29 June 2021

IDIS

IDIS and Inner Range Tech partnership

Demand for more powerful, flexible but simple integrated security and site management solutions – in applications including datacenters, healthcare, banking, and critical infrastructure – is being met by a new technology tie-up between Korea’s IDIS and Australian-headquartered, Inner Range. The collaboration brings together IDIS’s end-to-end video offering with Inner Range’s enterprise-level access control and intruder detection system Integriti, giving end-users everything they need for more efficient and productive control of their security, safety, and building systems from a single management platform. IDIS technology is easy to install with Integriti, with a simple three-step process, and is already proving its value with small to enterprise-level projects in key regional markets. The partnership will support continued growth in Asia and Australasia where IDIS has strategic partnerships with some of the most respected distribution partners, including Hills Limited in Australia, while major US and European applications are also now confirmed or in prospect say the two companies. Examples include a global data and asset storage provider which has just completed a significant upgrade. Projects in retail, commercial office space, and local government are also underway. Inner Range’s Integriti access control and integrated management platform works seamlessly with the IDIS’s DirectIP range of NVRs and cameras giving them additional control and management via the totally cost and license-free video management software (VMS), IDIS Center. The comprehensive choice of door controllers, readers and keypads from Inner Range can be extended with a range of third-party readers including Mifare, HID, biometrics and mobile credential support from multiple vendors. Linking access and alarm devices with IDIS’s award-winning video tech including deep learning analytics allows granular monitoring and recording of activity across single and multiple sites – for example door entry, forced-door, and a range of alarm trigger events – and provides instant visual verification of threats and faster incident response, together with comprehensive audit trails and reporting for both incident investigations and improved site management. Together, the Inner Range’s intelligent access control and security management system and IDIS end-to-end video solutions can be used as the foundation platform for fully integrated solutions that incorporate everything from security, life safety, and building management systems to visitor management and site-specific systems and devices. This integrated approach helps customers mitigate current risks, while ensuring a futureproof platform that will provide them with the scalability and flexibility to adapt as they face future operational challenges and an ever-evolving threat landscape. “Our modular, out-of-the-box approach integrates simply and effectively with Inner Range’s Integriti system offering customers integrated security management in a more affordable way. Our partnership ensures a lower total cost of ownership (TCO), combined with assured local support, extended equipment warranties, and easier maintenance,” says Dennis Choi, General Manager, IDIS Middle East & Africa. “Our new seamless integration with IDIS is a simple three-step process, allowing security managers and integrators to quickly and efficiently associate cameras with any entity on the Integriti system and plot them on schematic maps. Our partnership extends the technology choice available to systems integrators and offers attractive new options for their customers,” says Tim Northwood, General Manager, Inner Range.   To stay up to date on the latest, trends, innovations, people news and company updates within the global security market please register to receive our newsletter here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitynewsdesk.com

IDIS and Inner Range Tech partnership Read More »

