Education security applications
An initial investment of $100 million launched the first American public university campus in Mexico: Arkansas State University Campus Queretaro (ASUCQ). Within five years of its 2017 opening, around 7,500 staff and students are expected to use the site, including campus accommodation for up to 1,500 students. To accompany such a high-profile development, the university needed security and access control systems with a trusted and proven track record protecting staff, students and other univers...
Founded in 1871, Fulton County School System is the fourth largest school district in Georgia, United States. It consists of 101 schools and administrative support buildings, including 67 elementary schools, 19 middle schools, 17 high schools and eight charter organisations. Fulton’s mission is to provide a safe and secure environment for its more than 96,000 students and more than 12,000 full-time employees. To help enhance safety Search Technology at more than 100 schools, Fulton has in...
Headquartered in a designated facility, the Compton Unified School District (USD) Police Department is committed to providing a safe and secure educational environment for students, staff, and parents. It strives to prevent criminal or delinquent behaviour that has a negative impact on the educational process within the schools and community. Located in a suburban Los Angeles community with a high crime rate, Compton USD is among the 75 percent of schools that have adopted video surveillance so...
VMS software and IP products from Hikvision, a supplier of innovative video surveillance products and solutions, are now being used by the Government of Gujarat Directorate of Technical Education (DTE), to protect and administer education facilities and services across Western India. A government organisation that provides qualitative and higher level technical training for students from a diverse mix of financial and social backgrounds, the Directorate of Technical Education’s (DTE) goal...
The Monterey Bay Aquarium has a rich history of innovation. Since its founding in 1984, the facility has become one of the world’s leading public aquariums and ocean conservation organisations. Monterey Bay Aquarium has produced significant insights into the life history of sharks, sea otters, and bluefin tuna. The aquarium also was the first to exhibit a living kelp forest, and in 2004 it was the first to successfully exhibit and return to the wild a young great white...
The Vienna University of Economics and Business (WU) was founded in 1898 by the k. k. Ministerium für Cultus und Unterricht as the "k. k. Exportakademie". At that time, tuition was being given in the following relatively modern fields: Foreign languages, economics, business affairs, economic geography, public law, private law and consumer affairs. Relocation to Vienna Due to steadily increasing numbers of students, the WU had to relocate to various sites in Vienna several times in it...
I have been thinking a lot about the U.S. government’s ban on video surveillance technologies by Hikvision and Dahua. In general, I question the wisdom and logic of the ban and am frankly puzzled as to how it came to be. Allow me to elaborate. Chinese camera manufacturers Reality check: the government ban is based on concerns about the potential misuse of cameras, not actual misuse. Before the government ban, you occasionally heard about some government entities deciding not to use cameras manufactured by Chinese companies, although the reasons were mostly “in an abundance of caution.” Even so, I find the targeting of two Chinese companies – three if you count Hytera Communications, a mobile radio manufacturer – in a huge government military spending bill to be a little puzzling. I can’t quite picture how these specific companies got on Congress’s radar. The government ban is based on concerns about the potential misuse of cameras, not actual misuse What level of lobbying or backroom dealing was involved in getting the ban introduced (by a Missouri congresswoman) into the House version of the bill? And after the ban was left out of the Senate version, was there a new wave of discussions to ensure it was included in the joint House-Senate version (with some minor changes, and who negotiated those?). It all seems a little random. Concerns for the U.S. Furthermore, the U.S. ban solves neither of the two main concerns that are generally used as its justification: Concern: Cybersecurity. The U.S. ban “solves” the issue of cybersecurity only if both of the following statements are true. No security system that uses a Hikvision or Dahua camera or other component is cybersecure. Any system that does not use a Hikvision or Dahua camera or other component is cybersecure. What level of lobbying or backroom dealing was involved in getting the ban introduced into the House version of the bill? The ban ignores the breadth and complexity of cybersecurity and instead offers up two companies as scapegoats. Our industry has sought to address cybersecurity, and the one principle that has guided that effort is that cybersecurity is an issue that must be addressed by manufacturers, consultants, integrators and end users – in effect, everyone in the industry. Cybersecurity does not begin and end with the manufacturer and banning any manufacturers from the market does not ensure better cybersecurity. Concern: “Untrustworthy” Chinese companies. Hikvision and Dahua are only two Chinese companies. Any response to concerns about whether Chinese companies are trustworthy would need to cover many more companies that manufacture their products in China. Australian TV recently claimed that “all Chinese companies pose a risk. Because of Chinese laws, there is a requirement for companies to be engaged in espionage on behalf of the state.” Even if one embraces that extreme view, the logic fails when only two companies are targeted. One source told me that 60 to 65 percent of the global supply of commercial video cameras are manufactured in China, so it’s a much bigger issue than two companies.The Chinese government has much more effective ways of conducting espionage than exploiting security cameras And is U.S. security at risk unless or until it is cut off from more than half of the world’s supply of video cameras? Even Western camera companies manufacture some of their cameras and/or components in China. Why name only two (or three) companies, only one of which has ties to the Chinese government? If the goal of the U.S. ban was to address the possibility of cybersecurity and/or espionage by the Chinese government, shouldn’t there be other companies and product categories included? Clearly, video