Education security applications
An initial investment of $100 million launched the first American public university campus in Mexico: Arkansas State University Campus Queretaro (ASUCQ). Within five years of its 2017 opening, around 7,500 staff and students are expected to use the site, including campus accommodation for up to 1,500 students. To accompany such a high-profile development, the university needed security and access control systems with a trusted and proven track record protecting staff, students and other univers...
Founded in 1871, Fulton County School System is the fourth largest school district in Georgia, United States. It consists of 101 schools and administrative support buildings, including 67 elementary schools, 19 middle schools, 17 high schools and eight charter organisations. Fulton’s mission is to provide a safe and secure environment for its more than 96,000 students and more than 12,000 full-time employees. To help enhance safety Search Technology at more than 100 schools, Fulton has in...
Headquartered in a designated facility, the Compton Unified School District (USD) Police Department is committed to providing a safe and secure educational environment for students, staff, and parents. It strives to prevent criminal or delinquent behaviour that has a negative impact on the educational process within the schools and community. Located in a suburban Los Angeles community with a high crime rate, Compton USD is among the 75 percent of schools that have adopted video surveillance so...
VMS software and IP products from Hikvision, a supplier of innovative video surveillance products and solutions, are now being used by the Government of Gujarat Directorate of Technical Education (DTE), to protect and administer education facilities and services across Western India. A government organisation that provides qualitative and higher level technical training for students from a diverse mix of financial and social backgrounds, the Directorate of Technical Education’s (DTE) goal...
The Monterey Bay Aquarium has a rich history of innovation. Since its founding in 1984, the facility has become one of the world’s leading public aquariums and ocean conservation organisations. Monterey Bay Aquarium has produced significant insights into the life history of sharks, sea otters, and bluefin tuna. The aquarium also was the first to exhibit a living kelp forest, and in 2004 it was the first to successfully exhibit and return to the wild a young great white...
The Vienna University of Economics and Business (WU) was founded in 1898 by the k. k. Ministerium für Cultus und Unterricht as the "k. k. Exportakademie". At that time, tuition was being given in the following relatively modern fields: Foreign languages, economics, business affairs, economic geography, public law, private law and consumer affairs. Relocation to Vienna Due to steadily increasing numbers of students, the WU had to relocate to various sites in Vienna several times in it...
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organisations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?
In 1973, a brilliant economist named E.F. Schumacher wrote a seminal book titled ‘Small Is Beautiful:’ taking an opposing stance to the emergence of globalisation and “bigger is better” industrialism. He described the advantages of smaller companies and smaller scales of production, highlighting the benefits of building our economies around the needs of communities, not corporations. In almost every industry or market that exists in the world today, you're likely to find a difference in size between companies. Whether it’s a global retail chain versus a small family-owned store, a corporate restaurant chain versus a mom-and-pop diner or a small bed and breakfast versus a large hotel chain — each side of the coin presents unique characteristics and advantages in a number of areas. Disparity in physical security industry Customers are drawn to products and services from large enterprises as the big names typically imply stability This disparity very clearly exists in the physical security industry, and differences in the sizes of product manufacturers and service providers could have important implications for the quality and type of the products and services offered. All too often, customers are drawn to products and services from large enterprises, as the big names typically imply stability, extensive product offerings and global reach. And that's not to say that these considerations are unwarranted; one could argue that larger companies have more resources for product development and likely possess the combined expertise and experience to provide a wide range of products and services. But the value that a company’s products and services can bring isn’t necessarily directly related to or dependent on its size. In an age where the common wisdom is to scale up to be more efficient and profitable, it’s interesting to pause and think about some of the possible advantages of small- and medium-sized businesses (SMBs). Typically, “small” companies are defined as those with less than 100 employees and “medium” with less than 500. Providing social mobility Schumacher argued that smaller companies are important engines of economic growth. Indeed, according to the Organisation for Economic Cooperation and Development (OECD), a group of 36 member countries that promotes policies for economic and social well-being, SMBs account for 60 to 70 percent of jobs in most OECD countries. Importantly, SMBs provide resilience in that there are often large economic and social impacts when big companies fail. Smaller companies are better for regional economies in general, as earnings stay more local compared to big businesses, which in turn generates additional economic activity. SMBs are also better at providing social mobility for disadvantaged groups by giving them opportunities and enabling them to realise their potential. Smaller companies are often more innovative, bringing to the market novel technologies and solutions such as Cloud, analytics, AI, and IoT New companies introduce new technologies There's no denying the role of start-ups when it comes to innovation. In the security industry, many new technologies (e.g. Cloud, analytics, AI, IoT) are first brought to the market by newer companies. In general, smaller companies’ products and services often have to be as good or better than others to be competitive in the marketplace. They are therefore often more innovative, bringing to the market novel technologies and solutions. And these companies are also more willing to try out other new B2B solutions, while larger companies tend to be more risk-averse. Customer service Aside from the quality of products and services, arguably one of the most important components of a security company’s success is its ability to interact with and provide customers the support that they deserve. Smaller companies are able to excel and stand out to their customers in a number of ways: Customer service. Customers’ perceptions of a product’s quality are influenced by the quality of support, and smaller manufacturers often possess a strong, motivated customer service team that can be relatively more responsive to customers of all sizes, not just the large ones. A superior level of support generally translates into high marks on customer satisfaction, since customers’ issues with products can be resolved promptly. Flexibility. SMBs have a greater capacity to detect and satisfy small market niches. While large companies generally create products and services for large markets, smaller companies deal more directly with their customers, enabling them to meet their needs and offer customised products and services. And this translates to adaptability, as SMBs become responsive to new market trends. By having a pulse on the market, smaller companies have much more flexibility in their supply chain and can adjust much faster in response to changing demand. Decision-making. Smaller companies are much more agile in decision-making, while larger enterprises often suffer from complex, tedious and lengthy decision-making processes. Communication is easier throughout SMBs, as smaller teams enable new ideas to flow and can solve problems faster. Job satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction. SMBs are also generally more connected to local communities and participation in community activities leads to a greater sense of purpose. Additionally, SMBs have a much smaller impact on the environment, which is increasingly becoming an important consideration for today’s employees and customers. Though Schumacher's book takes a much deeper dive into the large global effects of scale on people and profitability, the general impact of a company’s size on its products and services is clear. It’s important for all players in the security industry to remember that the commitment and dedication to product quality can be found in businesses of all sizes. Ensuring safety of people, property and assets Large manufacturers may catch your eye, but small business shouldn’t be forgotten, as they can offer end users a robust set of attributes and benefits. While all security companies are aiming to achieve a common goal of providing safety for people, property and assets, smaller businesses can provide extensive value when it comes to driving the economy, innovating in the industry, providing quality employment and offering superior customer service.
Repercussions are rippling through the physical security industry since President Trump signed into law the ban on government uses of surveillance equipment by Chinese manufacturers Hikvision and Dahua. In addition to the direct and indirect consequences of the new law, there have also been other developments likely to impact the future of Chinese companies in the video surveillance market. The ban has raised awareness of Chinese companies’ role in video surveillance, and other developments are related to tariffs and possible sanctions, all playing out amid the backdrop of an escalating trade war. One Chinese manufacturer previously dismissed security concerns about its role in video surveillance as “Cold War rhetoric.” There has been an almost nostalgic tone recently to the escalating concerns about video cameras being used for spying. Hikvision and Dahua have both stated emphatically that they have not conducted any espionage-related activities. Even so, the U.S. government ban has emboldened the concerns. However, to be clear: No one has alleged that technologies from either of the companies have been used for espionage. Rather, the concerns are about the potential for misuse, not actual misuse. Also aggravating the situation are Chinese companies’ previous, actual problems with cybersecurity, which the companies say they have addressed. Here are some recent developments related to the U.S. government ban and Chinese manufacturers in general: Tariffs and trade concerns Additional rounds of U.S. tariffs have targeted an expanding array of Chinese goods, including data storage and processing components such as printed circuit boards, as well as video camera lenses. The escalating trade war has kept generalised concerns about China and its trade practices in the public eye and fomented a level of uncertainty in many markets, including physical security. Additional rounds of U.S. tariffs have targeted an expanding array of Chinese goods Involvement of surveillance in Chinese human rights violations Concerns have surfaced in a Congressional hearing recently about the Chinese government’s surveillance activities targeting the Uyghurs and other Muslim ethnic minorities in the Zinjiang Urghur Autonomous Region (XUAR). Specific attention is being directed at the region’s surveillance system including “thousands of surveillance cameras, including in mosques,” and Hikvision and Dahua were mentioned in the Congressional hearing as profiting from security spending in the area. Increased global media attention The ban has not been widely publicised in the U.S. mainstream media, but the topic has attracted global attention. For example, the Australian Broadcasting Corporation broadcast a 10-minute expose on the use of Chinese-made cameras in Australian government facilities, including “sensitive military facilities.” The report, which mentioned the U.S. ban, noted that “Both [Hikvision and Dahua] have had security flaws be exposed leading to fears that some of the flaws were placed there to help the Chinese government spy.” The report continues: “China is trying to set itself up as the number-one country for cyber-espionage, and this is part of that platform.” How broadly should one interpret the inclusion of "critical infrastructure" mentioned in the bill? Broader interpretation of the bill beyond the federal government The language in the bill leaves a level of ambiguity in terms of the scope of its application, and the security marketplace as a whole has been struggling to understand its full impact. Does the ban only restrict an integrator’s use of Chinese technology on a specific government job, or does it eliminate an integrator who installs the technology (even in non-government projects) from consideration for government jobs? How broadly should one interpret the inclusion of “critical infrastructure” mentioned in the bill, for example, non-governmental facilities? Will other governments and private entities assume they should ban Hikvision and Dahua in order to be compliant? For example, Suffolk, Virginia, has announced it will not to use Dahua or Hikvision cameras because the federal ban applies to “U.S. government-funded contracts and for critical infrastructure and national security usage.” The result of these developments is a kind of snowball effect, simultaneously drawing attention to the issues and adding new elements to an overall narrative. Taken together, these developments suggest the U.S. ban has set off a level of concern about Chinese companies that will have an industry-transforming impact in the months to come.