Hard Off Security join Secured by Design

Hard Off Security are one of the latest companies to join the official police security initiative Secured by Design. Hard Off Security are a British organisation built out of the need to solve a problem that affects hundreds of thousands of people driving keyless-entry/keyless-start vehicles that are susceptible to ‘relay theft’.  These vehicles are susceptible to the cloning of their key fob’s signals, by scanning for them from over 30 yards away. This is commonly done outside your house at night, by 2 thieves and commonly known as ‘relay hacking’. They are able to silently gain entry to your car and start the engine within seconds without the need to have physical access to the vehicle’s smart keys.  This is where criminals use specialist equipment that has the ability to grab the signal from the car to the smart key, so that it appears to the car that the key is present. Vehicles are most vulnerable overnight, particularly if parked on a driveway or directly outside a home. Hard Off Security’s smart tamper proof Hard-Off Fob Protector stops cars from being stolen in this way. A “Hard-Off” solution is at the core of this protection.  No Faraday cages, tin cans or metallic pouches or accidentally microwaving keys, the solution relies on stopping the transmission and reception of signals, not blocking them.  The Hard Off Fob Protector does this by cutting the power to the key fob using a simple ‘unhackable’ power circuit-break or “Hard-Off”. The Hard-Off Fob Protector Protects Passive Keyless Entry (PKE) vehicles against relay theft Adds value to your car once it is protected Simple to fit by wrapping device around the key fob’s battery Works intuitively by turning the key fob on and off as needed Simple to use and easy to live with because keyless functions remain unchanged No need to do anything different as it works completely automatically Designed and manufactured in the UK to the highest quality standards Money-back guarantee and a 2-year international and transferable warranty Doug Skins, Secured by Design, said: “It is a pleasure to welcome Hard Off Security as new members of Secured by Design. They are the first company to join Secured by Design with this type of solution to Relay Theft and I am really looking forward to working alongside them over the coming years”. Mark Churchward, Managing Director of Hard-Off Security Ltd., said, “When my daughter’s car was stolen from her driveway in the early hours, I was infuriated and astonished at how easy ‘relay theft’ was to do. Within days I realised the solution was in some kind of power off arrangement on the Fob and Hard-Off was born. The latest device which has been approved by SBD is the sixth generation and one of which we are very proud.” Secured by Design (SBD) is owned by the UK Police Service with the specific aim of reducing crime and helping people live more safely. SBD developed a product based accreditation scheme over 20 years ago – the Police Preferred Specification, which provides a recognised standard for all security products that can deter and reduce crime. SBD work with manufacturers and standards authorities to ensure that security standards are current and updated to keep pace with emerging crime trends. There are currently many hundreds of companies producing thousands of attack resistant crime prevention products, across over 30 different crime categories, which have achieved Police Preferred Specification. SBD is the only way for companies to obtain police recognition for security-related products in the UK.   To stay up to date on the latest, trends, innovations, people news and company updates within the global security market please register to receive our newsletter here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitynewsdesk.com

Hard Off Security join Secured by Design Read More »

bitcoin

Cryptocurrency related cyberattacks grow 192%