surveillance is not the only category that has the potential for abuse. The Chinese government has much more effective ways of conducting espionage than exploiting security cameras. Global response to U.S. ban And now that the U.S. ban has been passed, how is the ban being misused to justify a new level of alarm about Chinese companies? Australian television effortlessly made the leap from “software backdoors” to a concerted and organised effort by the Chinese government to use cameras to be the “number one country for espionage.” And it’s not just about government facilities: “Even on the street, [cameras] have the potential to inadvertently contribute toward Chinese espionage activity by providing real-time information about the situation on the ground,” says the Australian TV report. If all Chinese companies pose a risk, why is the U.S. government targeting specific companies rather than all Chinese companies? If all Chinese companies pose a risk, why is the U.S. government targeting specific companies rather than all Chinese companies, or at least those with electronics or computer products that could be used for espionage? What about the espionage potential of the 70% of mobile phones that are made in China? What about other consumer electronics such as PCs or smart TVs? How many government facilities that are eliminating Dahua and Hikvision cameras have employees who use iPhones or use other electronic equipment from China? Artificial intelligence & IP-over-coax Also, consider the impact of the ban on business. Hikvision and Dahua have had many successes in the video surveillance market, including in the U.S. market. They have added value to many integrators and end user customers. They have been on the forefront of important trends such as artificial intelligence and IP-over-coax. And, yes, they have made technologies available at lower prices.Cybersecurity issues have plagued several companies in the industry, not just Hikvision and Dahua Cybersecurity issues have plagued several companies in the industry, not just these two, and both Hikvision and Dahua have worked to fix past problems, and to raise awareness of cybersecurity concerns in general. Is a U.S. ban on two companies an appropriate response to a series of geo-political concerns that are much bigger than those two companies (and bigger than our entire market)? Should two companies take the brunt of the anti-Chinese backlash? Video surveillance cameras Is the video surveillance market as a whole better or worse for the presence of Hikvision and Dahua? Is it up to the U.S. government to make that call? In some ways, thoughts of Chinese espionage are a sign of these uncertain political times. Fear of video surveillance is perfectly congruent with long-standing anxieties about “Big Brother;” suspicion about China taking over our video cameras just rings true at a time when Russia is (supposedly) controlling our elections. But should two companies be targeted while broader concerns are shrugged off?
Governments and corporations face crisis events every day. An active shooter terrorises a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective response plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyse. Assessing threats for prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualise all this intelligence data within the context of an organisation’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social media monitoring Free tools like Google Maps or satellite imagery from organisations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis.Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organisations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating a threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualised on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organisations or communities they are protecting Acting and automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organisations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon security guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralised within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis of a threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate emergency response Virtually every organisation has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyse. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimise the impact by improving visibility, collaboration and response.
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organisations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?
In 1973, a brilliant economist named E.F. Schumacher wrote a seminal book titled ‘Small Is Beautiful:’ taking an opposing stance to the emergence of globalisation and “bigger is better” industrialism. He described the advantages of smaller companies and smaller scales of production, highlighting the benefits of building our economies around the needs of communities, not corporations. In almost every industry or market that exists in the world today, you're likely to find a difference in size between companies. Whether it’s a global retail chain versus a small family-owned store, a corporate restaurant chain versus a mom-and-pop diner or a small bed and breakfast versus a large hotel chain — each side of the coin presents unique characteristics and advantages in a number of areas. Disparity in physical security industry Customers are drawn to products and services from large enterprises as the big names typically imply stability This disparity very clearly exists in the physical security industry, and differences in the sizes of product manufacturers and service providers could have important implications for the quality and type of the products and services offered. All too often, customers are drawn to products and services from large enterprises, as the big names typically imply stability, extensive product offerings and global reach. And that's not to say that these considerations are unwarranted; one could argue that larger companies have more resources for product development and likely possess the combined expertise and experience to provide a wide range of products and services. But the value that a company’s products and services can bring isn’t necessarily directly related to or dependent on its size. In an age where the common wisdom is to scale up to be more efficient and profitable, it’s interesting to pause and think about some of the possible advantages of small- and medium-sized businesses (SMBs). Typically, “small” companies are defined as those with less than 100 employees and “medium” with less than 500. Providing social mobility Schumacher argued that smaller companies are important engines of economic