Gallagher Safety & Security Gates(1)
Browse Safety & Security Gates
Gate products updated recently
Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilised by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year drew to a close, holiday and Christmas markets as well as major New Year’s Eve events, presented cities with constant public event security needs. The public nature of these events increases risks of incidents with high-speed vehicles that put attendees in danger. Fortunately, there are three ways for public space managers to prevent casualty-causing collisions and further promote the use of local public areas. Developing an effective action plan When strategising how to react to an alert, think about what time of the year and time of day the event is occurring It is important to have a plan developed before an incident or accident occurs. Warning systems, utilising doppler radar and digital loop technologies, alert guards to abnormal vehicle velocity changes in the surrounding area. Managers of public areas should organise a meeting with public safety authorities and local agencies to discuss what must immediately occur when a high-speed vehicle is approaching a public event. When strategising how to react to an alert, think about what time of the year and time of day the event is occurring. Having such a reaction plan in place combines technology and strategic planning to ensure everyone is on the same page to effectively target a threat and promote overall event safety. Securing public areas Ideally, there will be no need to implement a well-conceived action plan. After all, taking preventive measures to secure public areas where events take place is important to keep people safe from accidental vehicle collisions and intentional attacks. Protect attendees by clearly separating pedestrian and vehicle locations using security devices such as – Barricades Portable barriers Bollards Install guard booths Avoid the risk of vandalism and theft, making sure people are safe when walking back to the cars at night by keeping parking areas illuminated with flood lights. Install guard booths with employees who monitor activity in the parking area and who are prepared to react if an alert is triggered. Furthermore, prevent accidental collisions by clearly marking the parking area with informative warning signs and using barricades to direct traffic. These three tips can be used by public area managers to promote security at the next community event. Additionally, the technologies used to secure an event can also be used as infrastructure for year-round security. Installing gates that shut when the public space is closed or using aesthetically pleasing bollards are steps any public area manager can take to promote community safety.
From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A brief history of 3D technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to augment Google Maps and Google Earth; documenting some of the most remote places on earth using a mix of sensors (Lidar/GSP/Radar/Imagery). The mission to map the world moved indoors May 2011 with Google Business Photos mapping indoor spaces with low cost 360° cameras under the Trusted Photographer program. In the earlier days, 3D scanning required a high level of specialisation, expensive hardware and unavailable computing power With the growth of 3D laser scanning from 2007 onwards, the professional world embraced scanning as effective method to create digitised building information modelling (BIM), growing fast since 2007. BIM from scanning brought tremendous control, time and cost savings through the design and construction process, where As-Built documentation offered an incredible way to manage large existing facilities while reducing costly site visits. In the earlier days, 3D scanning required a high level of specialisation, expensive hardware, unavailable computing power and knowledge of architectural software. Innovation during the past 8 year, have driven ease of use and lower pricing to encourage market adoption. Major investments in UAVs in 2014 and the commercial emergence of 360° photography began a new wave of adoption. While 3D scanners still range from $20K – $100K USD, UAVs can be purchased for under $1K USD and 360° cameras for as low as $100. UAVs and 360° cameras also offer a way to document large spaces in a fraction of the time of terrestrial laser scanners with very little technical knowledge. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors The result over the past 10+ years of technology advancement has been a faster, lower cost, more accessible way to create virtual spaces. However, the technology advances carry a major risk of misuse by bad actors at the same time. What was once reserved to military personal is now available publicly. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors. Al Qaeda terror threats using Google Maps, 2007 UK troops hit by terrorists in Basra, 2008 Mumbai India attacks, 2016 Pakistan Pathankot airbase attacks, ISIS attacks in Syria using UAVs, well-planned US school shootings and high casualty attacks show evidence that bad actors frequently leverage these mapping technologies to plan their attacks. The weaponization of UAVs is of particular concern to the Department of Homeland Security: "We continue to face one of the most challenging threat environments since 9/11, as foreign terrorist organisations exploit the internet to inspire, enable or direct individuals already here in the homeland to commit terrorist acts." Example comparison of reality capture on the left of BIM on the right. A $250 USD 360° camera was used for the capture in VisualPlan.net software What does this mean for the security or facility manager today? An often overlooked, but critical vulnerability to security and facility managers is relying on inaccurate drawing. Most facilities managers today work with outdated 2D plan diagrams or old blueprints which are difficult to update and share.Critical vulnerability to security and facility managers is relying on inaccurate drawing Renovations, design changes and office layout changes leave facility managers with the wrong information, and even worse is that the wrong information is shared with outside consultants who plan major projects around outdated or wrong plans. This leads to costly mistakes and increased timelines on facility projects. Example benefits of BIM There could be evidence of a suspect water value leak which using BIM could be located and then identified in the model without physical inspection; listing a part number, model, size and manufacture. Identification of vulnerabilities can dramatically help during a building emergency. First Responders rely on facilities managers to keep them updated on building plans and they must have immediate access to important building information in the event of a critical incident. Exits and entrances, suppression equipment, access control, ventilation systems, gas and explosives, hazmat, water systems, survival equipment and many other details must be at their fingertips. In an emergency situation this can be a matter of life or death. Example benefit of reality capture First Responders rely on facilities managers to keep them updated on building plans A simple 360° walk-through can help first responders with incident preparedness if shared by the facility manager. Police, fire and EMS can visually walk the building, locating all critical features they will need knowledge of in an emergency without ever visiting the building. You don’t require construction accuracy for this type of visual sharing. This is a solution and service we offer as a company today. Reality capture is rapidly becoming the benchmark for facility documentation and the basis from which a security plan can be built. Given the appropriate software, plans can be easily updated and shared. They can be used for design and implementation of equipment, training of personnel and virtual audits of systems or security assessments by outside professionals. Our brains process visual information thousands of times faster than text. Not only that, we are much more likely to remember it once we do see it. Reality capture can help reduce the need for physical inspections, walk-throughs and vendor site-visits but more importantly, it provides a way to visually communicate far more effectively and accurately than before. But be careful with this information. You must prevent critical information falling into the hands of bad actors. You must watch out for bad actors attempting to use reality capture as a threat, especially photo/video/drones or digital information and plans that are posted publicly. Have a security protocol to prevent and confront individuals taking photos or video on property or flying suspect drones near your facility and report to the authorities. Require authorisation before capturing building information and understand what the information will be used for and by who.There are a number of technologies to combat nefarious use of UAVs today Nefarious use of UAVs There are a number of technologies to combat nefarious use of UAVs today, such as radio frequency blockers and jammers, drone guns to down UAVs, detection or monitoring systems. Other biometrics technologies like facial recognition are being employed to counter the risk from UAVs by targeting the potential operators. UAVs are being used to spy and monitor for corporate espionage and stealing intellectual property. They are also used for monitoring security patrols for the purpose of burglary. UAVs have been used for transport and delivery of dangerous goods, delivering weapons and contraband and have the ability to be weaponised to carry a payload.Investigating reality capture to help with accurate planning and visualisation of facilities is well worth the time The Federal Aviation Administration has prevented UAV flights over large event stadiums, prisons and coast guard bases based on the risks they could potentially pose, but waivers do exist. Be aware that it is illegal today to use most of these technologies and downing a UAV, if you are not Department of Justice or Homeland Security, could carry hefty penalties. Facility managers must have a way to survey and monitor their buildings for threats and report suspicious UAV behaviours immediately to authorities. At the same time, it’s critical to identify various potential risks to your wider team to ensure awareness and reporting is handled effectively. Having a procedure on how identify and report is important. Investigating reality capture to help with accurate planning and visualisation of facilities is well worth the time. It can help better secure your facilities while increasing efficiencies of building operations. Reality capture can also help collaboration with first responders and outside professionals without ever having to step a foot in the door. But secure your data and have a plan for bad actors who will try to use the same technologies for nefarious goals.
As anyone who has ever flown on a commercial airline since 2001 knows, security measures at airports are well enforced and the emphasis on traveller safety is all around the airport and its grounds. Mass transportation, meanwhile, presents a special but not any less significant challenge when it comes to determining security issues. These facilities need to develop the means to protect a constantly changing and large population of passengers. And unlike airports these facilities often have hundreds of points of entry and exit on multiple modes—buses, subways, light rail, commuter trains, even ferries. About 2 million Americans will use the nation’s airways on a given work day, while 35 million people will board some form of public transportation. In fact, statistics have shown that nearly 11 billion trips are taken on public transportation every year. In some large metropolitan areas in North America where mass transit is well established, more than 20 percent of the area’s inhabitants get around via public transportation.About 2 million Americans will use the nation’s airways on a given work day, while 35 million people will board some form of public transportation Solving mass transit security For transportation officials and their security providers, solving the mass transit security issue begins with determining the key concerns and then creating the proper responses via security systems, policies and procedures to mitigate the risks. Although vandalism and graffiti are very visible signs of criminal behaviour in mass transit settings such as bus stops and subway stations, this is not where transportation officials typically focus their energy. Fences and gates can secure out-of-service buses and train cars, as can remote surveillance methods to keep such vandalism at a minimum. Instead, it is the day-to-day safety and security of transit riders and employees that should become the highest priority. This begins with creating the safest environment possible that is highlighted with appropriate signage and, when necessary, audible warnings, and supporting that with technology, such as surveillance cameras, that will document what has happened if an incident occurs.Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package Crime prevention in transportation Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package Incidents of concern within a transit setting can take several forms, ranging from legitimate accidents or crimes to false claims such as faked fall down the stairs to potential and actual suicides. Bus and subway stations also have become magnets for homeless people who may put themselves and others in harm’s way by trying to access less secure public areas within a station as temporary shelters. If someone is injured on a subway platform and the transit provider is held liable, it could be on the hook for hundreds of thousands, if not millions of dollars. Suicides are a major concern for operators, with personnel now being trained to look for individuals who seem distressed, are loitering in the area or are intentionally putting themselves in a dangerous situation, such as standing too close to the edge of a platform. The deployment of video analytics, which can be programmed to send alerts when certain pre-set actions occur, can help determine when such dangerous behaviours come into play. Analytics can also be useful in alerting security about other suspicious behaviours at a transit stop, such as an untended bag or package or a person going into a restricted area. Whether it is on the bus, train or ferry or at the stops themselves, cameras and intuitive video management systems are the key to both active and forensic transit security. Some cities use buses that are up to 60 feet long and those can be equipped with up to a dozen cameras Train security and safety By using the proper cameras and recording systems in a transit environment, quick-acting personnel can locate a person of interest who boarded a train at one station, follow him during his trip and produce a crisp, clear identifiable image at the end. Those setting up the system thus should keep in mind proper camera positioning, resolution and motion-based changes to framerates or other compression settings. A typical 30-foot bus often has six cameras—one each at the front and middle doors, two more within the bus and then one looking forward and another looking behind the bus. The latter two are important in the event of accidents to verify liability. Some cities use buses that are up to 60 feet long and those can be equipped with up to a dozen cameras.Train stations often deploy high-definition cameras to better support facial recognition software to get that actionable image Train cars are similarly equipped with two to four cameras to view activity down the centre aisle. Within the stations themselves, there can be from 15 to 30 or more cameras capturing wide-angle shots. Train stations, which have a restricted point of egress, often