Facilitate flow Intercept incursions.
CHALLENGE
In a world where travel and cross-border trade is crucial to the economic development and market vibrancy of modern nations, governments must balance conflicting priorities. They must protect the integrity of land and maritime borders from threats such as illegal crossings, organised crime, terrorism, and illicit trafficking of arms, drugs, and people, while also ensuring the free flow of travel and commerce.
SOLUTION
With experience securing thousands of kilometres of border across diverse terrains and environments, Etimad’s Border Security solutions provide smart security that leverages advanced sensor and monitoring technologies and sophisticated software adapted to all border types, terrains and populations. Our solutions prevent incursions while permitting vetted two-way traffic.
CORE TECHNOLOGIES AND TOOLS
Advanced sensors : Activity monitoring through ground surveillance radars, long-range electro/optic devices, smart-fence sensors, video content analysis, mobile units and more
Camera auto slaving to radar tracks : Automatically positions cameras on a target and moves the camera accordingly.
Unmanned Aerial Vehicles (UAVs) : Immediate, real-time images and other data of border sections, without the need to deploy personnel.
Patrol vehicles : Quick response to illegal border incursions.
Multi-sensor fusion : Coordination of stable and continuous tracking of all targets, while avoiding false or multiple track generation.
Command & control : Hierarchic platform integration of various fixed, mobile, and handheld units to manage thousands of daily border crossing activities and alerts.
Mobile surveillance unit : Complements fixed deployment and includes sensors, communications and mobile command & control capabilities.
Unmanned ground vehicles (UGV) : Remote surveillance and reconnaissance for command & control operators.
KEY FEATURES
- Continuous adaptive allocation of resources based on hierarchic command & control structure, mobile sensing capabilities, and intelligence-driven threat assessments.
- Operational optimisation based on terrain, weather, and available resources.
- Adaptation for land and maritime borders, as well as open and closed borders
- Reuse of existing infrastructure and components for optimal ROI and resource utilisation.
Sophisticated Solutions Safer Streets.
CHALLENGE
Traditionally, law enforcement has been reactive – solving crimes and apprehending criminals after the fact. Today however, proactive and predictive policing is crucial. It’s also possible with new systems and platforms that help agencies harness information from sensors, databases, open sources, the web and the general public. With these assets, law enforcement can anticipate criminal patterns and prevent incidents before they occur.
SOLUTION
Etimad’s Law Enforcement solutions serve numerous countries and agencies, enabling authorities to predict and prevent crime, as well as effectively respond to criminal activities and operations. Our solutions combine the principles of community policing, predictive policing, intelligence-led policing and other proven models that optimise information exchange among relevant authorities, agencies and the public. The result: safer streets and more effective law enforcement operations.
CORE TECHNOLOGIES AND TOOLS
Intelligence backbone : Comprehensive, enterprise-level platforms that integrate an organisation’s data systems, protect data security, and facilitate inward and outward information sharing.
Real-time crime centre : Real-time response and management capabilities that integrate and share intelligence with forces in the field and defence and security agencies.
Urban shield : A unified platform that collects multi-spectral information and analyses, integrates all collected data, and provides operational guidance protocols and debriefing analysis capabilities.
Command & control platform : Integrated platform to manage thousands of daily policing activities, receive alerts, and generate action recommendations.
Crime prevention platform : Centralised platform that empowers law enforcement and international anti-crime agencies to identify and stop local, national, and cross-border criminal activities.
Safe neighbourhood : Using everyday mobile phones, tablets, laptops and other portable devices, this tool provides citizens and law enforcement with an integrated and accessible mechanism to report, respond to, and prevent safety and security incidents.
KEY FEATURES
- Predictive dispatching based on crime data fusion and analysis.
- Public empowered to create a safer environment across crowd sourcing and citizen advisory bidirectional communication platforms.
- Integration of external video management systems (indoor / outdoor surveillance).
- Cross-agency and platform collaboration for improved filtering and correlation capabilities.
Maximum Protection for the Modern Economy.
CHALLENGE
Critical infrastructure, such as power plants, transportation hubs, and IT and communication infrastructure, is the backbone of modern society. To keep citizens and communities safe and economies thriving, these assets must be protected from both internal and external threats. This challenge is complicated by the location of critical infrastructures in diverse environments and often remote locations, with thousands of employees entering and exiting a facility daily.
SOLUTION
Etimad’s Critical Infrastructure solutions protect onshore, offshore and coastal assets and infrastructure, adapted to specific types of assets, terrains and populations. It analyses fused data from sensors, databases and the web to detect, deter, prevent and manage any breach of security or safety. Every day we help secure manned and unmanned sites all over the world, providing maximum protection and safety to assets, employees and nearby civilian population.
CORE TECHNOLOGIES AND TOOLS
Command & control : Unique fusion and correlation algorithms evaluate and integrate outputs from the sensor network, control operational components, and enable response initiation and management.