growth. Indeed, according to the Organisation for Economic Cooperation and Development (OECD), a group of 36 member countries that promotes policies for economic and social well-being, SMBs account for 60 to 70 percent of jobs in most OECD countries. Importantly, SMBs provide resilience in that there are often large economic and social impacts when big companies fail. Smaller companies are better for regional economies in general, as earnings stay more local compared to big businesses, which in turn generates additional economic activity. SMBs are also better at providing social mobility for disadvantaged groups by giving them opportunities and enabling them to realise their potential. Smaller companies are often more innovative, bringing to the market novel technologies and solutions such as Cloud, analytics, AI, and IoT New companies introduce new technologies There's no denying the role of start-ups when it comes to innovation. In the security industry, many new technologies (e.g. Cloud, analytics, AI, IoT) are first brought to the market by newer companies. In general, smaller companies’ products and services often have to be as good or better than others to be competitive in the marketplace. They are therefore often more innovative, bringing to the market novel technologies and solutions. And these companies are also more willing to try out other new B2B solutions, while larger companies tend to be more risk-averse. Customer service Aside from the quality of products and services, arguably one of the most important components of a security company’s success is its ability to interact with and provide customers the support that they deserve. Smaller companies are able to excel and stand out to their customers in a number of ways: Customer service. Customers’ perceptions of a product’s quality are influenced by the quality of support, and smaller manufacturers often possess a strong, motivated customer service team that can be relatively more responsive to customers of all sizes, not just the large ones. A superior level of support generally translates into high marks on customer satisfaction, since customers’ issues with products can be resolved promptly. Flexibility. SMBs have a greater capacity to detect and satisfy small market niches. While large companies generally create products and services for large markets, smaller companies deal more directly with their customers, enabling them to meet their needs and offer customised products and services. And this translates to adaptability, as SMBs become responsive to new market trends. By having a pulse on the market, smaller companies have much more flexibility in their supply chain and can adjust much faster in response to changing demand. Decision-making. Smaller companies are much more agile in decision-making, while larger enterprises often suffer from complex, tedious and lengthy decision-making processes. Communication is easier throughout SMBs, as smaller teams enable new ideas to flow and can solve problems faster. Job satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction. SMBs are also generally more connected to local communities and participation in community activities leads to a greater sense of purpose. Additionally, SMBs have a much smaller impact on the environment, which is increasingly becoming an important consideration for today’s employees and customers. Though Schumacher's book takes a much deeper dive into the large global effects of scale on people and profitability, the general impact of a company’s size on its products and services is clear. It’s important for all players in the security industry to remember that the commitment and dedication to product quality can be found in businesses of all sizes. Ensuring safety of people, property and assets Large manufacturers may catch your eye, but small business shouldn’t be forgotten, as they can offer end users a robust set of attributes and benefits. While all security companies are aiming to achieve a common goal of providing safety for people, property and assets, smaller businesses can provide extensive value when it comes to driving the economy, innovating in the industry, providing quality employment and offering superior customer service.
Repercussions are rippling through the physical security industry since President Trump signed into law the ban on government uses of surveillance equipment by Chinese manufacturers Hikvision and Dahua. In addition to the direct and indirect consequences of the new law, there have also been other developments likely to impact the future of Chinese companies in the video surveillance market. The ban has raised awareness of Chinese companies’ role in video surveillance, and other developments are related to tariffs and possible sanctions, all playing out amid the backdrop of an escalating trade war. One Chinese manufacturer previously dismissed security concerns about its role in video surveillance as “Cold War rhetoric.” There has been an almost nostalgic tone recently to the escalating concerns about video cameras being used for spying. Hikvision and Dahua have both stated emphatically that they have not conducted any espionage-related activities. Even so, the U.S. government ban has emboldened the concerns. However, to be clear: No one has alleged that technologies from either of the companies have been used for espionage. Rather, the concerns are about the potential for misuse, not actual misuse. Also aggravating the situation are Chinese companies’ previous, actual problems with cybersecurity, which the companies say they have addressed. Here are some recent developments related to the U.S. government ban and Chinese manufacturers in general: Tariffs and trade concerns Additional rounds of U.S. tariffs have targeted an expanding array of Chinese goods, including data storage and processing components such as printed circuit boards, as well as video camera lenses. The escalating trade war has kept generalised concerns about China and its trade practices in the public eye and fomented a level of uncertainty in many markets, including physical security. Additional rounds of U.S. tariffs have targeted an expanding array of Chinese goods Involvement of surveillance in Chinese human rights violations Concerns have surfaced in a Congressional hearing recently about the Chinese government’s surveillance activities targeting the Uyghurs and other Muslim ethnic minorities in the Zinjiang Urghur Autonomous Region (XUAR). Specific attention is being directed at the region’s surveillance system including “thousands of surveillance cameras, including in mosques,” and Hikvision and Dahua were mentioned in the Congressional hearing as profiting from security