Perimeter Detection

FTL Secure Solutions are specialists in the design, installation, commissioning, maintenance and integration of perimeter detection systems. We have experience in a broad range of small to enterprise level perimeter detection systems and are partnered with GM Security. The V-Alert intrusion detection system is a simple, easy-to-use perimeter alert and warning system that has an international pedigree in civilian and military applications.

Perimeter Detection Systems

These systems are ideal for large campuses and businesses with an open, difficult to manage, perimeter. FTL Secure Solutions are partnered with GM Security, enabling us to offer cutting edge perimeter detection systems for civilian and military.

What are the benefits?

  • Reduced security expenditure: A well-designed perimeter detection system can reduce the requirement for other security. This is particularly relevant when looking to secure air/ports, where the costs of installing networked CCTV in remote locations becomes prohibitive.
  • Integration with existing security: Perimeter detection systems can become an extension of your alarms and work with your existing CCTV infrastructure. This can give you a full alert and detection platform that extends to the remotest point of your site.
  • Accurate alarm alerting: Each sensor along a perimeter becomes a zone in its own right. In the event of an alarm, the system will alert you to a breach that is accurate to 3 metres.

Tell me more:

As an NSI Gold security installer and maintenance provider you can be assured that all installations are carried out to a very high standard. Our system aftercare and maintenance services also ensure you get the most from your security systems.

We can offer you a maintenance contract to suit your needs. This could be in the form of a simple two pro-active visits per annum agreement to keep everything in working order, or even an all-inclusive reactive and proactive maintenance lump sum contract, making sure your costs are fixed for the year.

All FTL Secure Solutions maintenance contracts include agreed levels of support, as well as agreed response times in terms of both remote and on-site support.

To find out more about the benefits of an effective automated entry system, or to book a free security risk assessment or security survey then pleased contact 01344 752 222 today.

FTL exhibiting at Transport Security Expo 2014

FTL Secure Solutions will be exhibiting alongside our parent company Fibre Technologies Ltd, a leading provider of fibre optic transmission and networking hardware.

Why Transport Security Expo?

Transport Security Expo is one of the leading events for security manufacturers, system integrators and distributors with solutions aimed towards the maritime, aviation, rail and commercial transportation markets. FTL Secure Solutions and FTL Networking Solutions will be exhibiting a number of exciting security solutions designed specifically for transport security.

These include a number of high-end biometric security systems include CPNI iris recognition and intuitive facial recogniton, as well as premium-end perimeter protection devices. All of the security solutions we will be demonstrating have been integrated into our new demonstration boards that we are looking forward to showing off!

 

Where can I find you?

We will be located at stand B46 and will be happy to take the time to discuss your security requirements with you, so feel free to drop by and take a look at what’s new.

Whilst we are demonstrating a select few of our wide portfolio of security systems, we can’t take everything! FTL Secure Solutions have a number of biometric security systems, IP CCTV and Access Control systems designed specifically for high security environments.

 

Access Control Entry Readers

Would you like to increase the security of your business premises? If so, then we can help you here at FTL Secure Solutions with the range of access control entry readers we have available. The entry readers we install allow only people with access to your building to enter. Therefore, you have the peace of mind knowing that only people that should there will have access to your premises.

We are pleased to say that along with increasing the security of your premises, the access control entry readers also provide a range of other benefits for your business. These include being able to integrate with time and attendance systems so you can easily check on the attendance and punctuality for all of your employees. They also enhance operational and safety procedures by managing traffic flow into the building and recording the movement of staff and customers.

Our team are able to come to your premises and install your access control entry systems quickly and provide full instructions on operational use, so you get the most out of your new system. If you would like a quote today, then you can contact us on 01344 752 222. We look forward to hearing from you.

iEVO Biometric Fingerprint Readers now fully customised

iEVO; FTL Secure Solutions’ CPNI rated biometric fingerprint security partner has launched a fully customised range of readers. This means there are now a whole host of complimentary additions, improving the already market leading iEVO Ultimate and iEVO Micro readers.

What does this mean?

It means the sky is the limit when it comes to bespoke biometric access control and time & attendance systems. Whereas the previous readers came as a standard unit, we are now able to customise your biometric system to better meet your requirements. For example, expanding the system capacity from the previous 10,000 cap is now a matter of a simple alteration, increasing capacity to 50,000. On sites where it is difficult to get power, there is now a Power over Ethernet (PoE) option to allow power and data to run on the same cable. This makes installation simpler and more cost-effective. Where running data cables is difficult, a new Wifi / bluetooth module allows for data transfer outside of the LAN. 

Do these additions work?

Yes! FTL Secure Solutions has been busy installing iEVO CPNI rated biometric readers on a number of our clients sites. Whilst it was already an excellent addition to access control systems or time & attendance systems, these new additions have taken it to a level beyond most existing fingerprint readers. The modular build readers can now adapt to most site conditions making it the perfect system to install. As the only CPNI (Centre for the Protection of National Infrastructure) approved fingerprint biometric system currently available, it is the only system currently approved for use in critical infrastructure. So if you are a school, data centre, a factory or a business looking to improve your security or operations, you can be assured you are getting the most reliable fingerprint biometric system available today.

iEVO customisable biometric reader

FTL Secure Solutions expands engineering team

FTL Secure Solutions is proud to welcome Stuart as the newest arrival to the engineering team.

