Intruder Alarms: Communicators & Communication Systems(129)
Exhibiting at Security Essen, Hall 5, Booth C38. As the intruder market increasingly converges, with products and solutions entering from various rival markets, the time to integrate and evolve is now. There has been a rapid increase in end-user targeting, with solutions that deliver more than just security, but lifestyle solutions, including remote video monitoring, automation capabilities and more. This added value makes a system a desired enhancement to day-to-day life, rather than simply a grudge purchase to deter or alert of intrusion. It’s time to advance into new market applications and grow your business, by offering it all, with the totally integrated Enforcer V12 and Hik-Connect smart device application. With professional security integrity in mind, Hik-Connect is a user-friendly smart device application that brings together Pyronix multi-award-winning intruder security systems and technologies, with Hikvision’s world-leading video surveillance technologies and innovation. This seamless synergy enables you to deliver fully integrated and secure systems that are easy-to-install, flexible, extensive and meet your end users’ needs and desires. Thanks to seamless Hik-Connect integration, you can offer the ability to arm and disarm, check the status of any detector or sensor on the system and control any automation outputs, as well as access complete video monitoring of the property from anywhere, thanks to compatibility with any Hikvision video device. Available on Android and iOS, your end users can check any events, monitor when their children have arrived home safe from school, see what pets are getting up to, monitor outbuildings or even answer their front door or respond to deliveries with mic-enabled cameras, as well as see all the push notifications they have received - all from the palm of their hand. Should an event occur on the system, they can also simply and easily switch between their control panel and cameras for quick video verification. This simple switching also allows for easy multi-site monitoring, access to camera recordings and previews of live-streams. Deliver a security and video monitoring centre in the palm of the end user’s hand for any residential or commercial purpose. Hik-Connect is compatible with app-enabled Pyronix Grade 2 and Grade 3 security systems; offering outstanding usability and flexibility that is simple to install and easy to use. It’s time to advance. It’s time to integrate.
One of the main advantages of Software-as-a-Service solutions is interconnectivity. The cloud allows us to work in a completely different way than was possible before. In the past, an installer would have to get in their van and make a site visit to investigate any complaints or issues from their customer. Now, this can all be done remotely through SaaS-solutions like Vanderbilt’s SPC Connect, changing the entire service interaction quite dramatically. Vanderbilt wants to continue that evolution. Customers now expect very high levels of service from installers. SaaS-solutions are the perfect enabler to achieve this. With SPC Connect, Vanderbilt is delivering an ecosystem that will allow installers to have a better communication environment with their customers. The latest service release of SPC Connect brings installers closer to their customers by creating a platform where they can communicate more freely with each other. This ability to have more open communication between installer and end user, in a secure mechanism such as SPC Connect, will have a significant impact on increasing the level of service for all parties. Customer notifications Installers can communicate through the SPC Connect network directly to their customers. This feature allows installers to create a message that will appear directly in the user’s app and in their email. The messaging editor provides editing capabilities and the inclusion of links. The installer can also download the list of all customers interested in their message. User restrictions This enhancement delivers the security company greater control of the level of service they wish to offer through SPC Connect. The function allows the security company to define what operations are permitted by a user such as: Blocking Email; Blocking Push Notification; Blocking Alarm Verification; Blocking Mobile App; and Blocking Verification Web. Alarm verification via mobile devices If an SPC panel is part of an SPC Connect installer account, then a new feature will activate on the user device that will allow the user to view verification data. If the SPC panel is not part of a company, or the company has chosen to block this feature, then the users of that panel will not see any change. When this enhancement is enabled, when an alarm occurs that has verification, the user will be able to view the data and talk and listen live to site.
The Avigilon Presence Detector (APD) is a discrete impulse radar device that combines self-learning analytics with impulse radar technology to accurately detect the presence of a person even if they have stopped moving or are hidden. The device scans, learns, and continuously adapts to its environment, helping to reduce false positive events. Designed for indoor locations such as ATM rooms and other closed indoor vestibules within banks, pharmacies, health care facilities and retail stores, the APD can accurately detect a person’s presence through blankets, cardboard, wood and drywall. When integrated with Avigilon Control Center video management software, the sensor is designed to alert operators of security events while still maintaining privacy.
Exhibiting at IFSEC, stand D300 Consisting of two independent Passive Infrared (PIR) sensors and one microwave sensor, the Tri-Technology (TT) of the XDL12TT-AM utilises Tri-Signal Detection Logic to identify the presence of an intruder. Therefore, all three sensors must be activated sequentially in quick succession to create an alarm. This enhances the detector’s immunity to environmental disturbances and limits the risk of false alarms. Highly secure sequential detection With Dual-Vision Pet Immune Technology, each PIR sensor of the XDL12TT-AM has its own dedicated volumetric field of view. The top PIR detects outwards and up, while the bottom PIR detects outwards and down, without overlapping. This setup, alongside Tri-Signal Detection Logic, delivers highly secure sequential detection and increases its tolerance to pet immunity. This is just a glimpse of the innovative features of the XDL12TT-AM! The next level of perimeter protection is here!
The BX Shield is a series of curtain outdoor motion sensors with up to 12m detection range on each side. Ideal for the detection of people in the immediate boundary of your home or office building, the outdoor detectors feature four PIRs, two on each side. The left and right detection area can be set up completely independently from each other. The BXS-RAM is the wireless bi-colour model with anti-masking. Independent left/right motion detection The outdoor motion sensor’s detection range, sensibility and alarm output can be set independently on the left and the right. The detection distance can easily be set at 2.5m, 3.5m, 6m, 8.5m to 12m on each side, and the sensitivity can be set from low to extremely high, detecting as small a difference in temperature as 1 degree Celsius. The BX Shield can be easily connected to a fixed dome CCTV camera to send a visual alarm when people enter the immediate boundary of the premises. Versatile design The BX Shield curtain sensor has been designed with the user in mind. A 90-degree unlocking system allows easy access to the settings area, while a spirit level helps to fix the sensor on straight. Black and silver face covers are available, enabling the outdoor curtain sensor to blend into its environment. Four PIRs in one sensor Why two PIR in each side? - To offer the best performance needed in an outdoor environment. On each side, the BX Shield motion sensor features two passive infrared beams; one pointing towards the floor and one pointing away from the sensor. Both beams need to trigger to confirm the detection. This system will ignore small to medium-sized animals such as dogs and detect only people. Applications Buildings Perimeters Approach House Key features Wireless curtain PIR up to 12m per side with anti-masking Completely independent detection setting Versatile and easy-to-install design Not affected by environment or small animals Connect to new or existing wireless alarm panel The BXS-RAM is a battery-powered sensor (no cabling requested) in which most wireless transmitters available in the market can be fitted. This enables the sensor to connect to an existing or new wireless alarm panel. The anti-masking function ensures that if the alarm panel will be notified if someone has sprayed, covered the sensor or changed its position.
The Enforcer 32WE APP is a professional high-security wireless solution that delivers maximum security, flexibility, potential and opportunities for installers and users alike. Fewer call-outs With remote programming and diagnosis of the system using InSite UDL software via the PyronixCloud, the Enforcer 32WE APP system can be checked and even amended without having to send an engineer to site. This means there are fewer call-outs for the installer, or, should an engineer still be required to go to the site, any issue can be pinpointed before their arrival, which means much greater efficiency. This makes the system a much more profitable solution for their business. Efficient and flexible installation The initial installation is also much more efficient and flexible, utilising the PyronixCloud and two-way wireless technology. Setting up an account on the PyronixCloud avoids the difficulty of having to set up static IP, while the sheer volume of Pyronix two-way wireless peripherals with features like one-push-to-learn and signal strength indicators (SSI), alongside wired expanders, allow the installer to tailor any installation to perfectly protect any property. Property protection Users can rest assured knowing that the Enforcer 32WE APP is a superior security solution, that can meet their property needs, with simple and non-invasive fitting and expandability. Another key benefit for the user is the HomeControl+ App, which gives complete real-time control of their system from anywhere in the world. So, the system not only protects the property but provides the user with complete functionality, with remote arming and disarming, as well as control of any wired automation outputs. They can even check the status of every device on the system in real-time and much more. This is just a glimpse of what the Enforcer 32WE APP is capable of. Feature-full, expandable, efficient and easy, the Enforcer 32WE APP is truly a superior wireless security solution.
