panasonic Security Management Theatre, TDSI Tavcom Training Theatre, Smart Theatre, Genetec Borders & Infrastructure Theatre.

Time is running out to get involved: Register today to avoid missing out

HID Global expands IoT services for asset management and equipment monitoring

access control HID Global has added item management to its location services and has launched new condition monitoring services that analyse equipment performance. The new additions extend the company s portfolio of Internet of Things (IoT) offerings for organisations. HID location services for item management monitor the location and movement of assets and equipment across different locations or in a specific area, to help combat asset theft.

The condition monitoring services provide real-time analysis of equipment performance and health. Potential end-users include hospitals, factories and industrial firms. Optimise equipment efficiency Every day, organisations seek to address pressing concerns around the misuse, tampering or theft of assets, as well as unforeseen equipment downtime. HID s latest solutions make it possible to quickly locate items, provide valuable equipment data to optimise equipment efficiency, plus react quickly to critical events or instantly know when equipment fails, says Mark Robinton, director of strategic innovation at HID Global. The HID Location Services capabilities can quickly locate items, ranging from ladders and carts, to emergency hospital equipment. The technology also provides predictive analysis to forecast the future location of an item in environments, such as manufacturing or hospital floors, airports, or shopping centres. In many instances an item s location can impact workforce safety. Facility managers can use geo-fences to easily deploy alerts by establishing policies that monitor incoming vehicles, hazardous materials or dangerous equipment in multiple locations. HID conditioning monitoring services provide predictive analysis for ensuring the optimal performance of vending machines, conveyor belts, heating and cooling systems, medical and other equipment.

The technology can help reduce operations and maintenance costs. Accurate predicted failures of components can allow repairs and replacements to be scheduled in at suitable times, reducing down time. Bluvision, part of HID Global, is supplying the new offerings, which are based on a common platform that leverage Bluetooth Low Energy (BLE) and include HID s Bluzone cloud service, Bluetooth beacons and BluFi gateways. HID Global are exhibiting at IFSEC International, which takes place between 20-22 June 2017, London ExCeL. You can find them on stand E1250. Get your free badge now. Can you afford not to attend? Driven by rising concerns over public and private sector safety, the access control market is set to be worth a substantial $8.6 billion by 2018. Register for IFSEC International 2017 to discover the latest products designed to protect your buildings, your assets, and your people.

Meet with leading access control suppliers, quiz them first hand on their latest products and see new technology in action.

Be part of this growing market register today

Blue light warning: How the false alarm epidemic continues to resist all remedies

More than 50% of the 600,000 callout incidents attended by fire and rescue services annually (FRS) are false alarms, according to the latest statistics from the Fire Service. The cost of this wasted time for both business and the fire service is estimated to be well in excess of 1 billion per year, in part as a result of downtime from groundless evacuations. In the last five years this position has not appreciably changed.

What s more, false fire alarms from automatic alarm systems due to poor maintenance are on the increase. As to the ratio between real fire emergencies and false alarms, regrettably in England a sustained trend for the past five years shows the number of false alarm call outs actually exceeding real primary fire call outs by a significant margin, which is in itself a damningly cautionary finding. In London this ratio is, exceptionally, two to one (and currently reflecting a slight increase in unwanted calls against target aims). These blue light responses, then, to automated unwanted fire alarm signals (UFAS) represent a grave menace, hindering services that could be needed at a genuine emergency or even interrupting critical front-line training for first responders . Beyond such considerations as this needless burden on the FRS authorities, business disruptions that lead to a loss of productivity, the reduced confidence of the general public, and even the environmental impact of inessential emergency appliance movements all need to be taken into account. Hospitals have been identified as responsible for the vast majority of the false alarms that the capital s firefighters are called out to And this persistent malfunctioning of fire alarms is even more glaringly highlighted when you stop to consider the recent deliberations by the UK government on the creation of multi-agency Strategic Command Centres embracing the blue light emergency services Fire, Ambulance and Police. In the view of some analysts, this new configuration of the services is likely to spark debate about multiple call outs and the cost implications of all three services responding to incidents, when so very often a reported event can be a false alert. Tri-Service Control Centres It s a concern foreseen and amplified by the Chief Fire Officers Association, one of whose chief officers comments: Until an event is attended and confirmed as a false alarm it will always be treated as an emergency and responded to by the appropriate service or services. The National Police Chiefs Council also anticipates an enhanced collaborative response arising from the Tri-Service Control Centres: We welcome any opportunity to enable the blue light services to work more effectively together in the public interest . . .