As the price of bitcoin surged in the recent months, so too have the volume and sophistication of cyberattacks relating to the popular cryptocurrency. This is according to new research by Barracuda Networks, Inc., a leading provider of cloud-enabled security solutions, which found that impersonation attacks relating to cryptocurrencies grew 192% between October 2020 and April 2021 – aligning with the near 400% increase in the value of bitcoin over the same period. The report found that attackers are now expanding their range of cryptocurrency attacks from extortion and ransomware, to now incorporating digital currencies into spear phishing, impersonation, and business email compromise (BEC) attacks. “Cryptocurrency seems to be a perfect currency for criminal activity — it’s unregulated, difficult to trace, and increasing in value. For these reasons, it has fuelled and enabled a multibillion economy of ransomware, cyber-extortion, and impersonation,” said Fleming Shi, CTO at Barracuda. “The increased digitalisation of businesses since the onset of the pandemic has resulted in more data being created and stored in collaboration apps, and more information being exposed. This has created more targets and potential value for criminals. Combined with the increased price of bitcoin, these factors have presented strong motivation for cybercriminals to come up with more sophisticated schemes to cash in on bitcoin-mania.” Barracuda’s researchers found that one of the most common methods of attack was the impersonation of digital wallets and other cryptocurrency-related apps with fraudulent security alerts to steal log-in credentials. In the past, attackers impersonated financial institutions targeting victims’ banking credentials. Today they are using the same tactics to steal valuable bitcoins. Cybercriminals have also included bitcoin as part of their business email compromise (BEC) attacks, impersonating employees within an organisation. They target and personalise these emails to get their victims to purchase bitcoin, donate them to fake charities, or even pay a fake vendor invoice using cryptocurrency. Barracuda’s Artificial Intelligence (AI) based natural language processing of these BEC emails revealed the key phrases and calls to action that hackers are using to incite their victims. Most commonly, cybercriminals create a sense of urgency by using phrases like “urgent today” or before the “day runs” out. Their call to action is typically for their victim to go to the “nearest bitcoin machine.” They also play on their victims’ sentiments to request that a payment be made as a “charity donation,” making their victims believe they are doing a good thing. Growing cost of ransomware As an unregulated and difficult to trace digital asset, cryptocurrency has long been the preferred payment method for ransomware demands. Now, as the value of cryptocurrencies has surged, the ransom amounts hackers are asking for have been going up as well. In 2019 ransom demands ranged from a few thousand dollars to $2 million at the top end. By mid-2021 most demands were in the millions, with a significant number over $20 million. “Cybercriminals might still be requesting the same amount of bitcoin, but with the price of cryptocurrency going up it costs more for organisations to pay out,” said El Inati. Offering advice to businesses that have fallen victim to ransomware, Shi said, “When faced with ransomware attack, a lot of organisations and consumers don’t know what to do other than to pay the ransom. This feeds the appetites of cybercriminals, encouraging them to attack more and ask for even bigger ransoms. If it can be avoided, don’t pay up, and work with government agencies to get a resolution.” “As bitcoin and other cryptocurrencies become more mainstream, their value will continue to grow. But so will government intervention and regulations. It’s a rapidly evolving threat landscape and organisations and individuals must remain vigilant as cybercriminals will continue to demonstrate their ingenuity in formulating new and convincing ways to exploit the hype and ambiguity that surrounds cryptocurrencies,” Shi concluded.   To stay up to date on the latest, trends, innovations, people news and company updates within the global security market please register to receive our newsletter here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitynewsdesk.com