Exhibiting at Security Essen, Hall 5, Booth B48. Version 8.0 of long-range award-winning LiDAR – the REDSCAN RLS-3060 series and its configuration software REDSCAN Manager are both available. The new firmware enables additional detection modes including loitering detection, day/night pattern to the 30m radius RLS-3060L, while it allows the high end model to extend its detection area to 50m radius. The RLS-3060L will offer more flexibility in managing dry contacts with the option to switch from normally open (N.O.) to normally closed (N.C.). The RLS-3060L model ver. 8.0 features more detection zones and detection modes as well as greater flexibility with settings. The standard 2D LiDAR provides 30m radius detection range with 4 detection zones when used in analogue configuration and 8 zones in IP configuration. Loitering and selectable pattern modes are now available. Alarm duration and detection time settings are also more adjustable.
Exhibiting at Security Essen, Hall 6, Booth 6D90. Wireless technology is coming of age, with two-way communication capabilities now cementing wireless’ reliability. Vanderbilt’s SPC Wireless range includes detectors, panic buttons, fobs, and a transceiver, and has a number of benefits intended to make installers’ day-to-day work life easier. The SPC wireless range can extend to 500 meters, proving a more cost effective alternative than having to wire an entire building with cable. This range of 500 meters also cuts down on install time, ultimately cutting down on an installer’s expenses. SPC Wireless devices use the industry-leading Energizer® lithium batteries, meaning an extended battery life of five years. This means installers don’t have to go to site as often to keep changing out batteries, freeing up time for more urgent tasks. Settings for the SPC Wireless range are all configurable over the air. Again, this reduces the need for time-consuming site visits. Most other products require the physical need to flick dipswitches to change commands but Vanderbilt’s SPC Wireless is aimed at convenience first. All-in-all, installs for SPC Wireless are designed to be hassle-free. You just put up the control panel, wire the mains to it, place the wireless detector in position, and you’re good to go. In contrast, a wired solution can take, at a minimum, a day’s work fitting cable. By reducing time on site, Vanderbilt’s SPC Wireless can enable installers to get more work done elsewhere, essentially meaning more profits from more jobs.
Strong wireless signalling, multi-award-winning Enforcer two-way wireless technology and a whole host of intelligent reliability, security and detection features have all gone into the XDL12TT-WE. The first low-mount wireless outdoor detector of the Pyronix range combines multi-award-winning Enforcer two-way wireless technology with dependable external detection protocols, including: Dual-Vision Pet Immune, Tri-Signal Detection Logic and Gaussian Frequency Modulation (GFM), to deliver a highly dependable wireless external detector. IP55 weatherproof rated and consisting of two independent passive infrared (PIR) sensors and one microwave (MW) sensor in one common housing, its Tri-Technology (TT) delivers advanced outdoor protection. This is because, to identify the presence of an intruder, the XDL12TT-WE utilises Tri-Signal Detection Logic alongside TT, whereby all three sensors must be activated sequentially in quick succession to create an alarm. This heightens the detector’s immunity to false alarms and ensures optimum detection performance in external conditions. Along with Tri-Signal Detection Logic and TT, Pyronix has also pre-empted potential false alarm issues from the presence of pets or swaying vegetation, by including Dual-Vision Pet Immune and Anti-Sway Analytics features. Dual-Vision Pet Immune of the XDL12TT-WE consists of its two PIRs having a dedicated volumetric field of view, with the top PIR detecting outwards and up, while the bottom PIR detects outwards and down, without either crossing the central horizontal plane between them. This setup of non-overlapping PIR sensors alongside Tri-Signal Detection Logic, delivers highly secure sequential detection and increases its tolerance to pet immunity. Anti-Sway Analytics digitally filters the environment to distinguish between the movement of trees and plants from the movements of an intruder, so that false alarm activations are kept to an absolute minimum. These external detection protocols then benefit from the advantages of Enforcer two-way wireless technology, with full supervision, anti-jamming and 128-bit wireless protocol encryption, to maximise the new XDL12TT-WE’s reliability; ensuring signals transmitted by the system are protected and any code-grabbing is prevented. Two-way wireless also brings with it a whole host of installation benefits, without the invasive nature of fitting wired peripherals. This increases the efficiency of the installation for our customers, while providing a steadfast detector for end-users. In terms of the wireless signal, the XDL12TT-WE’s high sensitivity receiver is capable of a wireless signal range of up to 1.6km in open space, which reduces the need for repeaters and therefore reduces the installation cost. In addition, the high-sensitivity antenna of the XDL12TT-WE ensures that the signals being transmitted and received are as strong as possible, by utilising GFM to spread the signal, while reducing unwanted noise and harmonics. This enables the outdoor detector to meet stringent European, ETSI and other worldwide standards. When it comes to wireless outdoor security, why not deliver the XDL12TT-WE?
The residential home security market is rapidly migrating away from PSTN lines toward IP communications. As a result, security service providers need to adopt new communications technologies. Visonic offers a complete set of solutions for IP-based security services. Our solutions are ideal for service providers who wish to take advantage of this large and fast-growing Internet opportunity to not only meet changing customer needs but also to maximise recurring revenues.Visonic's range of IP solutions offers compelling advantages for alarm monitoring stations and security service providers. These advantages include more reliable communication, reduced costs and the opportunity to differentiate through premium services.IP Management Platform - IPMPA unique service management platform that provides a total solution for the management of IP-based services. It serves as the IP receiver for all Visonic communications modules (GPRS and broadband). The unique architecture of Visonic's IPMP - targeted to the needs of security service providers - makes it one of the most cost-effective IP service management solutions on the market. A single IPMP receiver can easily handle up to 20,000 accounts at a keep-alive period of 2 minutes. The IPMP delivers the events received to the central station software using standard receiver protocols, so the ARC software does not need any special adaptations in order to work with IPMP.The IPMP supervises the IP and cellular internal modules and forwards all events received from them to the central station software. This enabling the central station operator to track an alarmed system quickly, and to view the alarm-time recorded images via a standard web browser on the operator console, with no need to leave his/her work station. PowerLink An Internet-based solution for advanced home security and control. It provides a plug and play broadband IP event notification solution for alarm central stations. Also, it can be expanded with up to 12 cameras placed around the premises to create a comprehensive IP-based video alarm verification solution.GPRS connectivity Our GPRS modules ensure maximum reliability of event delivery to the alarm central station. It also includes advanced features such as two-way voice communication and SMS control.Add to Compare
The PIMA GSM-100™ is a tri-band GSM module, which integrates fully with PIMA’s control panels - a full-data transmitter that supports most popular Central Monitoring Stations (CMS) protocols. Integrated GSM module (installed in the same box as the control panel) Easy and simple installation: Just plug it to the panel and it is set for operation Does not require phone line and thus requires no special settings and adjustments Fully programmed via the alarm system keypad, locally or remotely via a windows based download software, or via a fast programmer tool Full-Data Reporting Tri-band engine, suitable almost anywhere in the worldThe unit is highly suitable as backup to a regular PSTN line communicator, in building & construction plants where a PSTN line is unavailable or as the main communicator with boats in marinas, holiday homes, etc. where leasing a PSTN line is unwarranted.In addition, the GSM-100™ presents a number of opportunities for Central Monitoring Stations (CMS), as the GSM module sends short messages via voice channel requiring no additional CMS hardware, with low operational costs and vast coverage with the GSM network.Add to Compare
The SD3, showcased at FIREX 2007, is the latest development in Menvier's world-beating speech dialler range. In addition to the standard PSTN connection, the SD3 also has an integral, full-function GSM module enabling it to use any of the standard mobile phone networks. The SD3 accepts all standard SIM cards (not supplied).The unit is user programmable allowing the user to digitally record a standard ‘home' message and up to eight individual trigger messages, enter up to ten contact phone numbers and select the type of message for each input. A user can select to send messages (either spoken or SMS text) via either connection or via both, if both, they can further pre-select which will dial first. Four programmable outputs are provided allowing designated users to dial into an SD3 at anytime and remotely switch up to four connected devices. These can also be controlled when a message has been received and the line is still open. The integral microphone allows any person called to listen-in to the premises and even talk back, if required.SD3 has an additional unique feature that opens up a whole new area of use for speech diallers. When an input is triggered, an automatic digital sound recorder can be programmed to record and store either the next 15 or 30 seconds of sound received from the integral microphone. This can be replayed either at the unit itself or, remotely, from anywhere in the world, via a fixed or mobile telephone.An integral, digital sensor can be preset at any given temperature from 0°C - 50°C and will automatically transmit a message when that temperature has been reached or exceeded. Ideal for ensuring that buildings or rooms never get to too cold if the heating system fails.The wide operating voltage range, 10.5VDC -28VDC, enables an SD3 to be used for monitoring virtually any kind of system, intruder, fire, access or Building Management System (BMS). Reducing the need for an installer to have to stock separate 12 and 24VDC versions.Cooper showcased the SD3 along with a wide range of their other products at FIREX 2007.Add to Compare
