Education security applications
Prama Hikvision partnered with the Sanjivani Group of Institutes to offer latest surveillance and security solutions. For the first time that Artificial Intelligence was offered, and enabled face recognition terminals in India’s education sector. Sanjivani Group of Institutes situated at Kopargaon, Ahmednagar is a premier institute for Engineering, Pharmacy, Nursing and Diploma in Ahmednagar District. Sanjivani took its names and inspiration from the famous epic of Ramayana where ‘S...
Access control has become a central component for the safety and security strategies of today's schools, and due to the complicated threats and challenges these facilities face, a school's access control technology must be innovative and intelligent enough to ensure comprehensive protection. The education sector is a gateway to the future for young people all over the world. But to assure this passage, schools must guarantee their students safety as well as their education. One such example of...
When a leading English university sought electronic locks for its newest student accommodation block, it turned to Aperio to extend its installed Gallagher Command Centre access control system. The University of East Anglia (UEA) has relied on Gallagher access control for a decade. To extend their Gallagher Command Centre system to Crome Court—a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates—they needed the right wireless solution....
The University of Birmingham educates over 30,000 students, with more than 6,000 doors providing access to student accommodation. Gallagher’s integrated access control solution is responsible for providing operational continuity and creating a safe and secure environment for students. Access management system The University recently completed its new state-of-the-art student accommodation development, Chamberlain, which consists of a 19-storey tower and three low-rise blocks. An essentia...
Headquartered in a designated facility, the Compton Unified School District (USD) Police Department is committed to providing a safe and secure educational environment for students, staff, and parents. It strives to prevent criminal or delinquent behaviour that has a negative impact on the educational process within the schools and community. Located in a suburban Los Angeles community with a high crime rate, Compton USD is among the 75 percent of schools that have adopted video surveillance so...
The Monterey Bay Aquarium has a rich history of innovation. Since its founding in 1984, the facility has become one of the world’s leading public aquariums and ocean conservation organisations. Monterey Bay Aquarium has produced significant insights into the life history of sharks, sea otters, and bluefin tuna. The aquarium also was the first to exhibit a living kelp forest, and in 2004 it was the first to successfully exhibit and return to the wild a young great white...
Booth number: 14039 Dahua Technology USA Inc. will display video surveillance solutions, access control and intercoms at ISC West. Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. The first year that we exhibited at ISC West was in 2012. That was before we had a local US operation. The market started to pick up our brand and was surprised that we offer extensive product portfolios. In 2014, we registered our US office and continued to participate in ISC West. Through our presence at the show, customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints. We are local here and help our customers to grow their business and increase their satisfaction with us. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organisation Q: What strategies do you use to get the most out of exhibiting at ISC West? A trade show is definitely a lot of investment within a few days. Therefore, how we create the best ROI and meet the right customers are very important. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organisation, including products and technical expertise as well as the sales team. We use an internal and highly coordinated plan with the team to get a better result. We make sure everyone is on the same page in terms of the products/technology we are going to present and have the people with the best knowledge to present to customers who visit our booth. Therefore, a highly coordinated team strategy is required. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Every company has their ways to follow up with the leads and evaluate the ROI from the show. The way we are using is to upload all our leads to our software and track all these leads afterwards. If they are not already buying from us, our goal is to convert them to become a registered dealer. Customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints If they are already our registered dealers, we seek to grow their business by using our latest technology solutions. In general, all marketing activities in business today require a clear ROI, and it has to tie into the sales numbers. From our experience, the ISC West show provides the best ROI among other shows in the North American market. Q: What company activities (outside the show floor) does your company organise each year? We have a partner event and invite our value-added dealers and partners. We’ve been hosting this event since 2015. Q: What sets ISC West apart from other trade shows on the calendar? As I mentioned, ISC West provides the highest ROI among other shows in the North America market. This show also brings many of our customers and partners to the city as well. I guess people value this opportunity to meet and discuss the technology, the industry trends, and the business to figure out how we can grow together. Other trade shows might be smaller than ISC West and targeted at different markets or address different scopes of the industry need. Every show we attend in 2019 plays a strategic role for us to communicate with the market and find the customers we are looking for.