Newly modernised halls with lots of daylight will house hundreds of exhibitions and conference events at the upcoming Security Essen 2018 at Messe Essen, Germany. A new layout and hall numbering system will be unfamiliar to past attendees but promises to simplify the experience as it brings together attendees and exhibitors. European physical security market Security Essen is an international trade fair, but the emphasis is more on German, Austrian and Swiss companies. In all, Security Essen will feature 1,000 exhibitors from 40 nations. The trade fair has more of a continental European “flavour” compared to IFSEC, which focuses more on the U.K market. At the last Security Essen in 2016, organisers reported about 40,000 visitors including conference participants, VIP guests, members of various delegations and journalists. Security Essen 2018 has more of a continental European “flavour” compared to IFSEC, which focuses more on the U.K market “This year, we have sharpened the profile of Security Essen,” says Oliver P. Kuhrt, CEO of Messe Essen, a trade fair, congress and event organiser with its own exhibition grounds. “The trade fair has become considerably more digital, more modern and more interactive. Due to the optimised hall layout, we are offering our exhibitors and visitors the best possible experience with short paths and direct communication.” Newly modernised Messe Essen The newly modernised site of Security Essen will encompass eight halls, newly renumbered and with the subject areas reorganised, too. Visitors will find Services in Hall 1; Access, Mechanatronics, Mechanics and Systems in Halls 2 and 3 and the Galeria; Perimeter Protection in Hall 3; Video in Halls 5 and 7; and Fire, Intrusion and Systems in Halls 6 and 7. A helpful smart phone app, downloadable free from the Google Play Store (Android) or the Apple App Store (iOS), will be available two weeks before the event and include a show floor plan; the exhibitor list with booth numbers and contact information; and an overview of the supporting programme. A separate hall – Hall 8 – will house new Cyber Security and Economic Security categories. Cyber Security Conference At the new Cyber Security Conference, located prominently at the new East Entrance, experts will share their knowledge about the more pressing challenges and potential of cybersecurity. The programme opens and closes on 25 and 28 September with the main topic “Opportunities and Risks of Cyber Security”. On 26 September, discussions and lectures will centre on “Entry, Admission, Access: Identification Options”.A helpful smart phone app, downloadable free will be available two weeks before the event and include a show floor plan On 27 September, the topic will be smart homes and focus on “Connected Building, Security in the Buildings of the Future”. Speakers will include the president of Germany’s Federal Office for Information Security, who will address cybersecurity as a challenge for politics, business and society. The fair organises the conference in cooperation with the BHE Federal Association of Security Technology and the technical support of the Federal Office for Information Security. In Hall 8, a new Public Security Forum will enable visitors to experience digital security technologies for public spaces from the areas of sensors/IoT, cyber security and surveillance. The products and solutions will be installed in four different building scenarios (town hall, school, hospital and library) and it will be possible to test them extensively. The forum, including lectures and discussions, will target municipal decision makers and planners of public spaces. Comprehensive programme A Security Expert Forum in Hall 2 will present a continuous programme with more than 90 presentations during the period of the fair. Visitors will obtain information and solution ideas about all six subject areas covered at the fair, and the programme will begin with a keynote lecture each morning and finish with a live demonstration in the evening. On the first day of the fair (25 September), Security Essen’s Career Forum will introduce retrainees, students, trainees and graduates to companies from the security industry. Targeted and professional communication will be established between companies and job applicants to facilitate making contacts, developing networks, and filling actual vacancies. Thursday (27 September) will be observed as Fire Prevention Day, and a Drone Course will be provided each day in Hall 7. One day admission to Security Essen is €41; a four-day ticket is €105. Advance sale tickets are discounted.