Emergency management platform : Support to emergency response systems and first responders by integrating existing operational, surveillance and dispatch systems with ad-hoc deployments of mobile sensors and communication components.
Crowd sourcing : Employees receive information regarding events and conditions that may affect their safety and well-being through crowdsourced data from employee smartphones.
Unified access management : Facilities operators can monitor and control employee, vendor, visitor and vehicle access and restrict access to different zones based on role or function.
Smart facility : Comprehensive facilities safety management through monitoring and control of facility occupancy, infrastructure and surrounding environment.
Real-time environmental sensing : Real-time environmental status updates to ensure facility compliance with relevant regulations and standards.
KEY FEATURES
- Multi-layered safety and security platform combines physical and cyber protection, sensor fusion, intelligence and decision support tools – all in a unified and correlated situational-awareness picture.
- Ongoing adaptive allocation of resources driven by threat assessments and based on hierarchic command & control structure, mobile sensing capabilities and intelligence.
- Operational optimisation based on terrain, weather and available resources.
- Flexible, scalable unified access management system.
Complex Settings Comprehensive Solutions.
CHALLENGE
Cities of the 21st century are characterised by ever-changing and growing priorities in domains as different as transportation, resource management, crime and terrorism. Compounding the complexity of these challenges are the multitude of stakeholders within the city environments and their need to coherently manage current requirements, while preparing for whatever challenges will emerge from new technologies, changing geopolitics and growing global urbanisation.
SOLUTION
Etimad’s Urban Management solutions offer local, regional and national authorities a complete portfolio of products and solutions to effectively manage today’s complex urban environment and those of tomorrow. Our solutions currently support governments in China, the Middle East and the Netherlands.
CORE TECHNOLOGIES AND TOOLS
Safe city : A holistic platform that channels incoming information from sensors, databases, open-source platforms, and citizen trustees to generate a comprehensive situational picture and disseminate it to safety and security responders.
Emergency response & crisis management : A functional communication and dispatch network for emergency responders that gathers, integrates and processes information from all available sources.
Integrated urban management : A single-point urban status, analysis and management platform that collects and collates data and other information from disparate city platforms.
Urban transportation management : Improved driver safety, and reduce congestion, pollution and pollution levels by integrating real-time traffic monitoring and forecasting tools, historic sensor data and advanced analytics.
Environmental monitoring & safety : Network of fixed and mobile sensors capture emission levels, water quality and other environmental parameters.
Urban cyber defence : Critical urban systems protection against sophisticated cyber-attacks by giving governments the capacity to identify, investigate and prevents attempted cyber attacks.
KEY FEATURES
- Holistic, integrative approach to management of urban operations and processes.
- Integration of multiple domains and cross-domain analysis for new insights and multi-agency collaboration.
- Utilisation of personal platforms (e.g., smart phones, tablets, floating car data) for information collection and dissemination.
- Enhanced simulation, planning and prediction capabilities for contingency managements, emergency response and risk mitigation.
Access Information Secure Environments.
CHALLENGE
Rapid growth is a defining characteristic of contemporary cities. Today, more than half the world’s population lives in urban settings – presenting a complex, ever-changing, technologically complex landscape for governments and corporations. Financial and socio-economic concerns, crime control and community safety require new approaches to mitigating and containing urban risks and threats in the pursuit of a stable business environment, and public safety, security and well-being.
SOLUTION
Etimad’s Safe City solutions combine cutting-edge technology, and data gathering and analytics capabilities, alongside advanced modelling platforms to help nations, cities and corporations effectively manage and secure urban environments, reduce crime, increase the well-being of citizens and employees, and bolster economic growth.
CORE TECHNOLOGIES AND TOOLS
Advanced Sensors : Video & audio sensors; license-plate recognition; mobile phone location; chemical, biological, radiological and nuclear and energetic (CBRNE) sensors; pan-tilt-zoom control; priority management and sensor allocation to different organisations.
Surveillance System : ntegrated sensor and advanced analytics suite providing facial recognition, object tracking, video and event management for continuous tracking and quick response to incidents and developing events.
Three-dimensional interior modelling tool : AI-enhanced visualisation tool to anticipate, assess, play out and prepare for various scenarios in indoor emergencies.
Data centre : Multi-spectral information collection and integration capabilities providing optimal situational awareness, operational guidance protocols, and debriefing tools.
Command & control platform : The heart of the Safe City solutions, this platform gathers and analyses all relevant information sources to generate a Unified Situation Awareness Picture (USAP) to manage thousands of daily activities and alerts.
KEY FEATURES
- Adaptive sensing capabilities deliver optimal and real-time operational coverage.
- Comprehensive investigation, prediction and prevention capabilities that transform data into actionable intelligence.
- Unified Situational Awareness Picture (USAP) based on integrated multi-agency database allows for the efficient management of forces and resources, delivering greater value to participating agencies.
- Connecting citizens with government command & control centres for the collection and dissemination of information via smartphones, tablets and floating car data.