Cryptocurrency related cyberattacks grow 192% Read More »

Back to school security

As educational facilities return to the new normal, it is important to update cyber and physical security defences to protect learners in a new environment  As educational institutions return to normal it is important to highlight some of the biggest security risks that the sector is facing. One of the biggest being cybersecurity, as a lot of work will continue to be communicated and completed online.   A major priority for educational institutions is defending networks from intrusion and protecting the personal information of students, alumni and employees. Why do school administrators and educators need to know this? Because schools of all kinds – from primary through secondary and higher education — now have databases full of personal information about faculty, staff, and students. To cyber criminals, who are not fussy about whose data they steal, these repositories of personal data make an appealing target.  An additional priority is meeting the auditing and reporting mandates for a potential patchwork of federal and state privacy laws. The key for educational institutions to meet all of these information security demands is to proactively implement security controls and best practices, rather than taking a reactive approach and responding to short-term requirements.  With such a broad range of large, small, public and private institutions, there is no one solution that is right for everyone. There are certainly a range of information security products and services to help meet regulatory requirements and reduce the risk of a data breach. Educational institutions without a dedicated security operations center can rely on managed security monitoring & compliance services to provide the expertise to meet regulatory requirements and implement industry best practices.  Here are our 5 security considerations that are key:  Layered defences Do not expect one security product alone to protect you against every possible threat to your systems and data. Of course you want to make sure you have an anti-malware suite on all parts of your network (don’t forget smartphones, Android tablets, Linux servers, and Mac computers along with your Windows machines). But you should also have a firewall at the gateway to your school’s network and on all your individual machines –those you own, those owned by grants, and those owned by your students, faculty, and staff. Any important data, such as grades, finances, or personal information, should be encrypted both in storage (both on servers and workstations) and any time data leaves your machines, like via email or on devices like smartphones or USB sticks.  Implement the principle of least privilege The principle of least privilege simply means that no person, machine, or system should have access to things they don’t strictly need. For instance: student financial data should be in a different part of the network, and completely cut off from people who don’t need to access it. And very few people, if any, should have administrator-level access rights on their own machines (some people are shocked at this suggestion, but that’s one way we manage our machines here at ESET – and if they must have admin rights, they shouldn’t be using that account except when they need to do admin tasks). Any time you can restrict access without disrupting people’s ability to do their jobs, you should.   Update, update, update Applying updates and patches for all software is one of the most important things you can do to minimise the vulnerabilities criminals can use to silently get into your machines. When managing complex systems there may be a case for testing updates before rolling them out, but keep delays due to this process to a minimum. The bad guys are constantly probing for unpatched vulnerabilities. And don’t forget that it’s not just your operating systems and applications you need to keep patched; there are the helper apps that your browsers run, from Java to Flash to Acrobat and beyond.  Indeed, the risks of not patching as quickly as possible probably far outweigh the benefits of testing. If an immediate system-wide rollout is not practical, at the very least initiate a rollout of patches immediately on a small set of representative machines, then expand to greater subsets as soon as practical until all machines under your control are patched. [Getting the machines you do not control patched is a wholly different problem; consider blocking logons to your networks (with appropriate notices beforehand and when actual blockage occurs) to any machines that have not been patched, at least for critical vulnerabilities.  Passwords are not enough If you’re protecting lots of personally identifiable data, a password alone may not be enough. Consider implementing two-factor authentication or 2FA. This can be a biometric, like a fingerprint, or a one-time pass code that is provided to users via a small digital key card or fob. A more recent development is the use of smartphones to deliver one-time pass codes to users and these systems can be relatively inexpensive yet highly secure. Students who use social networks like Facebook and Twitter should already be familiar with the notion of 2FA, as those services use it to prevent unauthorised access.  Make a clean break When employees leave and students move on, be sure to adjust their credentials accordingly. In many cases this will mean terminating their access to school systems. The use of “lingering” credentials that should have been revoked is one of the most common forms of “insider” abuse of systems. In addition, a review of authorised user accounts should be done at least once a year to weed out access that is no longer appropriate.  Surveillance and security   The safety of students and staff is vital for every school. The distinctive quality and flexibility of network cameras effectively reduce the threat of harassment and violence. Suitable for monitoring school playgrounds, hallways, gyms, lunch areas and classrooms, they ensure the safety of students and staff, and prevent damage to school property.  With an increasing focus on everything from bullying, to medical emergencies and vandalism, campus security is more important than ever. Administrators understand that they’re not