Booth number: 8045 Costar Technologies, Inc. is a public company that designs, develops, manufactures and distributes a full range of products for the video surveillance and machine vision markets. Costar consists of five operating companies: Arecont Vision Costar, CohuHD Costar, Costar Video Systems, Innotech, and IVS Imaging. The combined product portfolio consists of surveillance cameras, video surveillance systems, recorders, monitors, lenses, cables, accessories, and cloud-enabled services. For more about their presence at ISC West, we contacted Jeff Whitney, Vice President of Marketing for Arecont Vision Costar, a Costar Technologies, Inc. business unit. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. One of our companies, Arecont Vision, exhibited in ISC West booth 17147 in 2005, a tiny space on which the hopes of the company rested. At the time AV was focused on pioneering IP megapixel surveillance cameras, but today we are part of Costar Technologies, offering cameras, VMSs, and recorders. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry. Talking with those who were with the company at time, the enthusiasm of the booth team reached the security dealers and systems integrators who were attending, helping bring megapixel cameras to a much wider audience. Q: What strategies do you use to get the most out of exhibiting at ISC West? The Costar companies have a very deep portfolio of products for the security market, and we bring our latest products from each business unit to ISC West. Attendees come in part to see the latest tech, and we drive our development cycle to have exciting new products to unveil on the show floor. We also have meeting space in the booth to provide one-on-one time with our executives and sales team, while sponsoring free admission to the expo for all who want it. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Unveiling our latest products and solutions to existing customers and partners is key to a successful event, and ISC West’s large impact on the industry ensures that many will attend. Perhaps even more important is informing those attending of the strength of the Costar product portfolio, including many Made in USA products and services that others don’t deliver. Both help to drive leads for projects in which we can really benefit our partners and end user customers. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show Q: What company activities (outside the show floor) does your company organise each year? A large show like ISC West brings many of the Costar business units together, providing an excellent opportunity to continue bonding as a team, as well as to participate in events beyond the show floor. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show. Q: What sets ISC West apart from other trade shows on the calendar? ISC West brings a very large number of interested, security-focused systems integrators, dealers, consultants, and end user customers all to one place for a three-day expo. That audience and opportunity to share our message validates the investment any large show requires from Costar or others. While some industry events have struggled to find and maintain their audiences, ISC West continues to deliver quality, knowledgeable attendees from across the Americas and around the world. The show differs from other events we do, which are typically regional in attendance or focused more on specific vertical markets.
Booth number: 12089 At this year's ISC West, VIVOTEK USA, Inc. will be showcasing their 180⁰/360⁰ product line plus other general form factors with new features and benefits, including a cybersecurity application embedded onto the cameras, crowd detection, smart motion detection, tailgating, and many more. In addition to IP cameras, VIVOTEK will display a comprehensive product line that also includes NVRs, video receivers, video servers, PoE switches, and video management software. Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. We have come a long way from a little-known surveillance manufacturer with a small booth size VIVOTEK has been an exhibitor at ISC West for many years now. Looking back, we have come a long way from a little-known surveillance manufacturer with a small booth size to one of the global providers in the security industry with a recognisable and trusted brand. Now, we are well-known in the industry and are proud of our accomplishments, but we feel greater things are still in front of us. Q: What strategies do you use to get the most out of exhibiting at ISC West? Each year, we want our booth to tell our stories – who we are, what we do and what we are capable of, and where we are heading. We do not want to just be another camera manufacturer who only promotes and displays products; we want to be the solution provider that customers are looking for. In addition, we have very knowledgeable sale managers who can assist visitors at our booth who are looking for surveillance, whether it’s an upgrade or a totally new solution. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Gain industry knowledge and perspective as to where surveillance security industry is heading Like any trade show, it is difficult to quantify success. We attend ISC West to promote the VIVOTEK brand, meet and discuss with customers and gain industry knowledge and perspective as to where surveillance security industry is heading. If we achieve these, then ISC West is a success for us. Q: What company activities (outside the show floor) does your company organise each year? Our main focus each year at ISC West has always been the interaction with customers and potential customers on the show floor. We pride ourselves in the products and technology we offer, and there aren’t any other trade shows in North America to showcase our capabilities than ISC West. Q: What sets ISC West apart from other trade shows on the calendar? ISC West is the industry standard of security trade shows in North America. Since we are a security surveillance manufacturer, ISC West is the one show that all manufacturers in this industry must attend.
