Integrated Systems

IT’s role in securing publicly accessible locations

by Mark Rowe

At the Swiss technology company Morphean, CEO Rodrigue Zbinden, pictured, looks at the need to improve security at physical events and explains the role of IT to bring hosted technology to the fore.

As successful vaccination programmes signal increasing freedoms across Europe, sports and music events, clubs, coffee shops, bars and other publicly accessible locations continue to welcome patrons back. Yet, while Covid remains a challenge, it is the potential for terrorist activity that makes it increasingly necessary for event organisers to take a firmer stand in relation to the physical security of their sites. In May 2017, a terrorist detonated a bomb as people were leaving the Manchester Arena following a concert, killing 23 and injuring hundreds, while in February 2020, 11 people were killed and five others wounded in a terrorist shooting which targeted two bars in Hanau, Germany. Now, as increasing public gatherings present a prime opportunity for terrorist attacks, such sites need to be thoroughly protected.

Where CCTV would traditionally have played a role in protecting premises, assets and people, this dated analogue technology is no longer fit for purpose in the modern fight against criminal and terrorist activity. Far removed from standalone legacy cameras and manually-operated access control barriers, cloud-enabled solutions, including network video cameras and access control devices, utilise IoT connectivity to provide comprehensive cover of any site. Such technology, capable of advanced levels of analysis and detection can play a key role in saving time and lives.

The future is in the cloud

Video surveillance as-a-service (VSaaS) and access control as-a-service (ACaaS) enable cameras and sensors to be added to a network as IoT devices, bringing them to life as a vital component in an event security strategy. The data from these devices is passed through an analytics engine, where key insights are produced. Behavioural analytics can support teams in the detection of anomalous activity, including the leaving of bags or objects on site. Instant alerts can be delivered to security personnel via mobile device, resulting in immediate response and enabling preventative measures to be taken sooner. The security system can also trigger site evacuation procedures in response to a threat, whereby building management systems can lock down certain areas while using directional lighting and announcements via network audio speakers to guide event attendees to the safest exit.

A range of sensors can be employed for advanced explosion, breaking glass or gunshot detection, while access control devices ensure that only authorised attendees, operations staff and security personnel are admitted on-site. The addition of number plate recognition analytics can identify suspicious vehicle patterns, revealing those that have had their number plates changed, or have been detected near the site on numerous occasions in the run-up to an event. The system facilitates the swift packaging of video evidence from across the site, which can be sent to an alarm receiving centre (ARC), security personnel and the police within minutes. Thinking and acting quickly, and utilising technology to analyse data, provide vital insights and automate response sequences will dramatically accelerate security teams’ ability to get an incident under control and save many lives.

Converging security

A key challenge to enable VCaaS and ACaaS to become an effective part of event security will be to close the gap between the worlds of IT security and physical security. IT teams are well versed in the security of software and systems, but need to have an extensive knowledge around the use of physical security technology to make more informed decisions on selection and installation. Similarly, the traditional security installer, well versed in all aspects of physical security will need to better understand the language of IT.

The divide between IT and physical security can create barriers that threaten to slow or stop the adoption of these technologies, depriving businesses of their many benefits. Cloud infrastructure, the IoT and network connectivity are all key components of hosted physical security. It is therefore essential that the physical security installer and IT professional increasingly combine knowledge and resources, to present an overarching security system that is capable of covering high levels of physical security while also keeping in mind the cyber security of systems and networks too.

It is imperative that everyone involved with a site knows their responsibilities in guarding against a potential attack, with thorough training being essential to help staff know how to spot the warning signs. Security and operations teams, backed by VSaaS and ACaaS can feel confident that they have a highly responsive data-driven system in place that will allow them to save crucial seconds in dealing with any incident or threat. Through coming together as part of a joined-up effort, IT and physical security professionals can play a major role in securing events big or small and ensuring a safer and more enjoyable experience for all.

Visit https://morphean.com/.

Related News

  • Integrated Systems

    Migrate to Integriti

    by Mark Rowe

    The access control system manufacturer, Inner Range, has announced customers with Concept systems should migrate to Integriti as Concept nears its ‘end…

  • Integrated Systems

    Infrared hearing range

    by Mark Rowe

    Listentech’s ListenIR range of infrared (IR) hearing products is now available from SigNET. They are aimed at classrooms, performing arts studios, courtrooms,…

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing