Education security applications
Established by the President of the Republic of Azerbaijan, ADA University is a state higher education institution engaged in the delivery of undergraduate and graduate degree programs in addition to research advancement. The university started the construction of a new teaching building in 2017. Its multimedia classroom required 40 square meters of LED screens to provide students with advanced and modern teaching equipment. Spread spectrum VFE technology 42 m2 PHSA1.6-MH indoor fine pixel LED...
Around 7,000 people pass through the Luminy faculty’s suburban campus every day. As part of a major project to modernise two buildings, university managers sought a retrofit-ready access control solution to upgrade security. Aperio locks University administrators selected Aperio locks to secure doors in the new buildings. With Aperio, facilities, the staff can deal with lost keys more efficiently. The laborious process of changing locks and reissuing keys — part of the daily worklo...
Student accommodation is a fast-growing sector. Student numbers across France have grown around 10 percent in a decade. Around $1 billion was invested in France’s purpose-built student accommodation just between 2016 and 2018. Efficient solutions to help manage security for these student properties are always welcome. For new premises in Rennes, France, specialist provider Easy Student sought reliable, key-free locking. They wanted their new residence to run efficiently, “like a hot...
H-Farm has a strong track record supporting innovation and creativity in European start-ups. The company focuses on skills development, new approaches to education and digital transformation. Its most recent transformation project involved an access control system — for its own offices. H-Farm needed a solution to streamline access management for lots of people at a growing portfolio of sites and buildings. H-Farm experiences rapid turnover of users, both because new businesses join regul...
Allianz Parque has become one of the most modern multi-purpose arenas in Latin America since it was built in 2014 by WTorre Properties. The stadium is located at the same place of the old Palestra Itália Stadium with a capacity of more than forty thousand spectators. The stadium not just meets FIFA standards but was also awarded various prizes including the Master Award in the 11th edition of the Grand Prize for Corporate Architecture, the Accessibility Seal, delivered by the Permanent A...
One French town just north of Paris faced familiar key management challenges. Each person in their Municipal Technical Centre had to carry approximately forty physical keys. If a single key was lost or stolen, for even one door, all compromised cylinders had to be changed. To prevent unauthorised access, all the keys had to be replaced, too — at great expense. Key duplication costs were mounting. “One lost key cost from €3,000 to €4,000 for changing cylinders and replacing...
Motorola Solutions has agreed to acquire IndigoVision, a U.K.-based provider of end-to-end video security solutions. The boards of Motorola Solutions, its holding company and IndigoVision have reached an agreement on the terms of a recommended cash acquisition for approximately $37.2 million, representing a premium of approximately 116 percent based on the average share price over the most recent 12-month period. The acquisition will be funded by existing cash resources of Motorola Solutions and become final in May 2020. Motorola Solutions has a strong presence in the large and expanding area of video security since acquiring Avigilon in March 2018. Their product offerings include high-definition cameras, advanced video analytics, network video management hardware and software and access control solutions. IndigoVision is a developer of complete, end-to-end video security solutions from cameras to video recorders to body-worn cameras to security management software. Motorola Solutions says the IndigoVision range of products, global presence and customer base are "highly complementary" to Motorola Solutions' existing presence in video security. Among the benefits is enhanced geographical reach across a wider customer base. "The access we will now have to Motorola Solutions' range of innovative technologies will create new opportunities for IndigoVision and enable us to bring an exciting proposition to the market that allows us to further deliver on our goal of delivering safety, security and business intelligence," says Pedro Vasco Simoes, Chief Executive Officer of IndigoVision. "We share IndigoVision's commitment to providing next-generation, end-to-end video security solutions that enhance safety, security and efficiency," says John Kedzierski, Senior Vice President, Video Security Solutions, Motorola Solutions.
With just days left until the planned industry trade show, Reed Exhibitions has canceled ISC West over concerns about the COVID-19 coronavirus. Here is the statement on the decision: 'We at ISC West want to express our concern for everyone impacted by the COVID-19 coronavirus. Based on our close monitoring of ongoing developments with the virus, recent reports from public health officials and extensive consultation with our partners in the global security community, ISC West, scheduled to be held March 17-20, will now occur in July at the Sands Expo Center in Las Vegas. We take pride in offering vital business opportunities to our customers, including networking, education and access to new products and technologies, and commit ourselves to making July’s ISC West 2020 event live up to high standards. Over the coming weeks, along with ISC West’s Premier Sponsor SIA - we will continue to serve the industry, creating ways to connect, collaborate and keep our world moving during this difficult period.'
With growing concerns over the COVID-19 coronavirus, Motorola Solutions and its Avigilon brand have released a statement on their decision to pull out of this year's ISC West. The trade show, one of the biggest in the security industry, hosts over 30,000 security professionals and over 1000 exhibitors each year. The company states: "After careful consideration, we have withdrawn from this year’s ISC West trade show due to the widespread impact of the coronavirus." Official sources of updates "While ISC West is one important opportunity to demonstrate the power of Motorola Solutions' video security and analytics portfolio, the safety and well-being of our employees, customers and partners is our top priority. We are grateful to the ISC West organisers for their understanding and look forward to attending and supporting future ISC West events." ISC West will occur as scheduled March 17th through 20th, 2020, says Reed Exhibitions, despite the concerns. A statement from the show organisers is as follows: "While we regret that some companies have made the decision not to take part in ISC West 2020, we are focused on making ISC West 2020 a successful, safe, and enjoyable event for all attendees and exhibitors."
ISC West will occur as scheduled March 17th through 20th, 2020, says Reed Exhibitions. Following is a statement from show organisers: We take pride in offering vital business opportunities to our customers, including networking, education and access to new products and technologies and are working diligently to ensure ISC West 2020 and our other events live up to our high standards. While we regret that some companies have made the decision not to take part in ISC West 2020, we are focused on making ISC West 2020 a successful, safe, and enjoyable event for all attendees and exhibitors. Close Monitoring Over the last few weeks, Reed Exhibitions and our partners in ISC West have been closely monitoring the COVID-19 virus and its impact on members of the global security community. We are collaborating closely with the Sands Expo Center and local public health authorities and following local, state and federal public health guidelines, including those issued by the CDC. We have additional precautionary measures in place, including enhanced cleaning and sanitisation across all public areas and customer touchpoints in the show and we are constantly reviewing our health protection activities, public health messaging, hygiene and medical control measures with the aim of strengthening our COVID-19 response further in line with up to date public health advice and guidance, including that of the CDC. Health and Safety We will continue to provide updates on our website as we get closer to ISC West. The health and safety of our team members and guests is our utmost priority. Our policies and best practices are in close collaboration with our venue partner, Sands Expo Center. The Sands Emergency Management Team works closely with local officials and are taking appropriate steps to protect team members and guests as outlined by the Centers for Disease Control and Prevention (CDC) and the Southern Nevada Health District (SNHD). Sands is prepared to follow any additional protocols or guidance, as they are made available by the CDC or SNHD.
Rapiscan Systems RTT 110 is the first high-speed Computed Tomography Explosive Detection System (EDS) to be approved on TSA's Air Cargo Screening Technology List (ACSTL). This was achieved last month after a thorough testing process with the TSA and means that the RTT 110 will now undergo further field test activities which it must pass before it can be formally qualified. The RTT 110 has revolutionised the EDS market by providing exceptional performance at significantly lower cost of ownership. With its unique stationary gantry design and belt speed of 0.5m/s, the RTT 110 produces industry-leading high-resolution full volumetric 3D images at high speed, giving excellent security. Reliable and effective high-speed screening “We are very excited to be included on the ACSTL and the only approved CT EDS on the list”, said Mal Maginnis, President, Rapiscan Systems. “Our teams have worked extremely hard to create an exceptional product which we are all proud of. The technology has been designed to the highest quality to provide reliable and effective high-speed screening with many features ideally suited for the fast parcel industry and we are really pleased that our hard work is now being recognised”. By February 2021, all cargo shipments leaving, entering or travelling within the USA must be screened by a product included on the latest TSA’s Air Cargo Screening Technology List (ACSTL). The RTT 110 is the only EDS to be approved by the TSA and to be included on the ACSTL.
Cybersecurity services and Integrated Risk Management solutions provider SureCloud has announced that it has been accredited to provide Simulated Target Attack and Response (STAR) Intelligence-Led Penetration Testing services by the not-for-profit accreditation and certification body, CREST that represents the technical information security market. CREST developed the STAR framework to deliver intelligence-led cybersecurity testing, incorporating advanced penetration testing and threat intelligence services to more accurately replicate cybersecurity threats to critical assets. To meet CREST’s stringent requirements to secure STAR service provider status, SureCloud had to demonstrate its robust methodologies and sophisticated capabilities relating to the latest vulnerabilities and cybercrime techniques, as well as meeting government and risk management requirements. We have recognised their high professional service standards and the rigorous approach" Mitigating risks President of CREST, Ian Glover said, “SureCloud has been successfully assessed against our strict criteria for the supply of Simulated Target Attack and Response (STAR) Intelligence-Led Penetration Testing services. In accrediting SureCloud, we have recognised their high professional service standards and the rigorous approach they take in helping their customers mitigate risks and safeguard against advanced cyber-attacks. We congratulate them on this excellent achievement.” SureCloud’s VP of Cybersecurity, Mike Harrison, said, “The CREST STAR accreditation is a real testament to our capabilities as a business and it’s an important industry benchmark for delivering STAR intelligence-led penetration testing services. We’re proud to be amongst only 5% of UK penetration testing vendors that have been awarded this accreditation and are therefore able to offer STAR services in line with the high standards set by CREST. The fact we can deliver this excellent service through our vulnerability management platform means further value for our clients.” SureCloud’s Penetration Testing services have been CHECK approved since 2009 This accreditation reinforces the strong performance of the SureCloud team in undertaking Red-Team simulated Cyber Attack services for their clients. Techniques used are typically a blend of penetration testing, social engineering and physical breach attempts, with the overall aim being that organisations can prevent, detect and respond to the attack as if it were real. Crucially, this gives them a realistic overview for testing crisis management procedures, and how they might need to improve. Minimising risks of potential data breaches Given the complexity of these engagements, the standards you need to achieve a STAR accreditation are set exceptionally high, as it is imperative that the increasing number of organisations looking to undertake these engagements can understand who has the capability to deliver the highest quality service to them. SureCloud’s Penetration Testing services have been CHECK approved since 2009, and has been re-certified by the Payment Card Industry Security Standards Council (PCI SSC) as a PCI Approved Scanning Vendor (PCI ASV) for more than 10 years running. SureCloud is certified by internationally recognised ISO/ IEC 27001 for achieving operational excellence, minimising the risks of potential data breaches. SureCloud is also certified by Cyber Essentials Plus, complying with the requirements of the scheme, which focuses on technical control themes such as firewalls, secure configuration, user access control, malware protection and patch management.
News reports and opinion columns about face recognition are appearing everyday. To some of us, the term sounds overly intrusive. It even makes people shrink back into their seats or shake their head in disgust, picturing a present-day dystopia. Yet to others, face recognition presents technology-enabled realistic opportunities to fight, and win, the battle against crime. What are the facts about face recognition? Which side is right? Well, there is no definitive answer because, as with all powerful tools, it all depends on who uses it. Face recognition can, in fact, be used in an immoral or controversial manner. But, it can also be immensely beneficial in providing a safe and secure atmosphere for those in its presence. Concerns of facial recognition With the increased facial recognition applications, people’s concerns over the technology continuously appear throughout news channels and social media. Some of the concerns include: Privacy: Alex Perry of Mashable sums up his and most other peoples’ privacy concerns with face recognition technology when he wrote, “The first and most obvious reason why people are unhappy about facial recognition is that it's unpleasant by nature. Increasing government surveillance has been a hot-button issue for many, many years, and tech like Amazon's Rekognition software is only making the dystopian future feel even more real”. Accuracy: People are worried about the possibilities of inaccurate face detection, which could result in wrongful identification or criminalisation. Awareness: Face recognition software allows the user to upload a picture of anyone, regardless of whether that person knows of it. An article posted on The Conversation states, “There is a lack of detailed and specific information as to how facial recognition is actually used. This means that we are not given the opportunity to consent to the recording, analysing and storing of our images in databases. By denying us the opportunity to consent, we are denied choice and control over the use of our own images” Debunking concerns The concerns with privacy, accuracy, and awareness are all legitimate and valid concerns. However, let us look at the facts and examine the reasons why face recognition, like any other technology, can be responsibly used: Privacy concerns: Unlike the fictional dystopian future where every action, even in one’s own home, is monitored by a centralised authority, the reality is that face recognition technology only helps the security guard monitoring public locations where security cameras are installed. There is fundamentally no difference between a human security guard at the door and an AI-based software in terms of recognising people on watchlist and not recognising those who are not. The only difference is that the AI-based face recognition software can do so at a higher speed and without fatigue. Face recognition software only recognises faces that the user has put in the system, which is not every person on the planet, nor could it ever be. Accuracy concerns: It is true that first-generation face recognition systems have a large margin for error according to studies in 2014. However, as of 2020, the best face recognition systems are now around 99.8% accurate. New AI models are continuously being trained with larger, more relevant, more diverse and less biased datasets. The error margin found in face recognition software today is comparable to that of a person, and it will continue to decrease as we better understand the limitations, train increasingly better AI and deploy AI in more suitable settings. Awareness concerns: While not entirely comforting, the fact is that we are often being watched one way or another on a security camera. Informa showed that in 2014, 245 million cameras were active worldwide, this number jumped to 656 million in 2018 and is projected to nearly double in 2021. Security camera systems, like security guards, are local business and government’s precaution measures to minimise incidents such as shoplifting, car thefts, vandalism and violence. In other words, visitors to locations with security systems have tacitly agreed to the monitoring in exchange for using the service provided by those locations in safety, and visitors are indeed aware of the existence of security cameras. Face recognition software is only another layer of security, and anyone who is not a security threat is unlikely to be registered in the system without explicit consent. The benefits In August 2019, the NYPD used face recognition software to catch a rapist within 24 hours after the incident occurred. In April 2019, the Sichuan Provincial Public Security