They can concentrate expertise, save money, help deal with crises and share best practice. So, in short, this proposed drive towards a more joined-up response to emergencies intends to coordinate front-line services to yield more efficiencies in time-savings and management of personnel, with joint decision-making aimed to prioritise blue light call outs concentrated on inter-operable control rooms. Yet the question remains, will these new efficiencies be reciprocated by risk management in a renewed commitment to defeat false alarms in their communities by improving the functional integrity of the Automatic Fire Detection and Fire Alarm Systems (AFDS) on which the public rely? Hospitals Since the London Fire Brigade (LFB) introduced its penalty charging scheme for excessive false fire alarm call outs in January 2014, the potential for the LFB to collect millions in penalties from the worst culprits in the capital has remained a possible outcome (at present, for 2017, the scheme is suspended for review). Hospitals have been identified as responsible for the vast majority of the false alarms that the capital s firefighters are called out to. The LFB s figures from before the scheme s inception show that firefighters were called out, overall, to over 400 locations annually (each more than ten times) in response to false fire alarms, costing the brigade about 800,000. This frequency equates to a false alarm every 15 minutes in London. Overall, false alarms from automatic systems still account for around 40,000 call outs for the LFB every year, set against call outs of around half that number to real fires. The very latest LFB figures for cost recovery for non domestic premises generating 10 or more calls a year, continue to record a potential recovery value on average of approaching 500,000 in charges every 12 months.

Crying Wolf Unwanted Fire Signals that cry wolf in this manner place a vast burden on Fire and Rescue Services by unnecessarily tying up fire engines and firefighters on needless call-outs, when they may be needed at a genuine emergency. Sophisticated predictive technology reduces the problem by resolving potential problems before they arise That is why the pressure on risk management and, more particularly, Responsible Persons to cut the risks of false alarms is intensifying. What s more, by tolerating a norm of frequent needless fire alarm annunciations, negligent premises management can create a dangerous mood of apathy among staff that could very easily lead to widespread irresponsiveness should a real fire break out. Intelligence convergence for remote troubleshooting For responsible risk management, current best practice conditioned by ecological concerns seeks to reduce the impact on the environment that potentially arises from the life cycle of a fire system. Today, fire prevention is an essential element of Building Management Systems (BMSs) integrated with an IT infrastructure purposed to fully exploit Intelligence Convergence, allowing direct integration into intelligent buildings via any device capable of establishing an internet connection, granting risk management instant access to review the system, including the status of fire detection devices in real time. Current solutions encompass smart security systems such as access control/ID systems, video surveillance/analytics, intrusion detection, and life safety . . . all extending the capability for remote diagnostics that confer the ecological benefits of increased efficiency yielded by fault-free systems. For example: servicing, maintenance and false call outs all contribute to increased CO2 levels in the atmosphere leading to changes in global environmental conditions. These hazards can be significantly reduced by the use of sophisticated predictive technology, reducing the need to travel by allowing potential problems to be resolved before they arise.

Predictive technology can include the management of fire and security servicing inspection routines, false fire alarm interrogation and diagnosis, or the scheduling of system maintenance call-outs. At the same time, these examples of Intelligence Convergence can benefit users with the capability to support a full audit trail for traceability and regulatory compliance.