Booth number: 26041 March Networks is a global provider of video surveillance and video-based business intelligence solutions. Their product portfolio is end-to-end, ensuring that customers can deploy comprehensive solutions designed to help them address real business challenges and improve performance. At ISC West this year, March Networks will be showcasing new hosted services, new PTZ cameras and additional offerings. Attendees will also be encouraged to discover their solutions for banking, retail, cannabis and transportation – all of which help organisations transform video into business intelligence through the integration of surveillance video, analytics, and data from business systems and IoT devices. For more about their presence at ISC West, we contacted Peter Strom, President and CEO, March Networks. And not surprisingly, the technology was a lot less sophisticated compared to what we see today Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. I believe March Networks first exhibited at ISC West in 2001. I did not join the company until 2003, however I had been working in the industry for several years already, and can recall that the exhibitions back then had a much different feel. For one thing, there weren’t the very large companies we see today dominating a lot of the landscape. And not surprisingly, the technology was a lot less sophisticated compared to what we see today. Anyone who has worked in physical security for a long time can attest to the remarkable shift we have seen over the years, first with the transition from analogue to IP video and all that entails, to security analytics, to today’s truly advanced business intelligence applications, hosted solutions, and artificial intelligence, computer vision and similar content analytics. Q: What strategies do you use to get the most out of exhibiting at ISC West? Our most effective strategy by far is scheduling our business meetings in advance of ISC West. Our sales team does a very good job of planning meetings with enterprise end users and channel partners ahead of time, so we’re hitting the ground running even before the doors open on Day 1 of the event. In addition, our channel partners are also very well organised, and know which organisations they are going to bring to our booth during ISC West. This pre-planning saves us a tremendous amount of time and ensures that we make the most of the opportunity to meet face-to-face with the many decision-makers who have travelled to the show. The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year Q: How do you quantify your success at ISC West? What ROI do you receive from the show? The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year. Of course we do track the number and quality of the leads we capture as well; however, our face-to-face meetings with end user organisations and channel partners are the primary measures of our ROI. Q: What company activities (outside the show floor) does your company organise each year? The activities we organise outside of the show floor vary from year to year. We have hosted customer appreciation events and roundtable events. We will typically organise an internal sales meeting as well to take advantage of the fact that many of our salespeople and product managers are in the same location. Q: What sets ISC West apart from other trade shows on the calendar? The timing of ISC West is good for most people, as it is still early enough in the budget cycle for most customers to leverage the show to help make decisions – particularly in our banking, retail, cannabis and transit target verticals. Holding the event consistently in Las Vegas is also beneficial, as it makes it easier for people and exhibitors to plan in advance. The city itself is well equipped to handle large exhibitions, offering everything from a central conference space at the Sands to the convenience of nearby accommodations, restaurants etc. Travel is typically convenient as well. In our opinion, ISC West is the premier industry show in North America and appears to be gaining momentum each year.
Booth number: 18037 Hikvision will showcase a wide-range of its video surveillance solutions and security products such as its DarkFighterX dual-sensor with patented bi-spectral fusion technology for low light color imaging; thermal technology for critical perimeter applications, as well as preventive maintenance through temperature alarming and fire detection; specialty solutions for vertical markets including retail, education, gaming and commercial real estate with tailored products and valuable business intelligence analytics; TurboHD (HD over coax) for high resolution video using existing cabling; PanoVu and multi-sensor cameras. We will also feature Hikvision’s central management system, HikCentral, which provides a highly-scalable, reliable, and efficient centralised system management. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience? Hikvision has exhibited at ISC West since 2006. Our presence has grown considerably since then. Each year we showcase Hikvision’s latest technologies and the evolution of the brand through ad campaigns: “Heartbeat of Security” (2016), “Art of Video Surveillance” (2017), and “Achieve Extraordinary” (2018). At ISC West, Hikvision enjoys re-connecting with existing customers and developing new partnerships. Over the years, Hikvision has demonstrated growth and strength within the industry and will continue to support its partners through the dedicated workforce that makes up Hikvision North America. Q: What strategies do you use to get the most out of exhibiting at ISC West? The strategy is simple. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners. With our latest products displayed at our booth and our team of product managers, vertical-market leaders, and other technical gurus readily available in one place, it’s a great opportunity to connect with our current and future partners. Of course, we also have one-on-one client meetings in our meeting rooms throughout the show. And, we also host interactive experiences including trivia games, product demonstrations, and other technical presentations at the Thought Theater in our booth. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Hikvision quantifies its success with a variety of metrics including traffic throughout the booth, attendance at educational sessions we host, the number of meetings we conduct with customers, and responses from our sales team on the engagement with integrators and end users after the show. We also measure the feedback we receive from our advertising campaigns whether it’s through our signage at the show or coverage in publications. Q: What company activities (outside the show floor) does your company organise each year? We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners, and end users. We consider it a fun way for us to say thank you to our valued partners in a casual setting. We’re also an enthusiastic sponsor of the Mission 500 Security 5/2K. Hikvision is fielding a running team, and we’ve begun our fundraising in earnest. Corporate social responsibility is part of our DNA at Hikvision, and the Security 5/2K is a wonderful way to join with our security industry colleagues to make a difference in kids’ lives and give back. Q: What sets ISC West apart from other trade shows on the calendar? Hikvision attends a variety of important conferences and trade shows throughout the year, but ISC West is the big show that attracts international attendees that everyone looks forward to. We wouldn’t miss it.