Department in China, found a 13-year-old girl using face recognition technology. The girl had gone missing in 2009, persuading many people that she would never be found again. Face recognition presents technology-enabled realistic opportunities to fight, and win, the battle against crimeIn the UK, the face recognition system helps Welsh police forces with the detection and prevention of crime. "For police it can help facilitate the identification process and it can reduce it to minutes and seconds," says Alexeis Garcia-Perez, a researcher on cybersecurity management at Coventry University. "They can identify someone in a short amount of time and in doing that they can minimise false arrests and other issues that the public will not see in a very positive way". In fact, nearly 60% Americans polled in 2019 accept the use of face recognition by law enforcement to enhance public safety. Forbes magazine states that “When people know they are being watched, they are less likely to commit crimes so the possibility of facial recognition technology being used could deter crime”. Saving time One thing that all AI functions have been proven to achieve better results than manual security is speed. NBC News writes, “Nearly instantaneously, the program gives a list of potential matches loaded with information that can help him confirm the identity of the people he’s stopped - and whether they have any outstanding warrants. Previously, he’d have to let the person go or bring them in to be fingerprinted”. Facial recognition can also be immensely beneficial in providing a safe and secure atmosphere for those in its presence With AI, instead of spending hours or days to sift through terabytes of video data, the security staff can locate a suspect within seconds. This time-saving benefit is essential to the overall security of any institution, for in most security threat situations, time is of the utmost importance. Another way in which the technology saves time is its ability to enable employees (but not visitors) to open doors to their office in real time with no badge, alleviating the bottleneck of forgotten badge, keycode or password. Saving money A truly high-performance AI software helps save money in many ways. First, if the face recognition software works with your pre-existing camera system, there is no need to replace cameras, hence saving cost on infrastructure. Second, AI alleviates much of the required manual security monitoring 24/7, as the technology will detect people of interest and automatically and timely alert the authorities. Third, by enhancing access authentication, employees save time and can maximise productivity in more important processes. The takeaway AI-enabled face recognition technology has a lot of benefits if used correctly. Can it be abused? Yes, like all tools that mankind has made from antiquity. Should it be deployed? The evidence indicates that the many benefits of this complex feature outweigh the small chance for abuse of power. It is not only a step in the right direction for the security industry but also for the overall impact on daily lives. It helps to make the world a safer place.
Companies are following government guidance and getting as many people as possible working from home. Some companies will have resisted home working in the past, but I’m certain that the sceptics will find that people can be productive with the right tools no matter where they are. A temporary solution will become permanent. But getting it right means managing risk. Access is king In a typical office with an on-premise data centre, the IT department has complete control over network access, internal networks, data, and applications. The remote worker, on the other hand, is mobile. He or she can work from anywhere using a VPN. Until just recently this will have been from somewhere like a local coffee shop, possibly using a wireless network to access the company network and essential applications. CV-19 means that huge numbers of people are getting access to the same desktop and files, and collaborative communication toolsBut as we know, CV-19 means that huge numbers of people are getting access to the same desktop and files, applications and collaborative communication tools that they do on a regular basis from the office or on the train. Indeed, the new generation of video conferencing technologies come very close to providing an “almost there” feeling. Hackers lie in wait Hackers are waiting for a wrong move amongst the panic, and they will look for ways to compromise critical servers. Less than a month ago, we emerged from a period of chaos. For months hackers had been exploiting a vulnerability in VPN products from Pulse Secure, Fortinet, Palo Alto Networks, and Citrix. Patches were provided by vendors, and either companies applied the patch or withdrew remote access. As a result, the problem of attacks died back. But as companies race to get people working from home, they must ensure special care is taken to ensure the patches are done before switching VPNs on. That’s because remote desktop protocol (RDP) has been for the most part of 2019, and continues to be, the most important attack vector for ransomware. Managing a ransomware attack on top of everything else would certainly give you sleepless nights. As companies race to get people working from home, they must ensure special care is taken to ensure the patches are done before switching VPNs on Hackers are waiting for a wrong move amongst the panic, and they will look for ways to compromise critical serversExposing new services makes them also susceptible to denial of service attacks. Such attacks create large volumes of fake traffic to saturate the available capacity of the internet connection. They can also be used to attack the intricacies of the VPN protocol. A flow as little as 1Mbps can perturbate the VPN service and knock it offline. CIOs, therefore, need to acknowledge that introducing or extending home working broadens the attack surface. So now more than ever it’s vital to adapt risk models. You can’t roll out new services with an emphasis on access and usability and not consider security. You simply won’t survive otherwise. Social engineering Aside from securing VPNs, what else should CIO and CTOs be doing to ensure security? The first thing to do is to look at employee behaviour, starting with passwords. It’s highly recommended that strong password hygiene or some form of multi-factor authentication (MFA) is imposed. Best practice would be to get all employees to reset their passwords as they connect remotely and force them to choose a new password that complies with strong password complexity guidelines. As we know, people have a habit of reusing their passwords for one or more online services – services that might have fallen victim to a breach. Hackers will happily It’s highly recommended that strong password hygiene or some form of multi-factor authentication (MFA) is imposedleverage these breaches because it is such easy and rich pickings. Secondly, the inherent fear of the virus makes for perfect conditions for hackers. Sadly, a lot of phishing campaigns are already luring people in with the promise of important or breaking information on COVID-19. In the UK alone, coronavirus scams cost victims over £800,000 in February 2020. A staggering number that can only go up. That’s why CIOs need to remind everyone in the company of the risks of clickbait and comment spamming - the most popular and obvious bot techniques for infiltrating a network. Notorious hacking attempts And as any security specialist will tell you, some people have no ethics and will exploit the horrendous repercussions of CV-19. In January we saw just how unscrupulous hackers are when they started leveraging public fear of the virus to spread the notorious Emotet malware. Emotet, first detected in 2014, is a banking trojan that primarily spreads through ‘malspam’ and attempts to sneak into computers to steal sensitive and private information. In addition, in early February the Maze ransomware crippled more than 230 workstations of the New Jersey Medical Diagnostics Lab and when they refused to pay, the vicious attackers leaked 9.5GB or research data in an attempt to force negotiations. And in March, an elite hacking group tried to breach the World Health Organization (WHO). It was just one of the many attempts on WHO and healthcare organisations in general since the pandemic broke. We’ll see lots more opportunist attacks like this in the coming months. More speed less haste In March, an elite hacking group tried to breach the World Health Organization (WHO). It was just one of the many attempts on WHOFinally, we also have bots to contend with. We’ve yet to see reports of fake news content generated by machines, but we know there’s a high probability it will happen. Spambots are already creating pharmaceutical spam campaigns thriving on the buying behaviour of people in times of fear from infection. Using comment spamming – where comments are tactically placed in the comments following an update or news story - the bots take advantage of the popularity of the Google search term ‘Coronavirus’ to increase the visibility and ranking of sites and products in search results. There is clearly much for CIOs to think about, but it is possible to secure a network by applying some well thought through tactics. I believe it comes down to having a ‘more speed, less haste’ approach to rolling out, scaling up and integrating technologies for home working, but above all, it should be mixed with an employee education programme. As in reality, great technology and a coherent security strategy will never work if it is undermined by the poor practices of employees.