GSX 2018 is both a new event for the security industry and the continuation of a 63-year tradition. Global Security Exchange (GSX) is the new branding for ASIS International’s annual seminar and exhibits, which have been held since 1955. In recent years, the ASIS event has joined forces with other organisations to expand its scope and to appeal to a broader audience. Partners include ISSA (Information Systems Security Association) and Infragard, a public-private partnership between U.S. businesses and the Federal Bureau of Investigation (FBI). The expansion is continuing this year with the addition of 30 supporting organisations representing industry verticals and reflecting ASIS’s intent to unite the full spectrum of security. Improving the state of cyber security Held September 23-27 at the Las Vegas convention Center, GSX 2018 seeks to attract more than 20,000 operational and cyber security professionals and 550 exhibitors. The Cyber Security Summit will co-locate with GSX, offering cyber security programming at a time when it is needed the most Other elements will further expand the 2018 event’s scope. The Cyber Security Summit will co-locate with GSX, offering cyber security programming at a time when it is needed the most. Top government, industry and academic thought leaders will engage in a dialogue to improve the state of cyber security. The 2018 Security Cares Program will address school violence prevention and response in a free education program. Topics will include pre-violence indicators, target hardening, and best practices to involve the entire community of school administrators, law enforcement, security professionals and mental health providers. Experts to deliver keynote speeches Keynote speakers including CNN host Fareed Zakaria will bestow celebrity appeal. Air Force Major General Bradley D. Spacy will share details about the new AFWERX innovation and tech hub in Las Vegas and how the U.S. Air Force is collaborating with the private sector to bring new security product ideas to market. Spacy’s keynote on Sept. 26 will kick off Military and Law Enforcement Appreciation Day. Also, K.T. McFarland, former Trump Administration Deputy National Security Advisor, will share an insider’s perspective on critical foreign policy and defence industries. Attendees to ASIS International’s annual gathering typically list networking and education as big benefits of the event. Historically, the trade show aspect has existed separately from the educational program, and foot traffic to the exhibits has sometimes suffered from the competition. Beginning last year, and continuing in 2018, ASIS International has pursued innovative approaches to integrate the trade show more closely into the overall attendee experience. “The integration of programming and exhibits is truly seamless,” says one observer of the new approach. Held Sept. 23-27 at the Las Vegas convention Center, GSX 2018 seeks to attract more than 20,000 operational and cyber security professionals and 550 exhibitors X Learning Theatres GSX has sought to transform the exhibit hall into a ‘learning lab environment’ that features thousands of security products, technologies and service solutions (provided by the exhibitors), in addition to ‘immersive learning opportunities to connect the current and emerging threat landscape with solutions available in the marketplace’. There are several ‘X Learning Theatres’, including one (‘X-Stage’) focussed on leading-edge technologies such as blockchain, cryptocurrencies, AI, drones, and robotics. There is also an ‘Xcelerated Exchange Stage’ to facilitate discussions among security practitioners and solution providers. The ‘Xperience Stage’ showcases case studies and best practices. Also attracting more attendees to the Exhibit Hall will be ‘Career HQ’, a free career fair and enhanced career centre. ‘D3 Xperience’ (Drones, Droids Defence) will focus on unmanned systems with education and demos. The ‘Innovative Product Awards (IPAs) Showcase’ will highlight winners of an awards program. Focussing on security practices GSX is not as much about sales leads as about making connections and contributing to a larger conversation about how to protect people, facilities and assets ASIS International (now GSX 2018) is often compared to ISC West, the U.S. industry’s largest show held in Las Vegas in the spring. GSX 2018 this year may face even more scrutiny based on the changes, rebranding, and location (also in Las Vegas). However, GSX is a completely different show than ISC West, which focuses on the business of security. In contrast, GSX is much more about the practice of security than business. The international network of ASIS International members attend the yearly conference to make new connections, to learn and to benefit from the experiences of other security professionals around the world. The successful trade show exhibitors are the ones that approach the show with that understanding. GSX is not as much about sales leads as about making connections and contributing to a larger conversation about how to protect people, facilities and assets. ASIS International deserves credit for their efforts to integrate the trade show element into the larger goal of the event. Hopefully their new approach will enhance the overall experience for both attendees and exhibitors – and help to make the world a safer place as a consequence.
By now your organisation should know the drill. To keep your enterprise safe from unauthorised access you take the basic precautions: create strong passwords that are not re-used and are updated frequently, use updated anti-virus software, employ host and network-based intrusion detection and prevention, data encryption, etc. etc. However, complacency has no place in cybersecurity. Hackers are working round-the-clock to outwit your most ardent security professionals. Here are a few specific vulnerabilities that require immediate and constant attention to stay safe in a hostile security world. Protect against burst attacks You may be aware of DDoS, or distributed denial of service attacks. In fact, Cisco writes that these online attacks — where high-volume traffic floods a system’s servers, making web traffic extremely slow — grew 172% in 2016. But in the last few years, Cisco documents how "burst attacks", a type of DDoS attack that floods traffic in short bursts at random times over a prolonged period, has skyrocketed. They claim that in one study, 42% of the companies faced a burst attack in 2017. Burst attacks change vectors throughout an attack, making it difficult to create a signature to block the attack According to Radware, on-premises DDoS protection needs to adapt to counter these often less than one-minute attacks. While the majority of these solutions detect burst attacks, they write that "most of them limit the rate of bad (and legitimate) traffic to a certain threshold, resulting in a high level of false positives." One big challenge is burst attacks change vectors throughout an attack, making it difficult to create a signature to block the attack. They recommend adopting two key solutions: 1) a behavioural DDoS protection system that utilises machine learning algorithms to identify the patterns of burst attacks, and 2) measuring the degree-of-attack (DoA) surface, which looks at the bandwidth or rate of a specific type of traffic and the percentage of