10 practical steps towards combating the false alarms menace As the latest statistics suggest, a number of remedies to stimulate behavioural change can be derived from analysis of common shortcomings at malfunctioning sites: Enhanced maintenance routines are evidently a priority, and certainly they re a key requirement embedded in any regular review a fire risk assessment in compliance with the Fire Safety Order Troubleshooting for predictive maintenance is facilitated by comprehensively monitored configurable Automatic Fire Alarm systems to ensure integrity of alarm device functionality, supported by EN 54-2 approved Analogue Addressable panels. Specification of sensing devices that further reduce susceptibility to false alarms by their embedded intelligence to discriminate between spurious fire events and genuine ones. Multisensors are the considered choice when replacing problem detectors; or the changing of devices from smoke to heat in certain locations when necessary. Specification of high-integrity fire data communications via accessible configurable networks whose performance to minimise false activations is defined by the highest reliability in resistance to outside interference. Constant reviews should be maintained as to change of use within premises because such changes can affect the sensitivity of detectors, requiring appointed fire alarm maintenance personnel to update/upgrade the system. Improved training of responsible risk management. Advise users of fire detection systems that these lifelines are connected to an ARC (Alarm Receiving Centre) and emphasise the gravity of an UFAS (automated unwanted fire alarm signal) resulting in a costly call out, endangering genuine call outs. More rigorous supervision of negligent testing of the system where the routine to take it off-line is persistently disregarded thus triggering a UFAS at the ARC.

Incorrect positioning of sensing/detecting devices contrary to specification s installation data. Unregulated misuse of premises: toasters, cigarette smoking, steam from kettle in office, even aerosol sprays (used by cleaning staff) near smoke detectors can cause false alarms. Arising from recommendations that both BS 5839-1:2013 and BS 9999:2017 lay emphasis on, accurate up-to-date Zone Plans for rapid orientation for building occupants and the emergency services alike are cited as key aids. Such plans should be adjacent to the control & indicating equipment and, as may be imagined, their prominent depiction of fire alarm zones that accurately match the physical layout within the building hasten the identification of the location of alarms in an emergency, whether real or false. Visit FIREX International for cutting-edge solutions, essential knowledge and the ability to grow your business by getting direct access to the whole fire safety industry. It is the perfect place to get your product in front of thousands of buyers, across a multitude of featured areas. From the brand new Drone Zone, the ARC Village, ASFP Passive Protection Zone, the Engineers of Tomorrow competition and more, it s all under one roof so you ll never miss a beat.

Click here to register your place now to join us at London Excel on 20 22 June

Hanwha Techwin targets AI innovation through global partnership with GPU pioneer NVIDIA

Security news The security business division of Hanwha Techwin has entered into a global partnership with Nvidia, an artificial intelligence (AI) developer, to commercialise intelligent video analysis products. US-based Nvidia develops and makes graphic processing units (GPUs), chips that are used in gaming and 3D applications due to their ability to manipulate and alter memory to create images rapidly. In 1999 the company marketed the GeForce 256 as the world s first GPU .

Applications Nvidia has developed its GPUs for include computers, healthcare technology, robots and self-driving cars. Through the global partnership, Hanwha Techwin and Nvidia will collaborate on an intelligent video analysis platform which the AI firm is developing. Nvidia s video analysis platform will be used with security devices, such as cameras and storage media. The technology enables fast and accurate video analysis data. Customers benefit from better quality information, with which to base insights and actions upon, than simple video data is able to provide. Hanwha Techwin will focus on developing AI cameras and storage devices that can autonomously detect abnormal movements and situations by using Nvidia s AI video analysis platform. The platform can also be applied to various security-based services from Hanwha Techwin, including city surveillance, retail security and traffic, potentially leading to the integration of AI-based solutions. Hanwha Techwin plans to evolve into a security specialist with hardware and software capabilities, alongside future-oriented technologies and competitive AI. Hanwha Techwin recently announced dates for its UK Wisenet roadshow.