Morphean’s CEO, Rodrigue Zbinden, explores the benefits of hosted video surveillance and access control, and what the growing interest from the IT community might mean for the physical security sector. Digital transformation continues to have an impact on every industry. In the physical security sphere, traditional CCTV and access control systems that once sat outside the connected world, are being replaced by their intelligent, cloud-enabled equivalents. The tired stand-alone legacy solutions of the past are increasingly being overhauled in favour of the smarter, customisable and scalable digital versions of these technologies. The question then is this: does this represent a new horizon for the physical security industry, or is it an existential threat in the form of a land-grab from the IT sector? Digital transformation continues to have an impact on every industry As the tectonic plates, as represented by the physical security and IT industries, continue to converge, it is clear that the underlying responsibility for physical security systems will be questioned. Conscious of the rapidly growing adoption of IoT devices, such as a surveillance camera, and their connection to IT networks and hosted data centres, Morphean commissioned an independent survey into the attitudes and behaviours of 1000 IT decision makers across the UK and Europe. We wanted to gain a better understanding of purchasing intent for evolving security provision in the 2020s. Landscape Report: Hosted Security adoption in Europe Our results revealed that as many as 84% of IT managers are currently using, or considering using, cloud-based video surveillance (VSaaS) or access control (ACaaS) systems. This points to an appreciation of the convergence of the physical and cyber security realms, and a willingness to embrace the merging of physical devices, connected through the IoT, with existing IT and cloud infrastructure. Of those considering such solutions, nearly 8 in 10 respondents said that integration with existing platforms or emerging technologies would also accelerate VSaaS and ACaaS adoption. The growing confidence in cloud seems to translate into more positive purchasing intentions around hosted security solutions with 77% of IT managers reporting that physical security is not currently optimised and one in five identifying it as a priority for 2020. Of those considering hosted security solutions, 4 in 5 (79%) anticipate introducing them to their business within a year. Our survey also revealed that 36% of IT managers identified operational performance as a priority for improvement within the next year. When we consider the many aspects of operational performance, productivity will always be a key measure, and cloud facilitates leaner decision-making, being more adaptable to the changing business landscape as required. Business application: unlocking intelligence Cloud-enabled physical security has much potential beyond security Cloud-enabled physical security has much potential beyond security. The data collected by network cameras and other physical security devices, combined with other sources of intelligence, can be used for a multitude of different purposes. For example, real-time analysis of visitor numbers, gender and age demographic in a retail store could be cross-referenced with promotional campaigns to gauge effectiveness, or used to identify insights into customer behaviour patterns, such as hot and cold zones. The same platform might ‘learn’ to predict the behaviours that cause queue build-ups, and trigger alerts more readily to advise management that more till staff are needed. In the transportation industry, intelligent analytics can be used to improve operations across a small fleet of vehicles or an entire transport hub. Cameras and sensors can be integrated on board buses and trains to provide instant images and video footage to control centre personnel, while proactive intruder and loitering alarms employed at busy stations and depots, can deter suspected troublemakers before an incident occurs. People counting technology provides insights which can be used to increase or decrease security provision according to the amount of footfall, or to predict when additional turnstiles should be opened to more effectively manage queuing customers. The existential threat For the IT security professional already working with cloud systems and services, the growth in connected digital devices through the IoT is resulting in a growing appetite for physical security, such as network cameras, to enhance existing IT systems and assist business intelligence gathering. And, it is perhaps because of its digital DNA that the IT department is increasingly responsible for physical security purchasing decisions, a relationship historically managed by the fire and security professional who has been slow to adopt digital transformation practices and cloud-based business models. But we know there is an opportunity for the physical security provider because the IT manager who is well versed in computing protocols may have scant knowledge around maximising the full potential of physical security systems. The challenge is that IT will already have an existing relationship with their own IT solution providers, to whom they may naturally turn to help them with their physical security requirements. It is imperative, therefore, that the physical security provider of today becomes well versed in not only cybersecurity principles but is also able to speak the language of IT in order to successfully compete. The challenge is that IT will already have an existing relationship with their own IT solution providers Establishing partnerships One approach, given the nature of the shifting security landscape, is for IT and physical security vendors to unite in the delivery of a mutually beneficial and overarching solution. This would enable them to pull together their combined expertise to not only offer comprehensive protection of software and systems from a cybersecurity standpoint, but also take care of access control, perimeter protection, surveillance and all aspects of physical security too. For the IT manager, confident about the security of their cloud provision and committed to optimising physical security within their business, the bringing together of physical and cybersecurity solutions, provided by IT and physical security providers who speak the same language, can only be beneficial, enabling them to meet all of their security requirements. As the threat, both cyber and physical, continues to evolve, vendor partnerships and a joined up strategic approach could well prove to be the best line of defense for today’s businesses.
HID Global is introducing a new “flagship” line of access control readers as successors to the iCLASS line. The new HID Signo readers will support 15 different credentialing formats and communicate using the latest NFC (near field communication), BLE (Bluetooth Low Energy) and OSDP (Open Supervised Device Protocol) standards. HID Global says the new readers will simplify integration to more secure and mobile credentials. HID Global has invested in a “future-proof” approach that both accommodates a variety of current market needs and can adapt to embrace new technologies as they come onto the market. The new line incorporates “all the hardware you need,” combining the capabilities of older generations of readers into a single product. Simplifying the choice of readers The new reader line seeks to simplify the choice of readers in a time when a variety of trends is complicating the access control market, from cloud systems to mobile access to identity management. “We are simplifying the way we bring our products to market, and baking it all into our readers,” says Harm Radstaak, HID Global Vice President and Managing Director. “If an installer takes a reader out of the box and mounts it on the wall, it just works.” We are simplifying the way we bring our products to market" In designing the product, HID sought feedback from channel partners, installers, consultants and end users on how the new readers would function. In addition, the company sought advice from architects on the design of the product. Aesthetics and industrial design elements were a priority because they ideally reflect the quality and “promise” of how the product will perform. Cybersecurity Cybersecurity is another emphasis. The readers store cryptographic keys and process cryptographic operations on certified EAL6+ secure element hardware, and custom authentication keys can be used for organisations who prefer that level of control. EAL6+ certification is a designation of the Evaluation Assurance Level of an IT product or system (the highest score is EAL7). Signo also includes a velocity checking feature designed to mitigate and thwart brute force attacks. “The new Signo line is a continuation of the journey we have been on,” says Radstaak. “It is the natural succession of what we have been doing for years, and it underlines our position in the market.” By natively supporting mobile credentials, the new product line reinforces HID’s commitment to mobile systems, which the company first brought to market in 2014. Signo readers also include Enhanced Contactless polling to support mobile credentials in Apple Wallet. Addressing standards Embracing the OSDP standard, which was created in 2008, also addresses the growing customer need for bi-directional, secure communications. There is built-in support for OSDP Secure Channel as well as legacy Wiegand communication for organisations seeking to transition. Signo incorporates support for most credential technologies globally, including Seos, credentials with HID’s Secure Identity Object, and a variety of 125kHz legacy technologies such as Indala and Prox. The flexibility and openness of Signo is a response to the acceleration of new technologies entering the access control market. “If you look at new technologies in general, our market has been slow in adopting them,” says Radstaak. “However, with new entrants in the market, new technologies, new device manufacturers and artificial intelligence (AI), I believe the market is adopting new technologies much faster than before. Users are much savvier.” The consumer Administrators will be able to remotely configure and diagnose readers Radstaak says he expects market adoption of the new readers will be fast. “Customers have been waiting for this platform,” he says. “This has been a tremendous investment for HID Global, and it underlines our position in the market with its open platform, simplicity and future-proofing. We are prepared for whatever comes next technology-wise.” With Signo readers, administrators will be able to remotely configure and diagnose readers as well as monitor status through a centrally managed and connected reader ecosystem. As a member of the FiRA Consortium, HID Global has advocated bringing new technology to market based on the “fine ranging” capabilities of ultra-wideband (UWB) technology, which has applications in detection of the precise location or presence of a connected device or object. It’s the kind of technology that Signo platform’s “future-proofing” approach is geared to accommodate. “As the capability unfolds, we will be there to adapt,” says Radstaak.
The U.S. Department of Homeland Security (DHS) will be participating at ISC West in a big way. Representatives of the federal department will be taking part in more education sessions this year, and the DHS tech-scouting team will be on hand to view the latest technologies on display at the show. Exhibitors – and anyone else at the show – are invited to the “DHS Town Hall” on March 19 (Thursday) at 3:30 p.m. in meeting room Galileo 1001. The aim is for DHS to engage with the technology community and provide guidance as industry innovation moves forward. In the face of growing operational demands and complex threats, the need for homeland security technology solutions continues to rise. The Department of Homeland (DHS) is seeking new ideas and partners to safeguard public trust, save lives, reduce risks, and protect the flow of commerce and goods for the community. They will share information about the department’s problem sets, capability needs and business opportunities for accelerating technology development to ensure they are keeping pace with the speed of innovation and complex threats. Speaking at ISC West DHS seeks to challenge industry partners to develop technology to enhance security operations across multiple end user missions. The DHS Science and Technology Directorate (S&T) and Cybersecurity and Infrastructure Security Agency (CISA) will jointly speak and exhibit at ISC West. Attendees can meet DHS professionals working in cyber security, critical infrastructure, resilience, aviation security, border and port operations, and first responder capabilities. Attendees are invited to visit the DHS exhibit booth #33040 in the Drones and Robotics Zone. The DHS Town Hall on Thursday, titled “Enhancing Security and Doing Business at the Speed of Life,” will be a “call to action” for show participants to help secure the future. DHS seeks to become more agile and to pursue new pathways to do business in a fast-moving world. Through strategic partnerships, DHS is mobilising the innovation community to safeguard the public trust. Security sessions DHS will also be participating in these sessions at ISC West, March 17-20 at the Sands Expo, Las Vegas, Nev: You Say It’s Going to Change the World? Tues., March 17, 9:45 a.m., Sands 302. Security relies on anticipating what comes next and staying a step ahead. How will 5G increase secure capabilities and reduce threats from bad actors? How will blockchain secure personal and financial identity and when will quantum computing render all encryption obsolete? How is DHS investing in counter-drones? How does AI change the security landscape? The New Federal Security Landscape – Are You Prepared? Wed., March 18, 1 p.m., Sands 302. The federal security landscape is evolving alongside the private sector. What are the new high-risk areas of concern and how are emerging threats (cyber, UAS) changing the way federal facilities are protected? How are these new risks balanced against traditional ones? How is the Interagency Security Committee (ISC) responding? DHS panelists will discuss. CISA Special Guest Speaker at SIA Interopfest. Wed., March 18, 4 p.m., Sands 701. Daryle Hernandez, Chief, Interagency Security Committee, DHS, Infrastructure Security Division, will provide insights to complement the technology interoperability demonstrations. Enhancing Security Through UAS Technology, A DHS Perspective. Thurs., March 19, 11:30 a.m., Venetian Ballroom. What is DHS doing today to prepare for a future of increased visualisation and automation? New questions are emerging around capabilities and vulnerabilities. Emerging technologies like AR, Next Gen Sensors, and UAS, provide the Department of Homeland Security (DHS) with tools to become more responsive and adaptive to new threats.
ISC West is being affected only minimally by the COVID-19 coronavirus, which is having an impact on international business travel, specifically to and from China. One consequence of coronavirus travel restrictions is a decision by Reed Exhibitions International not to proceed with a dedicated pavilion for Chinese companies at ISC West, March 17-20. In the main hall, however, some Chinese companies will remain in the show and staff their exhibit booths with U.S. office personnel and resources. Importantly, the ISC West event is moving forward as planned. Several trade show organisers globally have cancelled events because of fears of spreading the disease. For example, the Mobile World Congress in Barcelona was cancelled at the end of February. “Our clear focus is on the health and safety for our entire ISC community, and empathy and compassion for our Chinese customers relative to personal health and safety, and the very challenging business predicament for these companies,” says Will Wise, Group Vice President, Security & Gaming Portfolio, Reed Exhibitions. Minimal Impact Our clear focus is on the health and safety for our entire ISC community, and empathy and compassion for our Chinese customersThe ISC West team and Reed Exhibitions International colleagues in China have been working diligently to assess the status of all ISC West exhibitors from China, given the travel restriction, says Wise. Among show attendees, Chinese travel restrictions will have a negligible impact. In past years, only a tiny fraction of attendees traveled to Las Vegas from China for the show. Immediate action by the U.S. government as soon as the world became aware of the COVID-19 coronavirus has enabled a controlled business and health and safety dynamic that will allow the show to proceed as planned. The U.S. took quick action to put major travel restrictions in place, including no incoming flights/travel from China. “The status is ever-evolving and we’ll be keeping the expo floor plan updated,” says Wise. The China pavilion In previous years, the China pavilion had hosted 50 or more companies as part of what was formerly known as “Global Expo,” located in the Venetian Ballroom adjacent to the Sands Convention Center. In 2019, the slate of companies in the Venetian Ballroom expanded to include some domestic exhibitors as well as the international companies. Importantly, the ISC West event is moving forward as plannedThis year, Venetian Ballroom exhibits will continue without the participation of Chinese companies. There will be international exhibitors from countries outside China as well as some domestic companies, including the Emerging Technology Zone, where new startups will highlight their latest innovations. The Security Industry Association (SIA) New Product Showcase will also be featured in the Venetian Ballroom, as well as a VIP international lounge. Additionally, a new pavilion highlighting Loss Prevention and Supply Chain companies will be featured, and there will be an educational theatre offering free sessions on topics such as drones and robotics. Reed Exhibitions strongly urges exhibitors and visitors to refer to the guidelines and protocols as suggested by the World Health Organization and local/national public health authorities to contain and mitigate against any further spread of the virus. Suggested precautions include frequent hand washing (including alcohol-based hand rubs) and maintaining a three-foot distance between oneself and other people, particularly those who are coughing, sneezing and have a fever.
Each of Denmark’s 550 individual Free Schools shares a common ethos: parents and students participate together in activities outside school hours, including weekends. It’s excellent for building a school community. Not so easy for managing security, when issuing and tracking keys becomes a 7-day task every week. The Vejle Friskole turned to SMARTair® wireless access control for a solution. Previously, key management ate up “a very long time, approximately 5 hours a week,” explains Henrik Kækel, Technical Service Officer at Vejle Friskole. Individual access permissions Vejle Friskole’s mechanical keys have been replaced by a SMARTair access control system Secure wireless electronic locks, already proven in schools across Europe, were the answer. Vejle Friskole’s mechanical keys have been replaced by a SMARTair® access control system. Over 80 doors and cabinets around the school are secured with SMARTair® wireless devices. Even at a historic property like Vejle Friskole, battery-powered SMARTair® devices are easy and unobtrusive to retrofit. Now approximately 250 students, teachers and parents each carry their own key fob, programmed with individual access permissions. Because the SMARTair® system portfolio has locking devices tailored to different kinds of openings, everyone at the Friskole opens the right doors and cabinets with a single fob. There’s no more need for the school to distribute separate keys for student or staff lockers, for example. Issuing fobs “It was really bad because we had big problems with keys that were lost,” says Henrik Kækel. “There was a lot of work in key administration.” SMARTair® is easy for the school to manage. Today, Vejle Friskole staff spend around 5 minutes a week managing their access system. It's incredibly easy to figure out... it takes 1 minute to code a student" “It's incredibly easy to figure out... it takes 1 minute to code a student,” he adds. Even managing the leasing of school buildings for non-school events is simple and secure. School facilities staff issue fobs for the duration of the event, then cancel them immediately afterwards – with no concerns someone may have copied a physical key. Saving staff time In addition to making everyday life easier and saving staff time and admin costs, SMARTair® has increased security. Using the intuitive SMARTair® software, they always have an overview of who has been at the school, and when. Audit trails are generated and monitored in real time using their SMARTair® system. And it's no disaster if a credential gets lost. Henrik adds: “Then we cancel the credential and issue a new one.” Vejle Friskole’s SMARTair® system is easy, fast and cost-effective to extend to new doors, cabinets and users — at the beginning of a new school year, or any time they choose. To learn more about how SMARTair® can make your school safer — and save you time and expense — visit https://campaigns.assaabloyopeningsolutions.eu/smartair-schools
Prama Hikvision partnered with the Sanjivani Group of Institutes to offer latest surveillance and security solutions. For the first time that Artificial Intelligence was offered, and enabled face recognition terminals in India’s education sector. Sanjivani Group of Institutes situated at Kopargaon, Ahmednagar is a premier institute for Engineering, Pharmacy, Nursing and Diploma in Ahmednagar District. Sanjivani took its names and inspiration from the famous epic of Ramayana where ‘Sanjivani buty’ was brought for revival of life. The Sanjivani Rural Education Society (SRES), was established by Honorable Shri. Shankarrao Genuji Kolhe in 1983, at Kopargaon, rural domain in Ahmednagar district of Maharashtra, India. Identify unauthorised person The entire campus of the Sanjivani Group of Institutes is spread out in more than 100 acres land As the educational scenario changed with time, SRES understood the need and added a number of courses under the umbrella of the Sanjivani Rural Education Society (SRES) and consequently it gave birth of the Sanjivani College of Pharmaceutical Education and Research, Sanjivani Senior and Junior College, Sanjivani Academy, a CBSE school and Sanjivani International school. The entire campus of the Sanjivani Group of Institutes is spread out in more than 100 acres land. There are different departments in various buildings, playgrounds, hostels and staff quarters. Due to vast area and huge numbers of students, it’s very difficult for management to identify unauthorised person inside the campus. In the past, many instances of bullying, robbery, theft, ragging and pick-pocketing were reported. Up-to-date surveillance solution With the expansion of the Sanjivani Group, there were many challenges faced by students and staff in terms of safety and security. “Consequently, we took our first step towards it by installing Hikvision IP CCTV surveillance in all our campus areas for monitoring. The clarity and the quality of the camera is appreciable and satisfying,” said Amit N Kolhe, Managing Trustee, Sanjivani Rural Education Society (SRES). He further added, “Presently the security technology has changed a lot. While understanding the need of safety and security of the students, we decided to go for an up-to-date surveillance solution. We contacted Prama Hikvision team and their system integration partner Om Agency for an advanced solution. After understanding our requirements, they introduced some of the latest technologies related to security surveillance.” Facial recognition devices The same software can be used by seamless integration for time attendance, access control and surveillance" He further elaborated, “After this we finalised the key areas by conducting the security survey in the campus. We got many advanced solutions implemented with help of SI partner and Prama Hikvision team. The solutions included, ANPR cameras for number plate recognition of cars and bikes at entry and exit gates, facial recognition devices for time attendance and access control of students & staff members.” “The advantage of Hikvision security and surveillance products is that things can be monitored through a single software platform, i.e. IVMS 5200E, which comes as all in one software. The same software can be used by seamless integration for time attendance, access control and surveillance,” concluded Amit N. Kolhe. Access control systems By visiting Sanjivani Group of Institutes along with System Integration Partner Om agency, the following solutions based on the latest technology and products were adopted: Automatic Number Plate Recognition (ANPR) cameras Tripod turnstile integrated with face recognition panels HD IP cameras A broadcasting solution for the seminar rooms Face recognition based access control systems Hikvision solutions delivered results: ANPR Cameras helped the institute to identify unauthorised vehicles at entry gates, through which they stopped many outsiders in getting entry into campus area. Face recognition panels and access control panels helped institute in getting entry and exit record of students as well as visitors. Through the large number of cameras installed at various locations, the management is able to keep an eye on the entire campus. One-stop solution We are proud to execute this project with support of Prama Hikvision" “Implementing IP Surveillance project for Sanjivani Group of Institutes, Kopargaon was a great learning experience. We have built a strong relationship with Prama Hikvision over the past 10 years. They work with vendor partners to deliver solutions that suit the requirements. The efficient professionals and quality of service is appreciated.” said Mr. Hemant Rokade – Director Sales, OM Agency. “We are proud to execute this project with support of Prama Hikvision. It was a huge challenge to execute the project of such gigantic proportions. While implementing the project, Prama Hikvision helped us through the project at every step. We appreciate the level of details and accountability, which Prama Hikvision has demonstrated in this project. This reaffirms our faith that Hikvision is the one stop solution for all security and surveillance solutions,” said Mr. Pravin Rokade – Director Operations, OM Agency.