a given type of traffic out of the entire distribution of traffic. If an attack rates high in both the bandwidth and percentage parameters, then it gets a high DoA surface score, showing that a burst attack likely occurred. Prioritise network infrastructure Nefarious actors have been exploiting both enterprise level and small/home office and residential routers For companies with in-house information technology staff, network infrastructure usually gets plenty of attention. Proper configuration, maintenance and security are often key considerations for infrastructure due to its importance to the business. What about smaller entities? Do you have a small switch or router you either purchased or leased from your internet service provider? If so, when was the last time you updated it? In Alert TA18-106A, the United States Computer Emergency Response Team (US-CERT) shares information dating all the way back to 2015 on how nefarious actors have been exploiting both enterprise level and small office/home office and residential routers and switches. If you haven’t changed passwords and updated the software/firmware on these devices yet it should be near the top of your priority list. Hide sensitive web pages from search engines Search engines are an easy first step for someone looking to exploit your environment. They can conduct searches of your known web presence, looking for pages which might not have been meant for the general public but are still accessible. Using robots.txt pages can be excluded from search engine crawlers. Entrepreneur.com suggests checking out a tutorial from SEObook.com to learn more about how you can do this. Keep in mind this will only deter the most basic attackers as more sophisticated attackers will conduct manual searches. Update passwords on your IoT devices Data at rest is important, but data in transit is just as important to encrypt, particularly sensitive information It is shocking how many IoT devices are used in our daily lives, such as security and video conference cameras, cars, and smart sensors, but also contraptions you probably forgot are now connected to the internet, such as garage doors, appliances, etc. Tom’s Guide gives a good list of the many things you should remember to update. Use encryption to protect data in transit Encryption your data at rest – when it is stored somewhere – is incredibly important. However, your encryption efforts should not stop there. Data in transit is just as important to encrypt, particularly sensitive information. This could include communication between your websites and applications or even just communications within your company. Unencrypted information is at risk to an eavesdropper on your network. To prevent the data from being usable to potential eavesdroppers, ensure you are using encrypted connections such as HTTPS, SSL, TLS, FTPS, etc.
Given the choice, would you rather run security at a bank vault or at a student halls of residence? At least the bank job is straightforward: Keep the money inside, and everyone else out. If only protecting hundreds of young people was so easy. Securing student accommodation Student accommodation blocks are usually large, with high traffic moving from bedrooms to common areas, canteens and libraries. A single resident travelling between her room, a study area, the gym and a couple of trips offsite would use secure doors 15 times a day. In a residence housing just 200 students, that’s 3,000 daily events for the access system to handle. Rapid student turnover puts a further admin burden on facility managers. Imagine, among hundreds of students living at the halls, just a handful leave or arrive each semester. That’s a couple of manual key handovers to schedule every week, and to chase if a key-holder fails to appear. If keys are not handed in, is a room really secure for its next occupant? And how can you know if one has been copied? With physical keys and mechanical locks, security lacks flexibility, and it’s impossible to get a site overview without a time-wasting manual key audit. Today’s students, tomorrow’s secure solutions Mechanical security is not the answer, because mechanical locks don’t offer the control or flexibility managers need. There’s no real-time monitoring, and you can’t generate detailed audit trails for locks or users, meaning there’s no easy way to track unauthorised access — in cases of a theft, for example. The current crop of students — so-called “Generation Z” — were raised as digital natives. They expect convenience as a standard feature, not a mechanical solution first used in Ancient Egypt. In Europe’s increasingly international, marketised higher education system, attracting these tech-savvy students and keeping them satisfied with the campus experience are critical.A wireless access control system like SMARTair™ solves admin problems with a combination of control and cost-effectiveness The SMARTair™ wireless access system is built to meet the challenges of securing a student residence: A system needs the product and software robustness to handle so many users, high traffic, and fast resident turnover. SMARTair™ has it. A system should make student life easier with cards, rather than keys. SMARTair™ does. A system should secure more than just doors, including cabinet locks and devices to protect secure areas like car parks. SMARTair™ does. A system must be easy to upgrade in the future, both adding new doors and upgrading the functionality of the devices already installed. SMARTair™ is; it future-proofs your investment. A system should be able to handle additional student services like the vending machines and canteen on the same credential card as the room door lock. SMARTair™ can. Swapping mechanical for wirelessA wireless access control system like SMARTair™ solves admin problems with a combination of control and cost-effectiveness. It is based on battery-powered locks and is easy to retrofit wirelessly to existing premises or incorporate in a new-build. Installers simply swap the existing mechanical lock for a wireless device and link the door to the management software. Slim, robust SMARTair™ devices can secure almost any opening. Escutcheons (with optional keypad for added security) are ideal for student bedrooms, and fit wood or glass, emergency exit and even fire doors. Available with or without PIN entry, SMARTair™ wall readers can filter lift, main door or car park access. The SMARTair™ knob cylinder is easy to retrofit to management offices; you just replace an existing mechanical cylinder with the SMARTair™ device. For storing belongings, SMARTair™ cabinet and locker locks are configurable in the same system without the need for an extra module. With SMARTair™, students come and go using programmable smart cards, tags, or even the secure SMARTair™ mobile app — not a cumbersome, easy-to-lose key. SMARTair™ devices support all major RFID technologies. Plus, students only need carry one credential to open their door and access additional onsite services. A single card to unlock their room, secure their belongings inside a locker, enter the library, pay for photocopying and buy lunch makes sense for them. It’s another step to boosting resident convenience.Because SMARTair™ devices run on standard batteries, the system is also cost-effective for accommodation providers And because SMARTair™ devices run on standard batteries, the