Back to school security Read More »

NHS

Digitising the NHS

Security News Desk UK explores why digitising the NHS and protecting our medical information and data is of top importance, especially post Covid-19   The NHS has been trying to accelerate their digital journey for many years, and go paperless. It was supposed to happen in 2018, but first it was pushed back to 2020 and now it’s been postponed again until 2023. The benefits of going paperless are easy to understand; digitised documents mean clinical data can be easily shared across the NHS, giving clinicians access to patient records and care plans wherever they are. That generates efficiencies and cost savings, as well as enabling higher-quality clinical care.  Substantial investment is planned (£8 billion over five years), but the NHS has been hamstrung by the wide range of different IT systems being used by different parts of the service. Many of these can’t work together, making it difficult for hospitals to share scans with GPs, for example.  The blame for missing the target to create an integrated paperless system of digital patient records – a key principle of the NHS Long Term Plan of 2019 –  has been blamed on poor planning, a lack of governance and a lack of sufficient investment.  So, what is needed to fully digitise the NHS and what benefits would it have on security?  Digitisation  With the NHS approaching its 73rd birthday, Satpal Biant, Head of Public Sector at SAP, explores what should be the health service’s top tech priorities.  Next July the NHS will celebrate its 73rd birthday. Further distribution of Covid-19 vaccines will make it a less gloomy occasion than last year’s, but there can be no doubt that the forces unleashed by the pandemic – most importantly digitalisation – will continue to reshape the institution.  Digitalisation is causing upheaval across society – from videoconferencing disrupting traditional ways of working to the rise of dark kitchens in hospitality and the boom of ecommerce overtaking high street shops. And as identified by the 2020/21 NHS People Plan, this digital disruption has gone right to the heart of the NHS as well.  The impact of the disruption will last beyond the pandemic. Of course, digitising an institution like the NHS is even more difficult than a retail chain. The past year has shaken the healthcare sector – but 2021 and 2022 will be where the NHS can regroup, adapt and plot a path to the future. To get there I believe there are three key technological priorities the NHS should focus on for the next 12 months – coordination and interoperability; cybersecurity; and innovation and intelligent automation.  Coordination and interoperability  The NHS employs 1.3 million members of staff – making it the UK’s largest employer, and one of the largest employers in the world. Its immense scale and segmented structure makes coordinating resources difficult.  A consequence of providing such a range of services over so many regions, is that over the years the organisation has splintered – and so has its technology. Outdated legacy IT and more modern technology is therefore siloed and unable to interact. This was one of the most important findings of last year’s House of Commons Public Account Committee report, ‘Digital Transformation in the NHS’, which concluded that the lack of interoperability and limited capacity for information sharing across the NHS are two of the biggest challenges to its digital transformation. With critical information stored across unconnected servers, clinical systems and databases, tracking the patient journey across different departments of the NHS is incredibly complicated, hampering its ability to drive efficiencies across the organisation and streamline patient care.  Tackling this lack of coordination and encouraging greater interoperability should therefore be a major priority for the NHS in 2021.  Migrating parts of IT infrastructure to the cloud can be an important practical step towards doing this. Data stored on the cloud can be managed and shared more easily, making coordination easier. This should ease supply chain and procurement inefficiencies, and data derived from digital services can offer leaders greater insight into collaboration.  Cloud can also offer the NHS more computational power than on-premises IT. Such a massive organisation inevitably generates vast quantities of data, and as healthcare is increasingly digitalised, more and more will need to be verified, stored, managed, and analysed. Investing in cloud adoption in 2021 will mean the NHS doesn’t have to play catch-up in the future.  Better coordination and more interoperable data sets will have real-life impacts on patient outcomes. Hospitals or departments will be able to share health records with less friction, for instance. And when it comes to national health issues like Covid-19, obesity, or Alzheimer’s, having access to deep and broad data pools could be game-changing. It should also make workforce planning and management simpler, meaning healthcare workers can do their job more effectively.  Cybersecurity  We witnessed a spate of nation-state cyberattacks at the close of 2020, highlighting the growing threat of cybercrime for public and private organisations. While only the biggest and most successful breaches make headline news, attempts are far more frequent.  As our healthcare system becomes more reliant upon a digital foundation, the NHS must ensure it’s protected from cyberthreats.  A robust security system should feature reliable backup storage to prevent data loss and ransomware, in addition to redundant server infrastructure – distributed data centres that ensure both data and services are available to customers even if one data centre fails. Cloud services can also help shore up the NHS’s security as cloud security can be updated regularly with full adoption from all connected devices, preventing blind spots.  Encryption is also vital. At a fundamental level, encryption simply makes data unusable for those who do not have verified access, so it should be the bedrock of any organisation’s data security capabilities. Multi-factor authentication is another important security tool that reduces the risk of breaches using stolen or lost devices.  Innovation and intelligent automation  As Covid-19 will continue to be a threat in 2021, the NHS must be ready to adapt to