- Cost-effective, infrastructure-light, integration of Safe City and Law Enforcement solutions.
Break Bottlenecks Facilitate Flow.
CHALLENGE
As modern cities grow, traffic patterns become more complex and an increasing volume of vehicles clogs highways and other thoroughfares. Traffic congestion, long commute times, pollution, traffic accidents and inefficient emergency response times are the result, harming public health, the environment and the economic life of cities. An effective and efficient public transportation system can help ameliorate some of these by-products of urban growth by enabling the swift and efficient movement of large numbers of citizens and travellers within and across cities.
SOLUTION
Etimad’s Intelligent Traffic system provides an integrated real-time view of all transportation components, including areas of congestion, parking availability and traffic flow. It achieves this by correlating current conditions with historical data and future projections, as well as data from sensors that have information-sharing and multi-agency collaboration capabilities.
CORE TECHNOLOGIES AND TOOLS
Sensor data collection : Data collection from fixed and mobile (infrastructure-free) sources, including licence plate recognition (LPR) CCTV, radar vehicle detection systems (RVDS), and video analytics.
ITS command & control : The arterial Intelligent Traffic System collects, stores, analyses all relevant information to enable predictive resource dispatching, incident detection, fast response, optimal route recommendations to dispatched resources, dissemination of driver information, and decision support.
ITS subsystem integration : Video-based incident detection and management, variable message signs (VMS), traffic signal control (TSC) and automatic vehicle location (AVL).
Information distribution module : Platform to convey and update real-time information, alerts and recommendations via VMS, radio, smartphones and the internet.
KEY FEATURES
- Enables reduced congestion and lower average trip duration, improved road safety due to a reduced number of incidents and casualties, reduced pollution, and improved driver experience.
- Multi-agency collaboration via shared components and subsystems helps optimise resource use and operational efficiencies.
- Enhanced smart mobile sensors layer for real-time traffic data via user GPS data (from fleets) and mobile phone positioning data.
- Cost-effective, infrastructure-light, swift implementation by leveraging existing security infrastructure.
Evolving Threats Comprehensive Response.
CHALLENGE
The modern world’s reliance on the internet, digitisation, IoT and other networked operations creates enormous risk of malicious and criminal cyber threats such as cyber espionage; attacks on critical infrastructure; equipment compromise; disinformation, propaganda and vandalism; and data-leak and intelligence compromise from infiltrated systems. Adversaries use cyber weapons such as botnets, email viruses, spyware, worms, phishing, and Trojan horses.
Any response must deliver threat and vulnerability reduction, deterrence, international engagement, incident response and resiliency. To achieve this, a cyber security solution must incorporate effective recovery policies and activities, security network operations, information assurance, law enforcement engagement, and intelligence awareness of the status and risks to the global information and communication infrastructure.
SOLUTION
Etimad’s Cyber Security suite delivers the most comprehensive solution available to governments for the implementation of security policies to protect critical and vital national infrastructure from cyber attack. A nationwide solution is essential to help sub-national governments manage cyber frontier and oversight capabilities with a proactive approach and centralised command & control platform. Our suite includes a cyber-intelligence system, a security operations centre, a cyber-campaign training simulator, forensics capabilities, and training and exercises to teach efficient real-time response and damage control capabilities during attacks.
CORE TECHNOLOGIES AND TOOLS
Advanced sensors : Monitoring ICS and ICT environments, IT and SCADA networks, and passive SCADA, IT and cyber-intelligence networks for attack sources and methods using cyber and other sensors, with data delivered to a high-level security operations centre.
Cyber collector : Raw data collection from critical networks, using a unique probe, with asset configuration, and inbound and outbound logs and network capturing.
Cyber command & control centre : The central component of our national cyber-security suite, the centre is based on a national grading system and raw data collection from various national critical networks, assets and other data backbones. It detects anomalies, provides real-time event elaboration and analysis, both emergency and offline cyber events management, and a real-time national cyber status indicator.
Security operations centre : Analysis and forensic capabilities supported by advanced cyber-intelligence and featuring a unique cyber-campaign training simulator.
Comprehensive services suite : Training, policy management, risk assessment and process management.
KEY FEATURES
- Regulation and smart enforcement deliver policies and standards, risks analyses, disaster recovery plans, product approvals, computer emergency response teams (CERTs), and more.
- Active defence and forensics on a national level, including active hunting, and both targeted and general vulnerability analysis.
- Cyber intelligence combines multi-source intelligence and WEBINT systems, storage capabilities, smart engines, and rules formulation for gathering information about adversaries and threats.
- End-to-end simulation environment for training national cyber-defence arrays and troops, as well as security performance testing of products and technologies, ongoing evolution of national critical assets safety and security levels, DDOS simulation, insider adversary assaults testing, network and applications attacks, and more.
- Real-time national cyber-situational awareness through continuous monitoring of national cyber assets and industrial control systems (ICS).