Access control has become a central component for the safety and security strategies of today's schools, and due to the complicated threats and challenges these facilities face, a school's access control technology must be innovative and intelligent enough to ensure comprehensive protection. The education sector is a gateway to the future for young people all over the world. But to assure this passage, schools must guarantee their students safety as well as their education. One such example of Vanderbilt solutions at work in the education sector is at a Study Abroad University in London that hosts students from the USA. Enabling campus security Live and recorded footage can be viewed remotely, and footage can be used in evidence The university wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. Vanderbilt’s ACT365 keeps audit trails of who is in the student accommodation by monitoring and recording fob activity. Additionally, the system produces diagnostic reports on door status and can investigate situations such as door forced, door ajar and break glass activation either locally or remotely. If an incident arises in the student accommodation, ACT365 can link events at doors through video footage so campus security can quickly identify and react. Live and recorded footage can be viewed remotely, and footage can be used in evidence. Real-time list In further protecting students’ safety, campus security can provide pin codes, access fobs, and cards to students. These credentials can be remotely enabled or disabled if required. This can be managed on desktops, laptops tablet, or smartphone device. In the event of a fire or other emergency, ACT365 automatically unlocks all doors allowing students to reach safety. The ACT365 muster report gives security campus a real-time list of all students in the campus The ACT365 muster report gives security campus a real-time list of all students in the campus accommodation building. When students exit their accommodation and swipe out, the muster report automatically updates. If someone is missing, campus security can check cameras and call them directly by clicking on their name in the dashboard. Safeguarding foundations Security in education is a crucial issue. It requires thoughtful attention and procedure while allowing room for agility, adaptability, and dependability moving forward – flagship traits of the Vanderbilt brand. Students want to attain a higher education in a safe and secure environment while enjoying their first step into varied careers. Vanderbilt’s solutions respond to these expectations and enable active safeguarding foundations to be laid.
When a leading English university sought electronic locks for its newest student accommodation block, it turned to Aperio to extend its installed Gallagher Command Centre access control system. The University of East Anglia (UEA) has relied on Gallagher access control for a decade. To extend their Gallagher Command Centre system to Crome Court—a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates—they needed the right wireless solution. Wireless locking technology Aperio wireless locks are battery powered, and so use much less energyUEA’s needs included more than just security, stylish component design and affordability. Crome Court was specifically designed to minimise environmental impact, including CO2 emissions. Any access control system was expected to contribute to that goal. The university chose Aperio wireless locking technology from ASSA ABLOY. Aperio wireless locks are battery powered, and so use much less energy than wired magnetic security locks. They only “wake up” when a credential is presented to the reader. On campus training “We decided to offer Aperio to upgrade and extend our system at UEA because of its outstanding reputation within the security industry,” explains Jason Boyce, sales manager at Gallagher. “Having worked with us for 6 years, Gallagher knew we would deliver,” adds David Hodgkiss, national sales manager at ASSA ABLOY UK. Installation was quick and easy, aided by training delivered on campus by specialist ASSA ABLOY technicians. “We found ASSA ABLOY’s service faultless,” says Wayne Dyble, installation and support manager at Check Your Security, UEA’s service provider. Environmentally advanced profile There’s no need for expensive and time-consuming work changing the locks Crome Court’s secure doors are fitted with Aperio E100 online escutcheons. Students open them with programmable RFID smart cards, instead of cumbersome mechanical keys. If a keycard is lost, it is straightforward for UEA facilities staff to cancel it and issue a replacement—using a simple web-based interface or mobile phone. There’s no need for expensive and time-consuming work changing the locks. UEA also aimed to build Crome Court with an environmentally advanced profile. Here, too, Aperio delivered. Wireless locks are battery-operated and emit much less CO2 than wired magnetic locks. In fact, in carbon terms, Aperio locks emit 0.16 percent of the total emissions produced by standard wired locks. Flexibility is another Aperio asset: additional doors can be brought into the same integrated Gallagher system whenever needed. “We hope to roll out Aperio across all new and existing residential estate,” says Christine Beveridge, head of campus services at UEA.
The University of Birmingham educates over 30,000 students, with more than 6,000 doors providing access to student accommodation. Gallagher’s integrated access control solution is responsible for providing operational continuity and creating a safe and secure environment for students. Access management system The University recently completed its new state-of-the-art student accommodation development, Chamberlain, which consists of a 19-storey tower and three low-rise blocks. An essential requirement was an integrated access control system, reducing the need for keys. Timothy Owen, General Manager of Student Accommodation at the University says, “We wanted to move away from using keys as students are prone to losing them and trying to manage thousands of locks and associated keys was a constant administration and financial drain.” We need to maintain control over access to our buildings, while ensuring a duty of care to our residents and staff" In order to minimise the complexity of managing a new system, the University required a solution that integrated with, or was an extension of, their existing campus access control and accommodation management systems. “We need to maintain control over access to our buildings, while ensuring a duty of care to our residents and staff so that they can go about their business as required,” says Timothy. “Fundamentally, we needed a system that gives both us and our resident’s confidence in the security of the accommodation.” Adaptable access solutions A large and complex estate with buildings of different construction and age, the University needed a solution that was flexible enough to accommodate their unique requirements. Gallagher Command Centre, together with the Aperio® wireless locking technology by ASSA ABLOY Access Control, was selected as the University’s preferred choice, meeting their security needs in a cost-effective way while still delivering to the overall specification. Timothy says, “The completion of our new state of the art Chamberlain development was extremely close to the date of the first student arrival, so the team had to be dedicated and work flexibly to ensure it was ready in time – which it was.” Improved student experience The Gallagher Command Centre integration allows for the access key and student ID to be combined in to one card, offering a number of benefits to both students and staff. The student ID and accommodation key is encoded on to one card, so it can be posted out in advance and access to the room automatically granted" Previously the accommodation arrival process required students to arrive at the University with their contracts and queue up so that a member of staff could sign them in manually and hand them the keys to their accommodation. From there students could head to their room. “Arrivals is always a busy time but with the help of the Gallagher solution we’ve not only improved the student experience but also the administration process,” says Timothy. “Now the student ID and accommodation key is encoded on to one card, so it can be posted out in advance and access to the room automatically granted via the accommodation management system. Students no longer need to queue for keys, can get to their rooms instantly, and spend more time enjoying their arrival experience.” Monitoring access cards The simple act of swiping an access card automatically checks the student in and a report can be generated to show who has arrived and who hasn’t, allowing staff to follow up accordingly. If the room is no longer required it can be quickly and easily re-allocated to another student, resulting in improved occupancy rates. Using Gallagher Command Centre together with the University’s accommodation management system allows staff to check on the well-being of students by monitoring the use of their access card. The University also houses students under the age of 18, and one of the safeguarding requirements is that the University can monitor their whereabouts on a daily basis. Timothy adds, “This can be difficult to achieve with many students to track, but Gallagher Command Centre can easily confirm the time and location of our resident’s last door access, providing peace of mind that students who may be uncontactable are in fact on site.” Replacing keys with a combined access and student ID card has reduced our operational costs" Creating business value University staff are also seeing positive improvements since the installation of the new system – particularly at the start of the year. The arrivals process is now less congested and more relaxed. The team have far fewer issues than with physical keys, enabling them to spend more time on the overall student experience. Since the installation of the first 800 bedrooms at Chamberlain, the University has already extended the system by a further 900 at Mason, with plans in place for an additional 1500 bedrooms this summer. Enduring partnerships “Replacing keys with a combined access and student ID card has reduced our operational costs as we now have far fewer keys to purchase and store,” explains Timothy. “The student experience has improved, and staff are now free to deal with urgent matters and offer a more personal service. We can easily create reports to help us audit access and have generally provided a much more modern and secure place to live and work.” “The University has worked with 2020 Vision Systems for some time on CCTV and access control systems, so when they won the tender to provide and install the Gallagher and Aperio® systems we had every confidence that they would be able to deliver. The completion of our new state of the art Chamberlain development was extremely close to the date of the first student occupation and so the team had to be dedicated and work flexibly to ensure it was ready in time – which it was.”