Stuart has built up a wealth of practical access control, intruder alarm and CCTV knowledge and is looking forward to putting this to use at FTLSS.

His project experience includes Government buildings, Councils, MOD, Nuclear, Education and Transport. Within this, he has worked with some of the most advanced security systems available to date. Therse include the Borer IP POE access control system and a number of market leading IP CCTV systems.

Stuart explains, ‘I joined FTL Secure Solutions as they are a growing company with a strong reputation in the industry. I am looking forward to putting my experience to good use within the engineering team, and also benefitting from the experience of the existing engineers at FTL.’

When not at work, Stuart can be found playing football and going to watch Man Utd.

CCTV – Vicon & IQinVision merge

Who are IQinVision?

Vicon, a longstanding CCTV and VMS partner of FTL Secure Solutions recently completed an anticipated merger with IQinVision. This is very exciting news for FTL Secure Solutions as it gives us access to an extensive range of HD and IP CCTV solutions, alongside our current hardware range.

But who are they? IQinVision has been designing, manufacturing, and marketing the IQeye line of HD megapixel IP cameras since 1998. A world leader in IP network camera products, IQinVision is renowned for image quality, stability, and reliability in the harshest environments. ONVIF and PSIA compliant, IQeye cameras are integrated with all leading Network Video Recorders (NVRs), and are backed by the most comprehensive warranty program in the industry. The company’s products are widely deployed in banking, city surveillance, commercial/industrial, critical infrastructure, education, gaming, government/law enforcement, healthcare, retail, and transportation applications. 

What impact will this have?

It’s certainly an exciting development. Whilst FTL Secure Solutions take a consultative approach to CCTV design, we recognise the benefits to us and to our customers of having direct relationship with leading CCTV companies. The IQinVision range adds a host of complementary CCTV solutions to the existing vicon ViconNet platform. This means we now have access to a more diverse range of high definition CCTV cameras with direct integration onto Vicon’s Video Management System.

The future of high definition CCTV

IQinVision offer some of the most advanced CCTV solutions currently available on the market. One of the standout solutions is the 4K Sentinel HD IP camera. With a built-in dual core processor, local analytics, adanced low-light technology and resolution from 12MP to 4K, this is an impressive new breed of camera. Whilst specialist cameras such as the 4K Sentinel are generally priced at a premium, the picture quality is so advanced that they can often replace 3 or 4 legacy analogue cameras, reducing the overall cost.

 

Hikvision Launches 4G Solar Kit for Remote Security

Hikvision has launched a new 4G Solar Panel Kit for Standalone Security Sites in the UK & Ireland. This will revolutionise the protection of remote assets in hard to reach places by proving a security camera that runs on solar panel.

 

The kit includes a 4G camera, a solar panel, a battery, and a bracket, and can provide one-stop monitoring in remote environments. This means providers can deliver connected security to scenarios such as argiculture, animal and forest observation, as well as temporary monitoring of construction sites.

 

More information on Hikvision’s new 4G Solar Kit for Remote Security can be found over on their website and in their upcoming webinar taking place on January 12th at 2pm.

 

Register for free today

 

 

Being Mobile with your Security and Access Control

Mobile devices – we all have them! I bet most people reading this will have a smartphone that rarely leaves their side. Be it checking your social media and emails, shopping/banking online or text messaging your family and friends (and possibly even, heaven forbid, actually making a phone call!) that device is akin to your keys and wallet when it comes to essential daily items.

But what if your mobile device could become your definitive personal item? The likes of Apple Pay, Android Pay and PayPal are rapidly turning your mobile phone into a credible replacement for your wallet, but how about if it could reduce the numbers of keys you had to carry too? With access control and automated security, this is rapidly becoming a credible option!

Mobile Authentication

There is a lot of momentum in the Access Control market at the moment towards using mobiles devices for authentication, as opposed to cards or tokens. This idea started to become popular some three or four years ago and has grown with the proliferation of NFC (Near Field Communications) technology in mobile phones and smart devices.

Interestingly, the choice by Apple to restrict the use of NFC to Apple Pay on its devices has had a profound effect on the implementation of NFC in other applications too. Whilst it’s fair to say that not everyone has an iPhone, it is an important segment of the market and means that other manufacturers are wary of how customers will be able to use any new technology.

Consequently, there has been a much bigger focus on using Bluetooth Low Energy technology on mobile devices instead. Security providers such as HID Global, STid in France and Nedap in the Netherlands have concentrated on developing Bluetooth Low Energy readers and mobile credential applications.