spending in the area. Increased global media attention The ban has not been widely publicised in the U.S. mainstream media, but the topic has attracted global attention. For example, the Australian Broadcasting Corporation broadcast a 10-minute expose on the use of Chinese-made cameras in Australian government facilities, including “sensitive military facilities.” The report, which mentioned the U.S. ban, noted that “Both [Hikvision and Dahua] have had security flaws be exposed leading to fears that some of the flaws were placed there to help the Chinese government spy.” The report continues: “China is trying to set itself up as the number-one country for cyber-espionage, and this is part of that platform.” How broadly should one interpret the inclusion of "critical infrastructure" mentioned in the bill? Broader interpretation of the bill beyond the federal government The language in the bill leaves a level of ambiguity in terms of the scope of its application, and the security marketplace as a whole has been struggling to understand its full impact. Does the ban only restrict an integrator’s use of Chinese technology on a specific government job, or does it eliminate an integrator who installs the technology (even in non-government projects) from consideration for government jobs? How broadly should one interpret the inclusion of “critical infrastructure” mentioned in the bill, for example, non-governmental facilities? Will other governments and private entities assume they should ban Hikvision and Dahua in order to be compliant? For example, Suffolk, Virginia, has announced it will not to use Dahua or Hikvision cameras because the federal ban applies to “U.S. government-funded contracts and for critical infrastructure and national security usage.” The result of these developments is a kind of snowball effect, simultaneously drawing attention to the issues and adding new elements to an overall narrative. Taken together, these developments suggest the U.S. ban has set off a level of concern about Chinese companies that will have an industry-transforming impact in the months to come.
Newly modernised halls with lots of daylight will house hundreds of exhibitions and conference events at the upcoming Security Essen 2018 at Messe Essen, Germany. A new layout and hall numbering system will be unfamiliar to past attendees but promises to simplify the experience as it brings together attendees and exhibitors. European physical security market Security Essen is an international trade fair, but the emphasis is more on German, Austrian and Swiss companies. In all, Security Essen will feature 1,000 exhibitors from 40 nations. The trade fair has more of a continental European “flavour” compared to IFSEC, which focuses more on the U.K market. At the last Security Essen in 2016, organisers reported about 40,000 visitors including conference participants, VIP guests, members of various delegations and journalists. Security Essen 2018 has more of a continental European “flavour” compared to IFSEC, which focuses more on the U.K market “This year, we have sharpened the profile of Security Essen,” says Oliver P. Kuhrt, CEO of Messe Essen, a trade fair, congress and event organiser with its own exhibition grounds. “The trade fair has become considerably more digital, more modern and more interactive. Due to the optimised hall layout, we are offering our exhibitors and visitors the best possible experience with short paths and direct communication.” Newly modernised Messe Essen The newly modernised site of Security Essen will encompass eight halls, newly renumbered and with the subject areas reorganised, too. Visitors will find Services in Hall 1; Access, Mechanatronics, Mechanics and Systems in Halls 2 and 3 and the Galeria; Perimeter Protection in Hall 3; Video in Halls 5 and 7; and Fire, Intrusion and Systems in Halls 6 and 7. A helpful smart phone app, downloadable free from the Google Play Store (Android) or the Apple App Store (iOS), will be available two weeks before the event and include a show floor plan; the exhibitor list with booth numbers and contact information; and an overview of the supporting programme. A separate hall – Hall 8 – will house new Cyber Security and Economic Security categories. Cyber Security Conference At the new Cyber Security Conference, located prominently at the new East Entrance, experts will share their knowledge about the more pressing challenges and potential of cybersecurity. The programme opens and closes on 25 and 28 September with the main topic “Opportunities and Risks of Cyber Security”. On 26 September, discussions and lectures will centre on “Entry, Admission, Access: Identification Options”.A helpful smart phone app, downloadable free will be available two weeks before the event and include a show floor plan On 27 September, the topic will be smart homes and focus on “Connected Building, Security in the Buildings of the Future”. Speakers will include the president of Germany’s Federal Office for Information Security, who will address cybersecurity as a challenge for politics, business and society. The fair organises the conference in cooperation with the BHE Federal Association of Security Technology and the technical support of the Federal Office for Information Security. In Hall 8, a new Public Security Forum will enable visitors to experience digital security technologies for public spaces from the areas of sensors/IoT, cyber security and surveillance. The products and solutions will be installed in four different building scenarios (town hall, school, hospital and library) and it will be possible to test them extensively. The forum, including lectures and discussions, will target municipal decision makers and planners of public spaces. Comprehensive programme A Security Expert Forum in Hall 2 will present a continuous programme with more than 90 presentations during the period of the fair. Visitors will obtain information and solution ideas about all six subject areas covered at the fair, and the programme will begin with a keynote lecture each morning and finish with a live demonstration in the evening. On the first day of the fair (25 September), Security Essen’s Career Forum will introduce retrainees, students, trainees and graduates to companies from the security industry. Targeted and professional communication will be established between companies and job applicants to facilitate making contacts, developing networks, and filling actual vacancies. Thursday (27 September) will be observed as Fire Prevention Day, and a Drone Course will be provided each day in Hall 7. One day admission to Security Essen is €41; a four-day ticket is €105. Advance sale tickets are discounted.