system is also cost-effective for accommodation providers. Already trusted by students all over Europe SMARTair™ is already making life easier for student residence managers all over Europe, including at Mezzino’s Rialto Court in Middlesbrough, UK. “We are so pleased with the result. We are already looking to adopt the access control system for the other student accommodation properties we manage nationwide,” says James McGrath, Mezzino’s co-owner and director. At Funway Academic Resort in Madrid (www.funwayresort.com), student rooms are locked with SMARTair™ escutcheons. Energy-saving wall devices inside rooms regulate electricity use, and students have an individual safe fitted with a SMARTair™ cabinet lock. Students and staff open all their authorised doors with the same access card: the Funway gym, study rooms, games rooms, swimming pool and changing rooms, spa and staff areas are also locked with SMARTair™ escutcheons. “The system meets the expectations we had and offers very easy maintenance,” says Mario Arias, Facility Manager at Funway. To discover how SMARTair™ can upgrade student security and put you in total control of your halls of residence, visit www.tesa.es/smartair-students
The Ottawa Elementary School District is in Ottawa, Illinois, a river town 80 miles southwest of Chicago. The district consists of five schools, the campuses of which include Jefferson Elementary School, Lincoln Elementary School, McKinley Elementary School, Shepherd Middle Schools, and the Jefferson Elementary “Art House” building. In the spring of 2015 a variety of issues caused the schools’ administration to determine that they needed a surveillance system upgrade. The district’s IT director Kyle Olesen met with Nick Melnyk of systems integrator Ficek Electric & Communication Systems and the Arecont Vision regional sales team, ultimately sparking a major collaboration to redesign the surveillance systems used by all their schools. No formal coverage strategy The district had been using mostly analogue cameras for its school surveillance. The original cameras had been placed throughout the five campuses without a formal coverage strategy, greatly hindering the usefulness of the surveillance system. This prevented key areas from being effectively monitored and the images that were provided by the analogue cameras were of low quality. New challenges presented themselves as the project continued. With five completely different locations to work with, it was clear that the project would be a long-term one. It was imperative that the installation efforts be planned accordingly. Part of planning was to treat each school as a separate project with its own surveillance coverage layout and system requirements. Education session on IP technology Such a long undertaking also meant staffing challenges. The project manager changed five months into the project, resulting in the bidding process to be undertaken a second time. A The school then hired Chicago-based Architecture and Engineer company to help facilitate the project. Arecont Vision delivered educational sessions to bring the new firm up to date on IP megapixel camera technology. The Ottawa School District approved the installation of Arecont Vision cameras in all five locations in July 2016 During the first meeting with the district in 2015, the IT director was introduced to Arecont Vision megapixel single- and multi-sensor cameras. The end user was impressed, and a more in-depth meeting was scheduled. This led to walkthroughs at each of the five campuses to outline recommendations for camera locations and models. Detailed layout of coverage area The individual schools were pleased with Arecont Vision’s camera performance during this series of events, and the project continued into the design phase. During this period, the district received a detailed layout for each school. The layouts outlined the coverage area that each camera would provide. After completing the design phase, the systems integrator and the school district participated in the Arecont Vision Try-and-Buy Program. This program provided the end user community with the opportunity to experience Arecont Vision megapixel cameras before committing to a full installation. Impressed with what they saw, the Ottawa School District approved the installation of Arecont Vision cameras in all five locations in July 2016. Solutions installed Exacq Technologies, part of the Security Products business unit of Tyco, was selected as the video management system (VMS) provider. Exacq and Arecont Vision have thousands of joint installations for schools and other surveillance projects around the world. Exacq is a member of the Arecont Vision Technology Partner Program, and their VMS software is available in the Arecont Vision MegaLab certification and support facility for the best possible continued integration. The five schools utilise an array of Arecont Vision products throughout the district. The multisensor, panoramic 180o SurroundVideo and adjustable-view SurroundVideo Omni series provide coverage of large areas such as cafeterias, gyms, and parking lots. Arecont Vision pioneered the multi-sensor surveillance megapixel camera market in 2006, and has continued to lead the industry with new features, performance, and reliability. Now in their fifth generation, SurroundVideo cameras provide coverage with four individual megapixel sensors for superior situational awareness and outstanding image quality. The Arecont Vision camerasare monitored both locallyand remotely by the schools,using the Exacq software Arecont Vision MicroDome G2 series cameras were used for interior areas such as for coverage of hallways and doorways. MegaView 2 series cameras equipped with STELLAR (Spatio Temporal Low Light Architecture) technology were implemented for day and night outdoor coverage. The Made in USA Arecont Vision cameras used by the project are hardened against potential cybersecurity attacks, and cannot be repurposed for malicious purposes, giving the schools an added level of security protection. The Arecont Vision cameras are monitored both locally and remotely by the schools, using the Exacq software. Each school’s administration has access to the cameras monitoring their individual campus, allowing for real-time monitoring throughout the day. Video can be accessed remotely, with playback from any camera using district laptops and tablets. Superior image quality and user-friendly interface “The customer and our company are very satisfied and happy with the quality of the equipment,” said Nick Melnyk, of Ficek Electric and Communication Systems, Inc. “The accessories, the mounts, everything fit very well and works very well. That all comes into play because a lot of times you can be sent cameras with wrong accessories and other things that don’t fit, extending the installation process longer than it needs to be. For this project, installation went very smoothly.” “Arecont Vision provided superior image quality and a user-friendly interface,” continued Mr. Melnyk. “The school district was so pleased with Arecont Vision products that they are now looking to put additional cameras onto to the surveillance systems on most of the campuses.” Upon being asked if Arecont Vision could do anything better in the future, Mr. Melnyk stated, “We are very satisfied with everything we have received from Arecont Vision.”