Check out security solutions from Hanwha Techwin at IFSEC International, 20-22 June 2017, London ExCeL. You can find Hanwha Techwin on stand G800. Get your free badge now. Visit Europe s leading security event in June 2017 Be the first to see the very latest in security tech for 17/18 at IFSEC International, where around 600 manufacturers will be attending, including this year s new additions to the show; OSI Electronics, Redvision, L3, ABLOY, Cisco and Meraki to name just a few. Not only that, in a constant strive to offer our visitors the best ROI possible, IFSEC this year is launching a brand new discounts programme. We are able to offer discounts averaging 20% across a large range of products at the show. Click here to register your place now to join us at London Excel on 20 22 June 2017.

The Association of British Investigators

I am looking for an
overseas investigator who specialises in:

Select Service

in Select Country

Security Training in Spalding

Security Training Spalding

Are you looking for specialists in Security Training in the Spalding area? STM provide professional, trained and SIA licensed personnel throughout the UK. All our staff hold an SIA license, even those not performing a licensable function, this provides our customers with additional confidence and reassurance that our staff are subject to all relevant checks associated with the security industry. If you need experts in Security Training within the Spalding area, then call us today.

Security Professionals

Staff are fully uniformed with the appropriate attire for each task and selected for specific roles dependent upon their training, experience and availability. Our staff are experts when it comes to Security Training, so feel free to contact us today if you live in the Spalding area.We have found that our clients have an increasing need for staff to support their own workforce and we do this by assisting existing teams by covering sickness, vacant positions and any last minute requests.

Contact Us

Get in touch today if you need professionals who know about Security Training in the Spalding area, we will be more than happy to discuss your requirements.

Security Training Courses in New-buckenham

Security Training Courses New Buckenham

Are you looking for specialists in Security Training Courses in the New Buckenham area? STM provide professional, trained and SIA licensed personnel throughout the UK. All our staff hold an SIA license, even those not performing a licensable function, this provides our customers with additional confidence and reassurance that our staff are subject to all relevant checks associated with the security industry. If you need experts in Security Training Courses within the New Buckenham area, then call us today.

Security Professionals

Staff are fully uniformed with the appropriate attire for each task and selected for specific roles dependent upon their training, experience and availability. Our staff are experts when it comes to Security Training Courses, so feel free to contact us today if you live in the New Buckenham area.We have found that our clients have an increasing need for staff to support their own workforce and we do this by assisting existing teams by covering sickness, vacant positions and any last minute requests.

Contact Us

Get in touch today if you need professionals who know about Security Training Courses in the New Buckenham area, we will be more than happy to discuss your requirements.

Applying deep learning to cyber security: Q&A with Deep Instinct CEO Guy Caspi

Applying Deep Learning To Cyber Security: Q&A With Deep Instinct CEO Guy Caspi

Deep Instinct is the first company to apply deep learning to cyber security. Guy Caspi, the Israel-founded company s CEO, spoke to SecuritySolutionsWatch.com about the complexities of deep learning and how Deep Instinct spotted a gap in the ballooning market for combating cyber security threats. This interview was originally published on SecuritySolutionsWatch.com.

SecuritySolutionsWatch.com: Before discussing today s cyber security threat environment and Deep Instinct solutions in greater detail, please tell us about your background and company history? Guy Caspi: I ve utilised my advanced degrees in Mathematics, Machine Learning and Business to apply mathematics and machine learning in a technology elite unit of the Israel Defense Forces (IDF), as well as in financial institutions and intelligence organizations around the world. Over the past two decades, I ve led some of the largest government cyber and big data projects in Israel and other countries. Founded in 2014, and out of stealth mode since November 2015, Deep Instinct is the first company to apply deep learning to cyber security. With offices in Tel Aviv, Israel and in North America, we now have 65 employees. Our company has a winning combination of people who have the academic knowledge and credentials, paired with unique experiences in cyber security gained through years in the intelligence and elite units that focused on cyber- attacks. We adopt the mindset of hackers in order to be prepared for all vulnerabilities. In addition, Deep Instinct s dedicated deep learning research group is headed by one of the leading researchers in the field of computational intelligence. Moreover, the company has a highly-experienced management team that leverages its cyber security and academic backgrounds to carry out a successful product that offers an effective solution to address a critical need in the industry.