Browse Intruder Alarms: Communicators & Communication Systems
Intruder alarm communicator products updated recently
Most technology companies have one goal in mind: to provide customers with high-quality, affordable products that can efficiently help streamline operations. Whether it's surveillance cameras, video management software, access control technology or any other type of security device, today's leading organisations invest in expertise in these product segments and strive to produce the highest quality solutions. To effectively fulfill this task, technology providers are always searching for emerging components to make their products and services even stronger. Oftentimes, a key aspect necessary to build a comprehensively robust solution involves finding like-minded partners that share a common goal and are willing to work together to create an integration that increases insight and intelligence.The interoperability between systems, devices and different types of applications should be intuitive and fast Key factors for security integrations A basic factor in a partnership is openness. For an integration to perform seamlessly for the end user, the platform through which the technologies converge must follow standard protocols, easily operate with other platforms, allow freedom and customisation, and provide adaptability. The interoperability between systems, devices and different types of applications should be intuitive and fast, enabling more time to be spent on analysing critical data and responding to security events. The puzzle of a complete security solution contains many pieces, and it's often necessary to fuse together aspects from various providers to create a best-in-breed technology offering. When organisations collaborate, the end result is a simplified solution with an increased level of value. As threats become more severe and complex, customers demand solutions that combine different security and business elements into a single interface that can address a wide variety of risks. A unified security system requires a strong collaboration between technology providers and integrated solutions Interconnected security devices Users used to only look at specific security devices - such as cameras or door alarms - as each having a strong, autonomous purpose, but now, every device plays an important interconnected role. And the progression of the Internet of Things (IoT) has made this transition even easier, as maintaining a consistent and uniform communication and interconnectivity between devices has now become the norm. The IoT has also made it so that partnerships must not only exist between manufacturers, but also within the customer's organisational structure. Although exceptionally beneficial, the IoT brings with it an increased amount of cyber vulnerabilities. As security systems are networked to increase flexibility, the door is opened to a number of potential threats that could compromise the entire enterprise. This risk highlights the need for an internal partnership and knowledge sharing between a company's physical security professionals and its IT team. IT experts should be pulled into security decisions and positioned as collaborative partners to assist with software updates, data safety protocols and solving complex network challenges, ultimately leading to a more cyber secure solution.Partnerships are beneficial to both the companies involved and their customers Knowledge sharing and learning Aside from cybersecurity, the latest prominent security attacks and events have focused primarily on soft targets, such as schools, concerts or shopping malls. This has caused many technology providers to venture into different vertical markets, and strong partnerships streamline this crossover. Innovators can extend their geographic reach and purpose through integrations with other like-minded manufacturers or integrators to add new levels of functionalities. Of course, a partnership cannot operate properly and to the best of its ability without a core component: learning. In today's evolving business and risk environment, knowledge is critical. A shared knowledge base can open up new opportunities and lead to the strengthening of security across many levels. A truly powerful, unified security system requires a strong collaboration between technology providers and integrated solutions. Partnerships are beneficial to both the companies involved and their customers, and the results created through these alliances can reach far beyond a user's expectations, offering enhanced flexibility and extensive safety options.