Edmund Rice, formally Christian Brothers College, was established in 1926 and is an independent Catholic high school for boys located in the heart of the picturesque Illawarra district, to the south-west of Sydney. The founder of the Christian Brothers, Edmund Rice, lends the school its present-day name. Installation of new surveillance system Since 2013 Edmund Rice College has invested millions to bring cutting-edge facilities to their students, including a first-class sports hall, state-of-the-art computing facilities, and new learning spaces both inside and out. The school’s current 1980s analogue security system was only semi-operational and not up to the essential task of protecting these assets. Only authorised members of staff have access to review or download footage, with neither students nor teachers able to do so So, the headmaster called in Dean Scanlen from Forcefield Security to carry out repairs. Dean knew that continuing to repair the increasingly defunct technology was not a long-term solution: "I suggested, why not include the installation of a brand-new security system in the Sports Hall into the construction cost? I explained the savings that would be seen in the long term and how it was a perfect time to incorporate into the larger project.” The decentralised design of the MOBOTIX cameras with intelligent low bandwidth requirements allowed integration into the school’s existing network and MOBOTIX hemispheric technology meant fewer cameras cover larger areas. With licence-free regularly upgraded firmware, and cameras built to last and to stringent quality standards, MOBOTIX technology offered an economical long-term solution and was perfect for the school. Furthermore, as many areas to be covered were internal, the competitive pricing of the indoor range brought even greater savings upfront. "In order to convince them, I suggested that they try out one MOBOTIX camera. They used it for a month, and came back more than happy and ready to go ahead with the entire installation,” Dean explains. MOBOTIX video surveillance solutions A combination of M15s and D15 easily protected the exterior of the building and only a single i25, MOBOTIX hemispheric indoor camera, was needed to cover the entire sports hall arena A modern alarm system was fitted in the Sports Hall and MOBOTIX cameras were installed around the outside and inside of the building. A combination of M15s and D15 easily protected the exterior of the building and only a single i25, MOBOTIX hemispheric indoor camera, was needed to cover the entire sports hall arena. Positive results were seen quite soon afterwards, with the access reliable footage acting to reduce incidences of bullying and fighting. Extremely happy with the installation, the school were eager for the newly refurbished library to be secured next. By this stage the VMS (video management software) had been upgraded to the newly released MxMC (MOBOTIX Management Centre), making installation even simpler. In spite of its size, the library only required 2 indoor hemispheric c25 cameras to monitor the whole area. Q25s and D15s were installed to keep a watchful guard on the entrance and exterior respectively. Thanks to MxMC’s intelligent sorting of all parameters, which supports visual control and drag&drop, installation time was significantly cut. Pros of MOBOTIX decentralised technology MOBOTIX decentralised technology keeps bandwidth requirements extremely low, allowing a secure subnet to be installed on the school’s existing network without causing any extra burden. Indeed, at busy times, such as during class when students are using computer equipment, the cameras delay sending footage, storing it in a buffer designed specifically for this purpose. “IT didn’t even see an imprint of MOBOTIX on their network,” Dean explains. Edmund Rice College can now look to the future with reassurance, knowing that they have a scalable, flexible security system built to last Live monitoring takes place in a local control room performed by security staff, and only authorised members of staff have access to review or download footage, with neither students nor teachers able to do so. Further measures were taken to protect the privacy of students in view of the new system, by disabling all microphones on the cameras during teaching hours. However, at night time, the microphones are switched on through a custom setting, so that the control room can speak to anyone on site using remoteGUARD. Protection against vandalism The cameras have already had their first major win protecting computer equipment from vandalism. “Someone had been swapping the letters over on the keyboards in the computer room,” Dean explains. “Using MxMC, we reviewed the recordings and found perfect footage of the culprits in action. They were reprimanded and asked to pay for new keyboards. It had happened in the past and the school hadn’t been able to catch them, until now.” Edmund Rice College can now look to the future with reassurance, knowing that they have a scalable, flexible security system built to last. MOBOTIX decentralised technology made installation simple, with no new cabling nor additional infrastructure required. This, along with the great coverage provided by hemispheric technology and the lower price point of indoor cameras, meant a sophisticated security system was also affordable. And, because MOBOTIX firmware is licence-free and regularly updated, the school have the reassurance of knowing the system will remain cutting-edge for many years to come.