SecuritySolutionsWatch.com: Your site claims that Deep Instinct is The first company to apply deep learning to cyber security . Please give us an overview of how Deep Instinct works. GC: Deep Instinct s core technology is deep learning, which is an advanced branch of artificial intelligence (AI). Deep learning is inspired by the brain s ability to learn: once a brain learns to identify an object, its identification becomes second nature. Similarly, as Deep Instinct s artificial brain learns to detect any type of cyber threat, its prediction capabilities become instinctive. Deep learning has exhibited groundbreaking results when applied to computer vision, speech, and text understanding and we are the first company to apply it to the cyber security domain. In cyber security, there a big need for solutions that can protect against brand new (zero-day) threats in real-time a critical issue that causes great vulnerabilities to almost every business. Deep learning is complex and its application has a very high barrier entry because the neural networks are comprised of tens of hundreds of layers and the mathematics required to create such layers is extremely difficult. Even once this hurdle is passed, the implementation of running massive data sets using GPUs (Graphic User Interface) is not an easy feat.

Moreover, creating a deep learning-based technology that can run as an on-device client requires great expertise that raises the bar even higher. The few companies that have demonstrated these capabilities have mostly been acquired by giants, such as Google, Facebook and Salesforce. Furthermore, Deep Instinct does not use open source deep learning libraries but instead, has created its own. SecuritySolutionsWatch.com: What are the major benefits with respect to detection, prevention, accuracy, ease of deployment and other features. Guy Caspi: Deep Instinct offers a unique solution of prevention, which includes blocking malware before it is activated and can cause harm. Many new solutions on the market can only offer detection and prevention once the business has been infected, but we can detect and prevent before any damage occurs. By way of analogy, if a business were a person and the malicious attack were poison, other cyber security vendors need the person to first touch the poisonous object to then they can act and prevent the poison from spreading throughout the body. From Deep Instinct s perspective, we can tell the person not to touch the poisonous object in the first place because we immediately identified it as harmful. Moreover, Deep Instinct focuses on unknown threats and APT (Advanced Persistent Threat) attacks whether they are in a file-less manner or already existing in the system.

Instead of waiting for the next unexpected attack, the next unknown attack is identified and blocked in real-time before any harm can occur. The ability to offer immediate prevention extends beyond a network or Internet connection by covering the device even when it is not connected to them. Furthermore, our detection rates are substantially higher that existing solutions on the market. This unprecedented accuracy in predicting unknown cyber threats is enabled by the application of proprietary deep learning algorithms. Deep learning s capabilities of identifying malware from any data source results in comprehensive protection on any device, platform, and operating system, filling in gaps by providing complete solutions. Finally, deployment is fast and seamless and the solution s operations do not affect the user experience. Click here to read the full interview on SecuritySolutionsWatch.com Download: The Video Surveillance Report 2016 This exclusive report covers the security needs of surveillance systems as shaped by the physical environment including: What do security professionals think about plug-and-play systems Challenges like low-light conditions or large spaces and the threats posed in various sectors Which cutting-edge features such as mobile access, PTZ smart controls or 4K resolution are most important to security professionals What are the most important factors driving upgrades and would end users consider an upgrade to HD analogue Download the full report here.

CES 2017 sneak peak: the light bulb with a hidden security camera

CES 2017 Sneak Peak: The Light Bulb With A Hidden Security Camera

Light bulb maker Bell & Wyson is set to unveil a light bulb with a concealed camera embedded at CES 2017. The low energy (11W) LED bulb-cum-camera has a TF slot and two-way microphone and will stream footage to tablets and smartphones via Wi-Fi. The idea behind the innovation is that intruders, unaware of the light bulb s dual purpose, will neither seek to evade it gaze nor tear it from the wall/ceiling.