Digitising the NHS Read More »

big ben

The UK’s cyber vulnerabilities

Government outlines the UK’s strategic cyber security policies for the coming 12 months, with critical national infrastructure a clear priority  National Infrastructure are those facilities, systems, sites, information, people, networks and processes, necessary for a country to function and upon which daily life depends.  It also includes some functions, sites and organisations which are not critical to the maintenance of essential services, but which need protection due to the potential danger to the public (civil nuclear and chemical sites for example).  In the UK, there are 13 national infrastructure sectors: Chemicals, Civil Nuclear, Communications, Defence, Emergency Services, Energy, Finance, Food, Government, Health, Space, Transport and Water. Several sectors have defined ‘sub-sectors’; Emergency Services for example can be split into Police, Ambulance, Fire Services and Coast Guard.  Each sector has one or more Lead Government Department(s) (LGD) responsible for the sector, and ensuring protective security is in place for critical assets. Not everything within a national infrastructure sector is judged to be ‘critical’. The UK government’s official definition of CNI is:  Those critical elements of infrastructure (namely assets, facilities, systems, networks or processes and the essential workers that operate and facilitate them), the loss or compromise of which could result in:  Major detrimental impact on the availability, integrity or delivery of essential services – including those services whose integrity, if compromised, could result in significant loss of life or casualties – taking into account significant economic or social impacts; and/or  Significant impact on national security, national defence, or the functioning of the state.  National Cyber Security Strategy  The Covid-19 pandemic has highlighted the vulnerability of the UK’s critical national infrastructure (CNI) to disruption by malicious actors, and ensuring the resilience of such essential services will be a clear priority throughout 2021, according to the government’s annual National Cyber Security Strategy 2016-2021 (NCSS) progress report, which was last updated at the end of 2020.   In the introduction to the 2020 progress report, which reflects on progress already made against the NCSS goals and outlines future priorities as the strategy enters its final year, Paymaster General, Penny Mordaunt wrote that the tumultuous events of the Coronavirus pandemic has done much to reinforce the importance of cyber security to the UK’s national wellbeing.  “Millions of us have been relying more heavily on digital technology to work, shop and socialise,” wrote Mordaunt. “It has been an empowering and liberating force for good at a time when people have felt confined. It has been a lifeline keeping people connected with family and friends, ensuring the most vulnerable receive medicines and food deliveries, and is underpinning the operational delivery of our ongoing response to the pandemic.  “But alongside the clear benefits technology brings come growing opportunities for criminals and other malicious actors, here and abroad, to exploit cyber as a means to cause us harm. That is why the role of this strategy and the diverse range of talented and committed cyber security professionals across all sectors of our economy are so important in keeping citizens and services safe.  “The UK’s departure from the European Union presents new opportunities to define and strengthen our place in the world as a sovereign and independent country. That includes how we tackle existing and emerging cyber security threats at a time when the global landscape is changing dramatically.”  Mordaunt added: “Our approach to cyber security strategy post-2021 will reinforce the outcome of the current Integrated Review of the UK’s foreign, defence, security and development policy. It will ensure we can continue to defend the UK against evolving cyber threats, deter malicious actors, develop the cyber skills and cyber sector we need and build on the UK’s international leadership, influence and action on cyber security in the years ahead.”  In the past year, the government has run several initiatives to evolve and strengthen the approaches that CNI organisations take to cyber security, working across government, with various regulators and public and private sector organisations to build a collective understanding of the challenges faced by CNI owners, and develop new strategies to address them.  This work has included improvements to cyber security regulatory frameworks and the establishment of a Cyber Security Regulators Forum, and the ongoing implementation of the Network and Information Systems (NIS) regulations, which a post-implementation review seems to suggest are proving quite effective at strengthening security approaches among operators of essential services.  Throughout this year, the government will continue to work across CNI sectors to improve assessment and reporting processes, and plans to develop bespoke penetration testing frameworks to help telco operators in particular defend against, manage and recover from cyber attacks.  It will also put more energy into improving understanding of the UK’s supply chains and dependencies – which is especially vulnerable to disruption thanks to the government’s approach to Brexit.  The report outlined plans to extend the deployment of the National Cyber Security Centre’s (NCSC’s) Active Cyber Defence (ACD) programme beyond traditional government sectors in support of private sector CNI. An ACD Broadening project will aim to build on the success of the programme and expand it out to a broader range of sectors to allow them to benefit from automated protection from commodity cyber threats.  Currently, the service includes protective domain name services, web and mail checks, host-based capability, logging, vulnerability disclosure, the Exercise in a Box programme and the Suspicious Email Reporting Service (SERS). While some of these – most notably Exercise in a Box and SERS – are currently publicly available, others are only made available to public sector bodies.  The NCSS progress report also outlined other key priorities for 2021, which include: enhancements to the UK’s threat intelligence capabilities; the expansion of cyber crime deterrence programmes such as the National Crime Agency’s (NCA’s) CyberChoices scheme and the ongoing introduction of Cyber Business Resilience Centres around the UK; improving the NCSC’s ability to respond to cyber incidents, including possibly automating some aspects of the process; enhancing security by design standards for connected products and services, working with bodies such as ETSI; bolstering cyber

The UK’s cyber vulnerabilities Read More »