Enabling Mobile Credentials

Not only do you need a reader that will successfully work with a mobile device, you also need to be sure you are securely delivering the credentials to that phone. This needs to be easily actioned, whilst ensuring it isn’t intercepted, stolen or appropriated fraudulently. On top of this, you need to ensure that the communications between the reader and the mobile device are encrypted too.

This has been where much of the development focus has been over the last two/three years, putting these cloud-based credential delivery vehicles together – then, marrying them with the reader technology.

Future Options

The pace of development doesn’t stop there! There are efforts underway to produce security reader technology which can read QR codes as well.

This will add another choice to NFC and Bluetooth Low Energy options – giving greater scope to pick a technology that suits the application, users and security operator best.

Empowering People and Businesses

Many organisations have been embracing the idea of individuals using their own devices for a number of years now (Bring Your Own Device – BYOD) – something which got a lot of press in recent years, but now seems commonplace to many of us.

Laptops, tablets, mobile phones – these are all devices that people will happily use in the workplace, whether they belong to the business or the individual. This expectation has shaped the way we all view technology and the way we interact with it.

Using your mobile device as a security credential is an obvious extension of these expectations. It seems that further evolution of this approach is inevitable and is likely to become even more prevalent in the future.

Convenience and Security

The crucial consideration is finding a balance between conveniences for the user and maintaining stringent levels of security. If you can ensure mobile devices have the necessary checks and balances in place, they become a very logical and highly suitable way of identifying authorised individuals.

With the rapid evolution of technology and society’s attitudes towards it, all the signs are that using your mobile device for security will seem just as natural in the future as using a card or token is today!

 

UK to launch security standard for surveillance cameras

The UK is launching the world’s first voluntary cyber security standard and compliance certification mark for the manufacturers of surveillance cameras

Warwick Ashford   Security Editor

The UK Surveillance Camera Commissioner (SCC) is launching a voluntary set of minimum requirements to ensure that surveillance cameras and components are manufactured in a way that is secure by design and secure by default.

Secure by default and design is a key element of UK government policy on technological innovation. In January 2019, the government announced a £70m investment in making the UK a world leader in eliminating cyber threats to businesses and consumers by developing more resilient IT hardware, with security and protection designed directly into the hardware and chips.

Several of the biggest and best-known brands in the surveillance industry have collaborated with a team appointed by surveillance camera commissioner Tony Porter to draw up a baseline standard for manufacturers.

The result is a standard that has been written by manufacturers for manufacturers. It includes requirements such as ensuring that passwords have to be changed from the manufacturer default at start-up, that the chosen passwords should be of sufficient complexity to provide a degree of assurance, and placing controls around how and when remote access should be provisioned.

The official launch of the standard at the IFSEC International Conference in London on 20 June coincides with the world’s first Surveillance Camera Day, which aims to raise awareness about surveillance cameras and generate a debate about how they are used.

Surveillance Camera Day is an initiative by the SCC and the Centre for Research into Information, Surveillance and Privacy (Crisp), and forms part of the UK’s National Surveillance Camera Strategy.

The surveillance camera commissioner said in a statement: “It has been an enlightening and positive experience working with manufacturers toward a common goal. It’s a genuine first and further standards will follow over the next couple of years.”

Cyber attack resilience built-in

The voluntary standard comes in the wake of several high-profile compromises of systems showed that CCTV systems were being left live and internet-facing due to poor security configurations.

Some of these incidents, like the distributed denial of service attacks enabled by the Mirai botnet that brought down social media and financial websites around the world in October 2016, also showed that the root cause was poor design and manufacturing standards. “Encouraging manufacturers to ensure they ship their devices in a secure state is the key objective of these minimum requirements for manufacturers” Mike Gillespie, Advent IM

In an effort to ensure the UK’s resilience to attacks that exploit vulnerabilities in network-connected cameras, the SCC said the minimum requirements were an important step forward for manufacturers, installers and users alike. 

The work has been led by Mike Gillespie, cyber security advisor to the SCC and managing director of information security and physical security consultancy Advent IM, along with Buzz Coates, business development manager at CCTV distributor Norbain.

The standard was developed in consultation with surveillance camera manufacturers Axis, Bosch, Hanwah, Hikvision and Milestone Systems.

Speaking ahead of the official launch, Gillespie said that if a device came out of the box in a secure configuration, there was a good chance it would be installed in a secure configuration.

“Encouraging manufacturers to ensure they ship their devices in this secure state is the key objective of these minimum requirements for manufacturers,” he said.

Manufacturers benefit, said Gillespie, by being able to demonstrate that they take cyber seriously and that their equipment is designed and built to be resilient.

“Installers and integrators benefit from the introduction of the requirements by not having to know how to turn dangerous ports or protocols off during the installation, and users benefit because they know they are buying equipment that has been designed to be resilient to cyber attack and data theft,” he said.

Manufacturers can demonstrate that they meet the minimum requirements by completing a self-certification form and submitting it to the SCC for validation. If successful, they will be able to list the component or system as certified by the SCC and will be able to display the SCC’s certification mark.