Given the choice, would you rather run security at a bank vault or at a student halls of residence? At least the bank job is straightforward: Keep the money inside, and everyone else out. If only protecting hundreds of young people was so easy. Securing student accommodation Student accommodation blocks are usually large, with high traffic moving from bedrooms to common areas, canteens and libraries. A single resident travelling between her room, a study area, the gym and a couple of trips offsite would use secure doors 15 times a day. In a residence housing just 200 students, that’s 3,000 daily events for the access system to handle. Rapid student turnover puts a further admin burden on facility managers. Imagine, among hundreds of students living at the halls, just a handful leave or arrive each semester. That’s a couple of manual key handovers to schedule every week, and to chase if a key-holder fails to appear. If keys are not handed in, is a room really secure for its next occupant? And how can you know if one has been copied? With physical keys and mechanical locks, security lacks flexibility, and it’s impossible to get a site overview without a time-wasting manual key audit. Today’s students, tomorrow’s secure solutions Mechanical security is not the answer, because mechanical locks don’t offer the control or flexibility managers need. There’s no real-time monitoring, and you can’t generate detailed audit trails for locks or users, meaning there’s no easy way to track unauthorised access — in cases of a theft, for example. The current crop of students — so-called “Generation Z” — were raised as digital natives. They expect convenience as a standard feature, not a mechanical solution first used in Ancient Egypt. In Europe’s increasingly international, marketised higher education system, attracting these tech-savvy students and keeping them satisfied with the campus experience are critical.A wireless access control system like SMARTair™ solves admin problems with a combination of control and cost-effectiveness The SMARTair™ wireless access system is built to meet the challenges of securing a student residence: A system needs the product and software robustness to handle so many users, high traffic, and fast resident turnover. SMARTair™ has it. A system should make student life easier with cards, rather than keys. SMARTair™ does. A system should secure more than just doors, including cabinet locks and devices to protect secure areas like car parks. SMARTair™ does. A system must be easy to upgrade in the future, both adding new doors and upgrading the functionality of the devices already installed. SMARTair™ is; it future-proofs your investment. A system should be able to handle additional student services like the vending machines and canteen on the same credential card as the room door lock. SMARTair™ can. Swapping mechanical for wirelessA wireless access control system like SMARTair™ solves admin problems with a combination of control and cost-effectiveness. It is based on battery-powered locks and is easy to retrofit wirelessly to existing premises or incorporate in a new-build. Installers simply swap the existing mechanical lock for a wireless device and link the door to the management software. Slim, robust SMARTair™ devices can secure almost any opening. Escutcheons (with optional keypad for added security) are ideal for student bedrooms, and fit wood or glass, emergency exit and even fire doors. Available with or without PIN entry, SMARTair™ wall readers can filter lift, main door or car park access. The SMARTair™ knob cylinder is easy to retrofit to management offices; you just replace an existing mechanical cylinder with the SMARTair™ device. For storing belongings, SMARTair™ cabinet and locker locks are configurable in the same system without the need for an extra module. With SMARTair™, students come and go using programmable smart cards, tags, or even the secure SMARTair™ mobile app — not a cumbersome, easy-to-lose key. SMARTair™ devices support all major RFID technologies. Plus, students only need carry one credential to open their door and access additional onsite services. A single card to unlock their room, secure their belongings inside a locker, enter the library, pay for photocopying and buy lunch makes sense for them. It’s another step to boosting resident convenience.Because SMARTair™ devices run on standard batteries, the system is also cost-effective for accommodation providers And because SMARTair™ devices run on standard batteries, the system is also cost-effective for accommodation providers. Already trusted by students all over Europe SMARTair™ is already making life easier for student residence managers all over Europe, including at Mezzino’s Rialto Court in Middlesbrough, UK. “We are so pleased with the result. We are already looking to adopt the access control system for the other student accommodation properties we manage nationwide,” says James McGrath, Mezzino’s co-owner and director. At Funway Academic Resort in Madrid (www.funwayresort.com), student rooms are locked with SMARTair™ escutcheons. Energy-saving wall devices inside rooms regulate electricity use, and students have an individual safe fitted with a SMARTair™ cabinet lock. Students and staff open all their authorised doors with the same access card: the Funway gym, study rooms, games rooms, swimming pool and changing rooms, spa and staff areas are also locked with SMARTair™ escutcheons. “The system meets the expectations we had and offers very easy maintenance,” says Mario Arias, Facility Manager at Funway. To discover how SMARTair™ can upgrade student security and put you in total control of your halls of residence, visit www.tesa.es/smartair-students