Live events at large venues like arenas, stadiums or convention halls – whether they involve wrestlers breaking chairs over each other’s heads, Axl and Slash letting bygones be bygones and reuniting Guns ‘n’ Roses, your favorite NFL team annihilating the opposition 62-3, or a convention involving anything from politics to food to Star Trek – are exciting affairs that channel the camaraderie of the crowd into a powerful collective energy. But they also are vulnerable to threats. Physical security solutions Terrorists and other malefactors have known for centuries that any large gathering of people has inherent vulnerabilities on which they can prey: Crowds make it hard for security to keep track of any single person or spot unusual behavior, and the number of people congregated in one space amplifies the impact of any attack. In recent years, organisers of large events have augmented the security methods they use to protect a venue, using both walk-through metal detectors and hand wands, and deploying K9 and police units to patrol the lines to enter security. But these current methods share a universal flaw: to be caught, evil-doers have to be on the verge of actually entering the venue with hundreds of other people, which means they can still cause a massive amount of destruction. In a survey conducted by Brivo, 50 percent of business security leaders felt they lack adequate budget and financial resources to invest in physical security solutions. Augmented security measures Organisers of large events have augmented the security methods they use to protect a venue, using both walk-through metal detectors and hand wands Security professionals and event organisers are constantly on the verge of finding new methods to implement in order to add an extra layer of security at venues and large facilities. For example, at this year’s Coachella Music Festival in Indio, California, which attracts over 100,000 attendees each year, organisers boosted their security initiatives by adding drones, armed guards, magnetometers and dog patrols. Unfortunately, large entertainment festivals have been a target for ill-intended individuals. Last year, the 91 Route Festival in Las Vegas, Nevada took the lives of more than 50 people and injured over 500. In the United Kingdom, 22 people lost their lives to a suicide bomber at an Arianna Grande concert in the Manchester Arena. Yet, concerts aren’t the only place new security initiatives and technology need to be implemented in, but also sports arena and large facilities. Metrasens partnered with Villa Park, the football grounds for Aston Villa Football Club in the UK, to conduct a trial using FMDS technology, Proscreen 900, to screen fans Current screening methods Conventional walk-through metal detectors are a compromise between effective screening and high throughput, as they successfully detect metal objects, but only can screen about five or six people each minute. They are generally placed 10 to 20 yards from a venue’s front façade, either just outside or just inside, to screen people as they enter the facility. Hand wands are used for anyone that sets off the walk-through detector as a secondary screening method for confirmation. Many facilities also use observational methods to screen, such as drones, CCTV, security officers or police walking the crowd and looking for suspicious behavior, or explosives-sniffing K9 units patrolling the area. Security personnel are aware of these pre-security-screening vulnerabilities around the perimeter of the venue Security method limitations Each of these methods has intrinsic limitations. Observational security methods are just that – observation-based, not detection-based. They rely much more heavily on human factors that introduce greater degrees of error and chance, and positive visual identification of a suspicious threat requires a relatively close proximity to observe the threat. They’re also slow and laborious. Walk-through detectors and wands will catch someone trying to enter a facility with a weapon, but by the time they do, it may be too late – a terrorist will already be well within proximity to do a lot of damage. Bad guys don’t need to actually enter the venue; they just need to get close enough to injure or kill a large number of people. That can happen – and has happened, such as with Manchester Arena bombing in 2017 – right at the security point, where a terrorist will be surrounded by dozens or hundreds of people and 10 to 20 yards away from the critical asset: the interior of the venue. Security personnel are aware of these pre-security-screening vulnerabilities around the perimeter of the venue. What they haven’t had until recently is a way to screen mass amounts of people for weapons of mass casualty as far away from the critical asset as they can, and as far away from densely populated areas as they can, all while not impeding throughput resulting from the requirement for patrons to divest their possessions. Expanding security reach with FMDS The far perimeter of a