And of course, like traditional security lights, it could deter breaking and entering as it gives the impression that someone is home. Although this means an intruder can also easily turn it off though of course he probably won t even realise it s a camera anyway the device streaming app that accompanies the light bulb notifies a user every time the bulb is switched off and will record footage of the intruder beforehand and send the image to the owner. The camera can be managed remotely via a free iOS/Android app, which alerts the homeowner when movement is detected. Footage can be recorded on a Micro SD card (optional) all events. The bulb has a brightness output of 600 lm, equivalent of 60W. Lighting cycles are programmable. Stephane Burlon, a director at the France-based company, spoke to BBC News in advance of CES 2017 about the product.

Quizzed about whether such products would make homeowners uneasy about being under the gaze of a camera, he pointed out that when you switch the light bulb off, you switch the camera off too, so it s always clear when the camera is on or off.

embedded content Download: The Video Surveillance Report 2016 This exclusive report covers the security needs of surveillance systems as shaped by the physical environment including: What do security professionals think about plug-and-play systems Challenges like low-light conditions or large spaces and the threats posed in various sectors Which cutting-edge features such as mobile access, PTZ smart controls or 4K resolution are most important to security professionals What are the most important factors driving upgrades and would end users consider an upgrade to HD analogue Download the full report here.

Sony launches eight high sensitivity network cameras with Exmor R CMOS sensors

Sony Launches Eight High Sensitivity Network Cameras With Exmor R CMOS Sensors

Sony has unveiled eight new cameras with minimum illumination of 0.006 lux and Exmor R CMOS sensors. The sixth generation (G6) range of network cameras comprises eight full-HD models, with four apiece in the V-Series (SNC-VB640, SNC-VB642D, SNC-VM641, SNC-VM642R) and E-Series (SNC-EB640, SNC-EB642R, SNC-EM641, SNC-EM642R). Sony E-Series network camera, SNC-EB640 Sectors/verticals Pitched as achieving high quality images in extremely low light conditions, Sony says the new cameras are ideal for a wide range of demanding applications, including city, transport and commercial surveillance .

Sony V-Series network camera, SNC-VM641 Features 1080p/60 fps Exmor R CMOS sensor boosts low light sensitivity and extends coverage eXcellent Dynamic Noise Reduction (XDNR ) reduces noise and eliminate ghosts from images Minimum illumination of 0.006 lux (30IRE) and 0.01 lux (50IRE) (both with camera setting at F1.2, View-DR Off, VE Off, AGC On, 1/30 s, 30 fps) Sony says colour integrity of images is maintained even in poorly lit conditions Capture objects in dark conditions from a distance of up to 100m with the V-series, and up to 60m with the E-series. Integrated IR illuminator and Exmor R CMOS sensor means cameras can capture high-quality IR images without overexposure, says Sony SD card slot added to E-series a popular backup option during network outage E-Series now supports 2-way audio features , providing users with remote intercom and audio recording functionality wherever it is needed, in one cost-effective solution. V-Series has AC24V/DC12V and Sensor Input/Output Sony V-Series network camera, SNC-VM642 What Sony says about the new V-Series and E-Series network cameras High-quality imagery is at the heart of our business, which is why we continue to invest in new technologies to bring our customers the best possible images they re trying to capture, says Roger Lawrence, video security product manager at Sony Professional Solutions Europe. Investing in these technologies is all about meeting the changing needs of our customers, which is why these new solutions have been designed with features that help users improve accuracy and make quicker decisions, from improved visibility in low light to increased range. when are they available? Scheduled from March 2017 onwards. Download: The Video Surveillance Report 2016 This exclusive report covers the security needs of surveillance systems as shaped by the physical environment including: What do security professionals think about plug-and-play systems Challenges like low-light conditions or large spaces and the threats posed in various sectors Which cutting-edge features such as mobile access, PTZ smart controls or 4K resolution are most important to security professionals What are the most important factors driving upgrades and would end users consider an upgrade to HD analogue Download the full report here.