The high-mount external detector, XDH10TT-AM, showcases the innovation, reliability and quality upon which Pyronix has built its reputation. Usability, adaptability and reliability From the various mounting options and proven Tri-Technology to Anti-Interference Technology, which consists of Anti-Masking and Anti-Blocking, the XDH10TT-AM has been manufactured with usability, adaptability and reliability in mind. Whether a residential, industrial or commercial installation, the XDH10TT-AM maintains maximum performance. For schools, this is the ideal perimeter detector to protect playgrounds and perimeter walls. This provides the peace of mind necessary for knowing that students, as well as school buildings, are safe from unwanted visitors during or after school hours. Tri Signal Detection Logic The detection of human presence is based on the advanced analysis of the activation sequence of the microwave movement sensor and the two independent digital PIR sensors. All three sensors have to activate at the same time in a particular time window to create an alarm. Using tri signal detection logic enhances the detector’s immunity to environmental disturbances. Residential protection In terms of residential protection, the XD also delivers superior security for gardens, drives, exits, perimeter walls or outbuildings. The XDH10TT-AM provides the ultimate external security solution for literally any scenario.
Hult International Business School provides a unique and innovative educational programme based on real market insight to their students all over the globe. Looking for a more efficient class attendance control system on their campuses, Hult took notice of TBS’s touchless, wireless connectable and hygienic 3D technology. TBS’s 3D touchless technology The initial project was originated in Dubai under the guidance of Ahmed El Banna, who said: “The main reason for Hult to select TBS was the reliability of the technology and the team behind it. Among many companies tested, TBS’s 3D technology has successfully proven to be reliable in identifying our most difficult cases. We were applying a system that wasn’t familiar to many companies and that is where TBS’s smart team and personalised customer service around the clock and around the globe came in handy. We were also keen for a software that is easy to use and preferably on the cloud, which we found with TBS.” School administration and students were impressed by how well the devices integrate into the school’s routine and architecture: “The design of the 3D devices has fit our modern premises on Campus as if to measure, which was also an important selection criteria”, says El Banna. The Hult team developed a wirelessly connected kiosk, placed at the entrance of each classroom, ensuring that all students sign in, even if they arrive late. Installation over 3 continents The installation on the Dubai campus served as a persuasive example to Hult’s other locations, spanning over 3 continents. Expansions to their London, Boston and San Francisco school sites were completed maintaining and synchronising the worldwide data in real time. Hult’s new attendance automation system can be extended to any additional location anywhere in the world at any time. This project was realized in collaboration with the Interflex partner NTS for installation in London and global support, Kratos for installation in the US and with the effort of the Hult teams in Dubai, London, and the USA. The solution is scalable and can expand to cover other sites such as the Shanghai campus. The TBS 3D-Terminal is a three-dimensional, contact-free fingerprint sensor, using three integrated cameras for its scanning process. TBS systems is designed in particular for high security and large user groups. It can be used with TBS BioManager software or integrated into any existing security software.
Avigilon Corporation, a provider of trusted security solutions, announces that it has been selected by Fulton County School System, in Atlanta, Georgia, United States, to enhance safety for over 100 schools. Fulton County School System Fulton is the fourth largest school district in Georgia. Its mission is to provide a safe and secure environment for its over 96,000 students and more than 12,000 full-time employees. To help enhance safety, Fulton has installed a full Avigilon surveillance solution that includes Avigilon cameras with self-learning video analytics, Avigilon network video recorders, and Avigilon Control Center (ACC) video management software with Avigilon Appearance Search technology. Fulton is also deploying Avigilon Access Control Manager to secure physical access points, providing an integrated security solution for the district. Avigilon Appearance Search video analytics technology Avigilon Appearance Search video analytics technology uses a sophisticated deep learning artificial intelligence (AI) search engine to sort through hours of footage with ease. This technology allows Fulton’s operators to click on a button and search for all instances of a person or vehicle across all cameras on a site, quickly and efficiently. This can save Fulton time and effort during critical investigations as Avigilon Appearance Search technology intelligently analyses video data, helping to track a person’s or vehicle’s route, and identify previous and last-known locations. “At Fulton County Schools, the safety of our staff and students is paramount,” said Paul Hildreth, Emergency Operations, Safety, and Security for Fulton. “We chose Avigilon because of the capabilities it offers in its advanced video analytics search technologies, including Avigilon Appearance Search. Their analytics are easy to set up and use, and can save us valuable time and effort, ultimately making our schools a safer place for generations to come.” “We designed our artificial intelligence-driven Avigilon Appearance Search technology to change the way people interact with their video surveillance systems,” said James Henderson, Avigilon’s President and Chief Operating Officer. “The Avigilon solution at Fulton County Schools is a great example of how our technology can provide quick and powerful insights to help keep schools safe.”