venue is an ideal place to screen for weapons of mass casualty. Most of the time, a terrorist is trying to get closer to the immediate perimeter of the venue, to inflict the most damage to large groups of people waiting to get in; farther away, event attendees are walking toward the entrance and thus are more dispersed, not standing in clusters or lines. This advance screening is possible using ferromagnetic detection systems (FMDS). The FMDS systems in the trial, Proscreen 900, were placed outside, where individuals were screened for large weapons before they even entered the football stadium Metrasens recently partnered with a football stadium in Birmingham, UK to conduct a trial using FMDS technology to screen fans. The trial took place in March at Villa Park, the football grounds for Aston Villa Football Club. The stadium can hold over 42,000 people. The FMDS systems in the trial, Proscreen 900, were placed outside, where individuals were screened for large weapons before they even entered the football stadium, adding an extra layer of security. FMDS is highly accurate – there is no false alarm rate, because it is programmed to find only what security personnel need to find In the most basic terms, FMDS uses passive sensors that evaluate disturbances in the earth’s magnetic field made by something magnetic moving through its detection zone. Everything else is invisible to it; it doesn’t see people, clothing, backpacks, purses, etc. Nothing can be used to shield the threat, because FMDS doesn’t detect metallic mass; it detects a magnetic signature, down to a millionth of the earth’s magnetic field. It is also highly accurate – there is no false alarm rate, because it is programmed to find only what security personnel need to find (e.g., a weapon). Although it is a passive technology, it is more effective and reliable than using observational security methods to screen a perimeter, because the technology will never miss something the way a human would. Recognising moving magnetic signatures An important point is that the system only works on moving objects. This makes it immune to environmental conflicts such as rebar that would trip up conventional metal detectors and allowing people to be screened quickly and unobtrusively without stopping to divest their possessions as they walk toward a venue – up to 50 or 60 people a minute. FMDS does not need people to be organised into lines or groups; it simply detects a magnetic signature on anything that passes. It runs on batteries – there is no need for an electricity source, as with a walk-through detector – and can be placed on just about any form factor (a pole, a stand, etc.). This gives security personnel flexibility when deploying FMDS, allowing them to create a wide perimeter around a venue without worrying about portability or a power source. Screening can be as obvious or as concealed as personnel prefer for a particular situation, based on the form factor they select. FMDS simply gives the opportunity to add a layer of security where there currently is not an effective solution All of these combine into a solution that creates a way to close a gap in mass screenings at large events, by expanding the secure perimeter and creating a highly accurate way to detect weapons of mass casualty farther away from a critical asset and large crowds. It does not replace screening for smaller items necessarily, and all large venues should use a layered security solution that also deploys tactics like roving security guards, walk-through metal detectors and hand wands. FMDS simply gives the opportunity to add a layer of security where there currently is not an effective solution. Effective mass screening solution Pessimists sometimes muse the world is getting more dangerous with each passing year, and that technology is at least partially responsible for both the breadth and depth of the increasingly creative ways bad guys harm people. But some technologies also are responsible for helping to fight against those threats and make the world safer, and FMDS is one of those. By providing a foolproof method of detecting weapons of mass casualty before terrorists get too close to an event venue, FMDS gives event security personnel a way to better protect large events, making them less dangerous and keeping people safe. Images source: Metrasens