Headquartered in a designated facility, the Compton Unified School District (USD) Police Department is committed to providing a safe and secure educational environment for students, staff, and parents. It strives to prevent criminal or delinquent behaviour that has a negative impact on the educational process within the schools and community. Located in a suburban Los Angeles community with a high crime rate, Compton USD is among the 75 percent of schools that have adopted video surveillance solutions, an important tool for ensuring safety on school grounds. Schools facing challenges, such as violence or vandalism on campus, find security cameras an indispensable aid to identifying and resolving issues as they arise. Benitez designed a customised Dahua Technology security system that monitors the premises from the outside perimeter facing inward IP surveillance infrastructure The jungle of outdated and damaged cabling from a defunct analogue video surveillance system that hangs from buildings throughout the grounds serve as a reminder of both the budgetary and technology challenges once facing the Compton USD Police Department. Mario Benitez, an Authorized Dahua Dealer for Advanced Alarm in Santa Fe Springs, California began to explore building an IP surveillance infrastructure that would span the long-distance 2.5-acre grounds without the need for trenching cables. This area houses the Compton USD Police Department buildings, police vehicles, evidence sheds, and other municipal structures. Benitez sought an economical yet scalable solution that would eventually allow officers to remotely monitor video feed directly from Compton school campuses, adding another layer of security to the department’s functionality. Customised security system Compton USD Police Department officials chose to work with Benitez, who approached the project with an innovative solution: incorporating the newest ideas and the most up-to-date surveillance systems available. Benitez designed a customised Dahua Technology security system that monitors the premises from the outside perimeter facing inward, a configuration that provides better views of the four buildings, three gates, and grounds of the Command Center. The Dahua IP cameras and NVR proved to be beneficial because they don’t require physical cabling to connect Partnering with Dahua sales and engineering staff, Benitez deployed a total Dahua solution that included 20 Pro Series 4MP WDR fixed lens Wi-Fi cameras, a 32-channel NVR, three smart switches, one surveillance management centre, two 2.4 and 5.6GHz indoor access points, and four 5.6GHz wireless video transmission devices to create a locked wireless connection. The first unit wirelessly connects six to eight IP cameras on the remote end. The second unit is connected to the NVR network and transmits a signal from the remote cameras. The bridge requires an unobstructed line of sight to create the link. The Dahua IP cameras and NVR proved to be beneficial because they offer a flexible solution that doesn’t require physical cabling to connect. Mapping of project The project required months of planning, a process that involved mapping the project on paper, strategic alignment of networked devices, an audit to ensure operability, and final integration and deployment. “This is one of those projects where the heavy lifting comes in the planning stages. It was a complex project, but the Dahua team was very knowledgeable and helped us put together a powerful solution,” said Benitez. “So, when it came time for the installation it was fast and everything went smoothly.” With strategic placement, the video surveillance cameras can capture both the perimeter and interior of the Compton USD Police Station grounds The plan included leveraging a motor on the back gate of the property to access a 110-volt circuit for power to send a signal across a wireless bridge. With strategic placement of cameras elevated on support poles, the video surveillance cameras can capture both the perimeter and interior of the Compton USD Police Station grounds. The NVR is housed in a rack within the police station command centre, allowing officers to closely monitor the grounds, buildings, and vehicles at a glance to safeguard the facility and its assets. “I was determined to use only Dahua products for this project. They worked with me to deliver a unique, customised solution,” said Benitez. Networked video surveillance solution With the addition of a networked video surveillance solution, the Compton USD Police Department gained a valuable resource for long-term success by implementing a scalable system that meets both immediate security needs and provides for future improvements. The collaboration between Advanced Alarm Inc. and Dahua Technology USA to deploy a top-of-the-line and easy-to-use system resulted in a creative solution that will continue to offer ROI and protect both people and property. “Dahua cares about the installer. They design software with practical functions that are easy to demonstrate, easy to operate, and easy for my customers to understand,” said Benitez. “And that makes my life easier.” Benitez was able to bridge the camera across long distances, delivering seamless connectivity Revolutionary new protocol Benitez worked closely with Dahua sales and engineering representatives to identify solutions that reinforced his problem-solving skills to design and deploy an innovative networked solution. He established a revolutionary new protocol for designing a video surveillance system with camera placement on the outside perimeter facing inward—a model that is gaining popularity with his customers, setting him apart, and increasing demand for his services. In addition, he was able to bridge the camera across long distances using wireless access points and smart switches to deliver seamless connectivity. “After 25 years in the business, I can finally say I’ve found a brand I like,” he said. “Now I only use Dahua products. They’re very user-friendly and work right out of the box.”
Round table discussion
Video is widely embraced as an essential element of physical security systems. However, surveillance footage is often recorded without sound, even though many cameras are capable of capturing audio as well as video. Beyond the capabilities of cameras, there is a range of other audio products on the market that can improve system performance and/or expand capabilities (e.g., gunshot detection.) We asked this week’s Expert Panel Roundtable: How does audio enhance the performance of security and/or video systems?
When a fire or other emergency occurs in a building or facility, first responders depend on every available resource to ensure a safe and orderly evacuation and response. One element in any response plan is the facility’s physical security systems, including access control, video surveillance and intrusion detection. How can these systems contribute to an orderly response to a chaotic situation? We asked this week’s Expert Panel Roundtable: What is the role of security systems in the event of a fire or other emergency evacuation?
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
Reducing the cost of video surveillance system deployment and operationDownload
RFID and smartphone readers in physical access controlDownload
Access control & intelligent vehicle screeningDownload
Genetec to host its first virtual tradeshow Connect’DX 2020 to connect with physical security professionals