InnoSenT

Ask the Expert: Detecting the benefits of radar

Dr. Eva Maria Buchkremer, Head of Product Management, InnoSenT talks exclusively to Security Buyer about the ins and outs of radar technology Since product management was established at InnoSenT in 2018, Dr. Eva Maria Buchkremer has an important role within the company. She is the contact person for innovation projects in the field of industrial radar sensors and has been pushing the product development. She is the interface between the market and R&D. She identifies unsolved customer problems, picks up on trends and specifies requirement specifications for product innovations in coordination with the radar experts. She is genuinely interested in identifying and satisfying customer needs. With her strong scientific background as a doctor of natural sciences, she was trained to collect and cross-link information, stay open-minded and adaptable and find creative and innovative solutions.She started her career in the medical technology field, always in positions that strived for a strategic approach. As Head of Product Management, she now rethinks radar technology for an ever-widening field of applications. She defines future product strategies and aligns the current portfolio with customer needs and market interests. What are the benefits of radar technology? Like any other technology, radar has strengths and weaknesses. The benefits of radar technology are: a high robustness in harsh environments – radar can therefore be used in indoor and outdoor environments the ability to measure several parameters (velocity, distance, angle of arrival, signal strength) – radar can therefore be used for applications varying from level measurement where only the distance to the substrate is determined up to complex scenarios like intersection management where the vehicle class, localization and trajectory of many road users are determined radar penetrates some materials and the sensors can therefore be hidden behind coverings – this is an advantage when vandalism or design factors play a role in the application radar is a contact-free technology – this is an advantage in any application where hygienic aspects are important Could you explain a little bit about how radar works? Radar devices use electromagnetic waves to locate objects within their field of view. A radar antenna actively sends a signal which travels by the speed of light in a defined direction. As soon as the signal encounters an object, the radar wave is reflected and part of the energy bounces back. If the distance between the antenna and the object changes, the receiving antenna notices a change in frequency, called Doppler shift. The magnitude of the differences between emitted and received radar signal and the travel time give information about the speed of and distance to the object. Radar can be used for many different industry verticals, which tends to be the most popular and why? Radar is an established technology in applications such as door opening, escalator control, speed signs and movement detectors. It offers a contact-free technology, delivers all data needed to solve these applications and works under outdoor conditions. In security applications, depending on the needs, simple radar motion detectors are used or more complex radar sensors for localizing and tracking people. The fusion with a second technology is becoming more popular. Radar offers benefits that are complementary especially to PIR sensors and cameras. A fusion thus enables new functions such as focusing the camera on an object by using the distance information of the radar or compensating the bad performance of PIR when the object is moving towards the sensor – radar is especially good in detecting movement that is headed towards the sensor. A vertical that is becoming more important for radar is the wide field of robotics. There is a rising demand for sensors in this industry in order to facilitate autonomous driving and enhance the safety of machinery. How has Covid-19 enhanced the need for perimeter protection, especially at sites where security is accessed remotely? Covid-19 presents us many new challenges in our private and work environment. The changes caused by the pandemic call for completely new technical solutions such as sensors for contactless operation, the development of it is now gaining momentum. Due to the pandemic measures, many are working from home. The office buildings or company premises are abandoned and, this also applies to the security staff, only minimally manned. So it seems logical that the demand for perimeter protection will increase. The technology must of course be extremely reliable if no one is checking the situation on-site or is following a live video stream remotely. We guess that this will increase the interest in high-end systems enormously and promote innovation. But the variety of products for perimeter protection is also expected to increase due to increased use. Every location has different requirements and customers want the ideal security solution for a wide variety of applications. Customizability and different ranges are required in order to increase efficiency and reduce false alarms. What type of data can be gathered from radar sensors in particular? With radar you can determine the speed, movement direction, distance and angle of moving or stationary objects. So with advanced radar technology it is possible to detect the presence, localize their position in a 3D-environment and follow the movement of objects with tracking algorithms. How do you stay innovative in a continuously evolving industry?  For new products, we strongly focus on unsolved problems in the market and work towards solving these. Our aim is to provide prototypes rapidly so we can involve our customers in the development at an early stage. Where do you see the future for radar technology going? The broadening use of MIMO technology and the opening of new frequency bands with higher bandwidths increases the resolution capabilities of radar and thus opens up new application spectrums and markets for radar technology. Safety-relevant applications benefit from the robustness of radar technology and thus harsh environments can be equipped with safety systems based on radar. In other applications such as alarm systems or autonomous driving, the fusion of technologies that compensate each other’s weaknesses is most promising. Because of its industrialisation, radar

Ask the Expert: Detecting the benefits of radar Read More »

Scroll to Top