With the recent tragic events in Florida, it’s evident that schools require more tools to help ensure their students’ safety. With that, school and municipal officials all over the country are looking for more advanced ways to combat gun violence. While there is no perfect solution for the myriad of threats and emergencies with which our schools are confronted, many have looked to technology to help improve communications before, during and after incidents. For schools across the state of Arkansas; Nassau County, New York; Snohomish County, Washington; New Castel County, Delaware; Limestone County, Alabama and scores of others, the answer was the implementation of technologies that connect school personnel directly with local police, fire and EMS, and designated individuals at the school. Communication tools have proven invaluable when a potential active shooter situation was being discussed on social media Key to these schools’ choice in technology was the recognition that while the most traumatic of threats is the active assailant, any technology investment should be just as effective in handling the more frequent day-to-day incidents. Communication technologies for incident management How have technologies such as mobile panic buttons and anonymous texting helped impact school safety? Here are a few examples: In Limestone County, Alabama, 9-1-1 Director Brandon Wallace led an effort to implement technology tools across the county to help prevent and more quickly notify personnel of possible emergency situations. Communication tools have proven invaluable especially when a potential active shooter situation was being discussed on social media. Advanced technology integration The technology not only connected directly to emergency personnel, but also ensured that school faculty were able to communicate with one another during a potential emergency and account for students. Following the tragic shooting in Newtown, Connecticut, the school superintendent Dr. Joseph V. Erardi, Jr. chose to make communication technology a part of their new safety plan. The integration of advanced technology has given staff and teachers a greater sense of safety with not only active shooter events but also events like medical emergencies that require fast action and a quick response from public safety officials. Trainings ensure that staff and students are prepared for any type of situation and be on the same page in an emergency situation Implementing enhanced safety measures What are some lessons learned from these schools that can be applied to protect students in other areas? Here are some tips for implementing more safety measures into schools: Make sure your solution has a daily use. Unfortunately, many great technologies have sat unused when emergencies struck simply because those involved weren’t familiar with them or were under extreme duress and forgot about them. Training is an obvious necessity, but finding solutions with daily use cases (such as value in medical emergencies) can have a huge impact not only on ROI but also during an incident. Evaluate past incidents. Response during past incidents can always help future plans. Whether incidents have been handled well or have room for improvement, it’s important to continue to develop incident responses. For Limestone County, Alabama, the use of technology in their response plan was first tested during a medical emergency which helped to confirm the continued use within the school. Knowing the ease of use and responsiveness of emergency response tools, the county decided to build upon the technology already in place to help thwart future incidents. Train staff on the newest measures. Snohomish County, Washington holds trainings with teachers and staff, alongside local emergency personnel to prepare for active shooter incidents. Trainings ensure that staff and students can be prepared for any type of situation and be on the same page in the event of an emergency. Especially as new technology is introduced, integrating the tools with staff first will help ensure greater adoption throughout the process. Integrate practice drills. Fire drills are a common part of the school year; why not implement practicing other scenarios which may affect your school? Not only will this help with preparedness but will also highlight any measures that might need to be adjusted. New tools can then be tested to ensure that all staff and students are comfortable in the event they will need to utilise it in the future. Expand those involved in your drills to be those who will actually be involved in an incident. All too often, drills are siloed and don’t include outside agencies. Re-evaluating safety procedures Schools across the country can learn a lot from districts that have implemented and actually used new communications technologies addressing school safety, which are leading the way in how teachers and faculty are preparing to keep students safe. However, it will remain important to re-evaluate safety procedures and integrate technology to help ensure that these steps remain effective. As the tools continue to advance, the available safety measures will only continue to grow.
The role of IT in physical access controlDownload
Powerful video surveillance protects Red Bull RacingDownload
Making your surveillance cyber secureDownload
- Dallmeier offers comprehensive video management solutions for airport security and perimeter protection
- Sony 4K video security cameras monitor logistics centers of Gebrüder Weiss
- Hanwha Techwin’s Wisenet cameras and NVRs provides safety for patients at the Norfolk and Suffolk NHS Foundation Trust
- SMARTair biometric solutions ensure students’ security across campuses in Europe