deploy high-definition cameras to better support facial recognition software to get that actionable image. Installing the right technology for the solution Although bandwidth and storage can be a concern, with motion-based recording, the resolution can be bumped up during event, resulting in a 1-megapixel stream jumping to 4 or even 8mbps when needed. By changing the resolution on demand, end users can cut their storage needs significantly. Transportation settings often rely on the same technology used in other security installations, primarily mini dome cameras, although there are some mini transit domes built specifically for the environment with the proper aesthetics. Because of vandalism threats, transit typically avoids pendant mounts, which can be more easily grabbed and damaged. Temperature ratings for cameras also come into play in cold climates with cameras often getting outdoor exposure.Today’s new buses and trains are constructed with the cameras onboard and newer stations also take security into consideration at the earliest design stage As trains and buses move along their routes, especially those that service outlying areas, Internet connectivity becomes an issue as well. Because it may be difficult for video to be sent in transit, security bus barns are equipped with Wi-Fi so video from onboard cameras can be downloaded at the end of the day. And the use of hardened recorders at the stations allows security personnel to retrieve recorded video. Transit security with modern technology Today’s new buses and trains are constructed with the cameras onboard and newer stations also take security into consideration at the earliest design stage. Older infrastructure from long-standing subway and bus terminals can prove to be a challenge when adding security, but these issues aren’t insurmountable. Often the solution is to add more cameras to cover the same square footage because of less-than-ideal sight lines and to place conduit wherever it works best, which may mean positioning it under platforms or in other out-of-the-way places within older stations. Looking ahead, transit security will continue to evolve, not only as new stations and modes of transportation are added to the system, but in terms of communicating with commuters. People can expect to get mass notification alerts on their mobile devices, and those same devices can provide vital data to transportation entities to better develop their overall systems.
Six CNI utilities sites across South West England and Wales have been secured from terrorist attacks and ongoing criminal threats in a £3.25 million security project. Gas distributor Wales & West Utilities appointed principal contractor Chubb Systems and Littlewood Fencing to work collaboratively on a fully-integrated perimeter protection upgrade. Littlewood secured the perimeter with a Lochrin Bain ‘Combi’ CPNI Approved palisade fence system enhanced with Gallagher monitored pulse fencing (MPF) to 4m high. They also installed Crime & Fire Defence Systems MAP vault panels, CCTV towers, security and field marshalling kiosks along with associated concrete and civil works. Collaborative project management Littlewood Security Division manager David Jackson said: “We’ve worked with Wales & West for many years as the incumbent supply and installation partner for perimeter security systems, but this latest project with Chubb also included the integration of access control, CCTV cameras, reporting systems and networks that enable remote monitoring from a central control station.” A large element of the package involved civil works that had to be completed mainly by hand In total, more than 2500m of fencing were installed along with twelve CPNI BASE vehicle gates and six Crime & Fire MAP vaults. With a number of sites located on the Brecon Beacons, access issues and inclement weather conditions made collaborative project management essential. A large element of the package involved civil works that had to be completed mainly by hand. This was achieved with a strong emphasis on health & safety ahead of programme and to a high standard. Strategically important sites Gallagher business development manager Jason Hunter said: “A Gallagher MPF delivers safe and controlled, energised pulses. If seeing the fence and warning signs isn’t enough of a deterrent then receiving a short sharp shock should definitely deter. “The system is also connected to our Command Centre, which will alert the security team that there has been a breach so they can react quickly and effectively.” Wales & West Utilities security manager Ian Raclette said: “Gallagher’s MPF meets the CPNI criteria we demanded and helps us to detect criminal or terrorist activity in real time, reducing further any threat on these strategically important sites.” Wales & West Utilities covers a sixth of the UK, serving a population of 7.5 million. It launched on 1 June 2005, having formerly been part of National Grid Transco, and is now valued at £1.2billion.