The Ottawa Elementary School District is in Ottawa, Illinois, a river town 80 miles southwest of Chicago. The district consists of five schools, the campuses of which include Jefferson Elementary School, Lincoln Elementary School, McKinley Elementary School, Shepherd Middle Schools, and the Jefferson Elementary “Art House” building. In the spring of 2015 a variety of issues caused the schools’ administration to determine that they needed a surveillance system upgrade. The district’s IT director Kyle Olesen met with Nick Melnyk of systems integrator Ficek Electric & Communication Systems and the Arecont Vision regional sales team, ultimately sparking a major collaboration to redesign the surveillance systems used by all their schools. No formal coverage strategy The district had been using mostly analogue cameras for its school surveillance. The original cameras had been placed throughout the five campuses without a formal coverage strategy, greatly hindering the usefulness of the surveillance system. This prevented key areas from being effectively monitored and the images that were provided by the analogue cameras were of low quality. New challenges presented themselves as the project continued. With five completely different locations to work with, it was clear that the project would be a long-term one. It was imperative that the installation efforts be planned accordingly. Part of planning was to treat each school as a separate project with its own surveillance coverage layout and system requirements. Education session on IP technology Such a long undertaking also meant staffing challenges. The project manager changed five months into the project, resulting in the bidding process to be undertaken a second time. A The school then hired Chicago-based Architecture and Engineer company to help facilitate the project. Arecont Vision delivered educational sessions to bring the new firm up to date on IP megapixel camera technology. The Ottawa School District approved the installation of Arecont Vision cameras in all five locations in July 2016 During the first meeting with the district in 2015, the IT director was introduced to Arecont Vision megapixel single- and multi-sensor cameras. The end user was impressed, and a more in-depth meeting was scheduled. This led to walkthroughs at each of the five campuses to outline recommendations for camera locations and models. Detailed layout of coverage area The individual schools were pleased with Arecont Vision’s camera performance during this series of events, and the project continued into the design phase. During this period, the district received a detailed layout for each school. The layouts outlined the coverage area that each camera would provide. After completing the design phase, the systems integrator and the school district participated in the Arecont Vision Try-and-Buy Program. This program provided the end user community with the opportunity to experience Arecont Vision megapixel cameras before committing to a full installation. Impressed with what they saw, the Ottawa School District approved the installation of Arecont Vision cameras in all five locations in July 2016. Solutions installed Exacq Technologies, part of the Security Products business unit of Tyco, was selected as the video management system (VMS) provider. Exacq and Arecont Vision have thousands of joint installations for schools and other surveillance projects around the world. Exacq is a member of the Arecont Vision Technology Partner Program, and their VMS software is available in the Arecont Vision MegaLab certification and support facility for the best possible continued integration. The five schools utilise an array of Arecont Vision products throughout the district. The multisensor, panoramic 180o SurroundVideo and adjustable-view SurroundVideo Omni series provide coverage of large areas such as cafeterias, gyms, and parking lots. Arecont Vision pioneered the multi-sensor surveillance megapixel camera market in 2006, and has continued to lead the industry with new features, performance, and reliability. Now in their fifth generation, SurroundVideo cameras provide coverage with four individual megapixel sensors for superior situational awareness and outstanding image quality. The Arecont Vision camerasare monitored both locallyand remotely by the schools,using the Exacq software Arecont Vision MicroDome G2 series cameras were used for interior areas such as for coverage of hallways and doorways. MegaView 2 series cameras equipped with STELLAR (Spatio Temporal Low Light Architecture) technology were implemented for day and night outdoor coverage. The Made in USA Arecont Vision cameras used by the project are hardened against potential cybersecurity attacks, and cannot be repurposed for malicious purposes, giving the schools an added level of security protection. The Arecont Vision cameras are monitored both locally and remotely by the schools, using the Exacq software. Each school’s administration has access to the cameras monitoring their individual campus, allowing for real-time monitoring throughout the day. Video can be accessed remotely, with playback from any camera using district laptops and tablets. Superior image quality and user-friendly interface “The customer and our company are very satisfied and happy with the quality of the equipment,” said Nick Melnyk, of Ficek Electric and Communication Systems, Inc. “The accessories, the mounts, everything fit very well and works very well. That all comes into play because a lot of times you can be sent cameras with wrong accessories and other things that don’t fit, extending the installation process longer than it needs to be. For this project, installation went very smoothly.” “Arecont Vision provided superior image quality and a user-friendly interface,” continued Mr. Melnyk. “The school district was so pleased with Arecont Vision products that they are now looking to put additional cameras onto to the surveillance systems on most of the campuses.” Upon being asked if Arecont Vision could do anything better in the future, Mr. Melnyk stated, “We are very satisfied with everything we have received from Arecont Vision.”