Global access control and perimeter security solutions provider, Gallagher Security is recruiting new channel partners to distribute and install its product range – and is using a major new exhibition to step up the hunt. Signing new channel partners Gallagher Security (Europe) will devote its stand (SE163) at The Security Event from 9-11 April 2019 at The NEC Birmingham to sign up new channel partners with a compelling pitch. New general manager, Richard Huison believes Gallagher offers the security industry at least 10% more value with an enterprise-level solution that is future-proofed ahead of the business curve. Importance of Cybersecurity Gallagher is in the top five UK manufacturers of access control solutions and cites industry standards such as Open Supervised Device Protocol" He says, “For the end user, from small business to multinational, we offer resilience and the confidence that what they are putting on their network will combat the ever-growing cyber threat. For our channel partners, this translates to annual management contracts and retaining clients for longer if they lead with Gallagher.” Richard adds, “Gallagher is in the top five UK manufacturers of access control solutions and cites industry standards such as Open Supervised Device Protocol, on which Gallagher is ‘miles ahead’.” Critical national infrastructure security Countering the cyber threat has been a key plank of Huison’s strategy since stepping up to the helm at Gallagher, which is a long term CPNI-approved supplier to the Home Office and critical national infrastructure clients such as the National Grid. Gallagher Security’s focus is on keeping client businesses and their people safe and offering business continuity and efficiency to ensure core operations run smoothly. The Security Event is a free-to-attend exhibition for the commercial and residential security market with 100 of the world’s leading security brands, a programme of 40 seminars and workshops for its more than 6,000 visitors.
Two of the biggest names in physical perimeter security have come together for the first time to develop a world’s first in temporary protection. CLD Fencing Systems, the UK’s renowned manufacturer and supplier of rigid mesh fencing and security gates, and Gallagher Security, global provider of Perimeter Intrusion Detection systems (PIDs) launched FenceSafe-E at International Security Expo 2018 in London on 28 and 29 November. FenceSafe-E fencing system FenceSafe-E combines the best of the zero-ground strike temporary security fencing system FenceSafe-E combines the best of the zero-ground strike temporary security fencing system. FenceSafe with the full benefits of a Monitored Pulse Fencing (MPF) system. Using pre-assembled modular units and the revolutionary FenceSafe system, the temporary secured perimeter can be rapidly deployed anywhere around the globe. During development trials, fence lines of over 30m with 45-degree corners, ends and 90-degree returns were erected and commissioned with full pulse fencing within 90 minutes. Russell Wells, Sales Director with CLD Fencing Systems, said: “One of the key issues faced with temporary monitored protection occurred on the straining of the wires. By using pre-assembled strained ends and corners we were able to develop a system that can offer the protection of a permanent fencing system with the deterrent of a pulse fence, while having zero ground strike.” Advanced perimeter security solution Kevin Godfrey, Strategic Business Development Manager at Gallagher Security, continued: “We are extremely excited to be working with CLD to offer customers the flexibility to easily install a high security solution on a temporary site and then remove it when it’s no longer needed.” The new FenceSafe-E allows the establishment of a true monitored temporary perimeter that is matched with all the aspects of a rigid mesh fencing system and access control. FenceSafe-E conforms to BS EN 1991 for wind loading, resisting overturn in wind speeds in excess of 100mph. The fencing system itself is manufactured to BS 1722 Part 14 and Part 17. It can be supplied either galvanised to BS EN ISO 1461 or polyester powder coated to BS EN 13438. The full range features profiled, twin wire and 358 mesh panel options with temporary sliding and swing gates that all host the Gallagher MPF.
Five things to consider for AI with video technologyDownload
OSDP is the strongest access control for your businessDownload
Preparing your organisation with quality situational awarenessDownload
Boon Edam’s Lifeline Speedlane Swing optical turnstiles installed at a renovated office space in Glasgow
Boon Edam’s TQM manual revolving door installed at Utrecht University's Koningsberger building main entrance
- Boon Edam’s Lifeline Speedlane Swing optical turnstiles installed at a renovated office space in Glasgow
- Boon Edam’s TQM manual revolving door installed at Utrecht University's Koningsberger building main entrance
- ASSA ABLOY Security doors provide National Gallery of Ireland with security, ballistic and fire rated doorsets
- Nortech updates St James’ Market access control system using Nedap’s uPASS Target system