Edmund Rice, formally Christian Brothers College, was established in 1926 and is an independent Catholic high school for boys located in the heart of the picturesque Illawarra district, to the south-west of Sydney. The founder of the Christian Brothers, Edmund Rice, lends the school its present-day name. Installation of new surveillance system Since 2013 Edmund Rice College has invested millions to bring cutting-edge facilities to their students, including a first-class sports hall, state-of-the-art computing facilities, and new learning spaces both inside and out. The school’s current 1980s analogue security system was only semi-operational and not up to the essential task of protecting these assets. Only authorised members of staff have access to review or download footage, with neither students nor teachers able to do so So, the headmaster called in Dean Scanlen from Forcefield Security to carry out repairs. Dean knew that continuing to repair the increasingly defunct technology was not a long-term solution: "I suggested, why not include the installation of a brand-new security system in the Sports Hall into the construction cost? I explained the savings that would be seen in the long term and how it was a perfect time to incorporate into the larger project.” The decentralised design of the MOBOTIX cameras with intelligent low bandwidth requirements allowed integration into the school’s existing network and MOBOTIX hemispheric technology meant fewer cameras cover larger areas. With licence-free regularly upgraded firmware, and cameras built to last and to stringent quality standards, MOBOTIX technology offered an economical long-term solution and was perfect for the school. Furthermore, as many areas to be covered were internal, the competitive pricing of the indoor range brought even greater savings upfront. "In order to convince them, I suggested that they try out one MOBOTIX camera. They used it for a month, and came back more than happy and ready to go ahead with the entire installation,” Dean explains. MOBOTIX video surveillance solutions A combination of M15s and D15 easily protected the exterior of the building and only a single i25, MOBOTIX hemispheric indoor camera, was needed to cover the entire sports hall arena A modern alarm system was fitted in the Sports Hall and MOBOTIX cameras were installed around the outside and inside of the building. A combination of M15s and D15 easily protected the exterior of the building and only a single i25, MOBOTIX hemispheric indoor camera, was needed to cover the entire sports hall arena. Positive results were seen quite soon afterwards, with the access reliable footage acting to reduce incidences of bullying and fighting. Extremely happy with the installation, the school were eager for the newly refurbished library to be secured next. By this stage the VMS (video management software) had been upgraded to the newly released MxMC (MOBOTIX Management Centre), making installation even simpler. In spite of its size, the library only required 2 indoor hemispheric c25 cameras to monitor the whole area. Q25s and D15s were installed to keep a watchful guard on the entrance and exterior respectively. Thanks to MxMC’s intelligent sorting of all parameters, which supports visual control and drag&drop, installation time was significantly cut. Pros of MOBOTIX decentralised technology MOBOTIX decentralised technology keeps bandwidth requirements extremely low, allowing a secure subnet to be installed on the school’s existing network without causing any extra burden. Indeed, at busy times, such as during class when students are using computer equipment, the cameras delay sending footage, storing it in a buffer designed specifically for this purpose. “IT didn’t even see an imprint of MOBOTIX on their network,” Dean explains. Edmund Rice College can now look to the future with reassurance, knowing that they have a scalable, flexible security system built to last Live monitoring takes place in a local control room performed by security staff, and only authorised members of staff have access to review or download footage, with neither students nor teachers able to do so. Further measures were taken to protect the privacy of students in view of the new system, by disabling all microphones on the cameras during teaching hours. However, at night time, the microphones are switched on through a custom setting, so that the control room can speak to anyone on site using remoteGUARD. Protection against vandalism The cameras have already had their first major win protecting computer equipment from vandalism. “Someone had been swapping the letters over on the keyboards in the computer room,” Dean explains. “Using MxMC, we reviewed the recordings and found perfect footage of the culprits in action. They were reprimanded and asked to pay for new keyboards. It had happened in the past and the school hadn’t been able to catch them, until now.” Edmund Rice College can now look to the future with reassurance, knowing that they have a scalable, flexible security system built to last. MOBOTIX decentralised technology made installation simple, with no new cabling nor additional infrastructure required. This, along with the great coverage provided by hemispheric technology and the lower price point of indoor cameras, meant a sophisticated security system was also affordable. And, because MOBOTIX firmware is licence-free and regularly updated, the school have the reassurance of knowing the system will remain cutting-edge for many years to come.
The high-mount external detector, XDH10TT-AM, showcases the innovation, reliability and quality upon which Pyronix has built its reputation. Usability, adaptability and reliability From the various mounting options and proven Tri-Technology to Anti-Interference Technology, which consists of Anti-Masking and Anti-Blocking, the XDH10TT-AM has been manufactured with usability, adaptability and reliability in mind. Whether a residential, industrial or commercial installation, the XDH10TT-AM maintains maximum performance. For schools, this is the ideal perimeter detector to protect playgrounds and perimeter walls. This provides the peace of mind necessary for knowing that students, as well as school buildings, are safe from unwanted visitors during or after school hours. Tri Signal Detection Logic The detection of human presence is based on the advanced analysis of the activation sequence of the microwave movement sensor and the two independent digital PIR sensors. All three sensors have to activate at the same time in a particular time window to create an alarm. Using tri signal detection logic enhances the detector’s immunity to environmental disturbances. Residential protection In terms of residential protection, the XD also delivers superior security for gardens, drives, exits, perimeter walls or outbuildings. The XDH10TT-AM provides the ultimate external security solution for literally any scenario.
Hult International Business School provides a unique and innovative educational programme based on real market insight to their students all over the globe. Looking for a more efficient class attendance control system on their campuses, Hult took notice of TBS’s touchless, wireless connectable and hygienic 3D technology. TBS’s 3D touchless technology The initial project was originated in Dubai under the guidance of Ahmed El Banna, who said: “The main reason for Hult to select TBS was the reliability of the technology and the team behind it. Among many companies tested, TBS’s 3D technology has successfully proven to be reliable in identifying our most difficult cases. We were applying a system that wasn’t familiar to many companies and that is where TBS’s smart team and personalised customer service around the clock and around the globe came in handy. We were also keen for a software that is easy to use and preferably on the cloud, which we found with TBS.” School administration and students were impressed by how well the devices integrate into the school’s routine and architecture: “The design of the 3D devices has fit our modern premises on Campus as if to measure, which was also an important selection criteria”, says El Banna. The Hult team developed a wirelessly connected kiosk, placed at the entrance of each classroom, ensuring that all students sign in, even if they arrive late. Installation over 3 continents The installation on the Dubai campus served as a persuasive example to Hult’s other locations, spanning over 3 continents. Expansions to their London, Boston and San Francisco school sites were completed maintaining and synchronising the worldwide data in real time. Hult’s new attendance automation system can be extended to any additional location anywhere in the world at any time. This project was realized in collaboration with the Interflex partner NTS for installation in London and global support, Kratos for installation in the US and with the effort of the Hult teams in Dubai, London, and the USA. The solution is scalable and can expand to cover other sites such as the Shanghai campus. The TBS 3D-Terminal is a three-dimensional, contact-free fingerprint sensor, using three integrated cameras for its scanning process. TBS systems is designed in particular for high security and large user groups. It can be used with TBS BioManager software or integrated into any existing security software.
Avigilon Corporation, a provider of trusted security solutions, announces that it has been selected by Fulton County School System, in Atlanta, Georgia, United States, to enhance safety for over 100 schools. Fulton County School System Fulton is the fourth largest school district in Georgia. Its mission is to provide a safe and secure environment for its over 96,000 students and more than 12,000 full-time employees. To help enhance safety, Fulton has installed a full Avigilon surveillance solution that includes Avigilon cameras with self-learning video analytics, Avigilon network video recorders, and Avigilon Control Center (ACC) video management software with Avigilon Appearance Search technology. Fulton is also deploying Avigilon Access Control Manager to secure physical access points, providing an integrated security solution for the district. Avigilon Appearance Search video analytics technology Avigilon Appearance Search video analytics technology uses a sophisticated deep learning artificial intelligence (AI) search engine to sort through hours of footage with ease. This technology allows Fulton’s operators to click on a button and search for all instances of a person or vehicle across all cameras on a site, quickly and efficiently. This can save Fulton time and effort during critical investigations as Avigilon Appearance Search technology intelligently analyses video data, helping to track a person’s or vehicle’s route, and identify previous and last-known locations. “At Fulton County Schools, the safety of our staff and students is paramount,” said Paul Hildreth, Emergency Operations, Safety, and Security for Fulton. “We chose Avigilon because of the capabilities it offers in its advanced video analytics search technologies, including Avigilon Appearance Search. Their analytics are easy to set up and use, and can save us valuable time and effort, ultimately making our schools a safer place for generations to come.” “We designed our artificial intelligence-driven Avigilon Appearance Search technology to change the way people interact with their video surveillance systems,” said James Henderson, Avigilon’s President and Chief Operating Officer. “The Avigilon solution at Fulton County Schools is a great example of how our technology can provide quick and powerful insights to help keep schools safe.”