Booth number: 20031 Pelco is highly invested in providing end-to-end video surveillance solutions for customers, so this priority will remain the same in 2019 and beyond Pelco’s priorities for 2019 at ISC West are informed by worldwide trends in the security industry. As a result, Pelco will be focusing on enhancing cloud connectivity and cybersecurity for their customers. In addition, VideoXpert is Pelco’s best-selling video management solution, so this system will be the primary solution focus moving forward. Pelco is also planning to build upon Pelco Professional Services, which will include VxCare, a three-tier service plan for VideoXpert owners available worldwide this May. Overall, Pelco is highly invested in providing end-to-end video surveillance solutions for customers, so this priority will remain the same in 2019 and beyond. Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. Pelco was established in its current form around the year 1987, we have been attending ISC West since at least then. One memory that stands out is having to make many coax cables connect with all the analogue cameras and switchers. Q: What strategies do you use to get the most out of exhibiting at ISC West? We truly value the media relationships we’ve nurtured over the years. The security trade media specifically have played a pivotal role in sharing the latest news as it relates to our industry and ISC West. In addition to media relations, e-mail blasts and blogs are also key tools to build buzz around our exhibit. Lastly, we utilise a playbook and training protocols developed for our sales department. This information ultimately benefits our customers because they will receive accurate and up-to-date information about our video surveillance solutions. One way we quantify our success at ISC West is to keep track of the number of people attending our booth Q: How do you quantify your success at ISC West? What ROI do you receive from the show? One way we quantify our success at ISC West is to keep track of the number of people attending our booth. The show is considered the premier event in North American security so a major way we measure our ROI is through initial or final meetings with customers and partners. These initial connections can happen on or near the show floor. In addition, our product managers and engineers create a dialogue with our customers so they can determine the transferrable value of a potential solution, which in turn influences our product world map. Q: What company activities (outside the show floor) does your company organise each year? We have participated in the Security 5K in support of Mission 500. Additionally, we sometimes host customers at local end user sites so they get to see the system in operation. Q: What sets ISC West apart from other trade shows on the calendar? It’s the best-attended security conference in North America by far, attracting both domestic and international visitors.
The cyber security threat is constant and real. Entire businesses, large enterprises and even whole cities have been vulnerable to these attacks. Growing threat of cyber attacks The threat is not trivial. Recently, two cities in Florida hit by ransom ware attacks – Rivera Beach and Lake City – opted to capitulate and pay ransom totaling more than $1.1 million to hackers. The attacks had disrupted communications for first responders and crippled online payment and traffic-ticketing systems. It was reminiscent of the $4 billion global WannaCry attacks on financial and healthcare companies. A full two years after the WannaCry attack, many of the hundreds of thousands of computers affected remain infected. And hackers are continuously devising new techniques, adapting the latest technology innovations including machine learning and artificial intelligence to devise more destructive forms of attack. Indeed, AI promises to become the next major weapon in the cyber arms race. For enterprises, there is no choice but to recognise the threat and adopt effective countermeasures Enterprise security For enterprises, there is no choice but to recognise the threat and adopt effective countermeasures. Not surprisingly, as the number, scale and sophistication of cyber-attacks has grown, so has the significance of the Chief Information Security Officer, or CISO, who owns the responsibility of sounding the alarm to the C-suite and the board – and recommending the best defense strategies. Consider it a grim irony of the digital economy. As companies have migrated to the cloud to gain scale and efficiency and integrated new channels and touch points to make it easier for their customers and suppliers to do business with them, they have also created more potential points of entry for cyber-attacks. IoT increases threat of cyber-attacks Amplifying that vulnerability is the trend of allowing employees to bring their own laptops, smartphones and other digital devices to the office or use to work remotely. And thanks to the Internet of Things, as more devices connect to enterprise systems – from thermostats to cars – the threat surface or targets of intrusion are multiplying exponentially. According to the McAfee Labs 2019 Threats Predictions Report, hackers will increasingly turn to AI to help them evade detection and automate their target selection. Companies will have no choice but to begin adopting AI defenses to counter these cybercriminals. Importance of cyber security This escalation in the cyber arms race reflects the sheer volume of data and transactions in modern life. In businesses like financial services and healthcare it is not humanly possible to examine every transaction for anomalies that might signal cyber snooping. Even when oddities are glimpsed, simply flagging potential problems can create so-called threat fatigue from endless false alarms. What’s more, attacks like those from Trickbots are specifically designed to go undetected by end users. The fact is, even if throwing more people at the problem were a solution, there aren’t enough skilled cyber security workers in the world. By some estimates, as many as 10 million cyber security jobs now go unfilled. AI is being used to conduct predictive analysis at a scale beyond human means Deploying AI As a result, AI is being deployed on multiple cyber-defense fronts. So far, it is mainly being used to conduct predictive analysis at a scale beyond human means. AI programs can sift through petabytes of data, identifying anomalies and even helping an organisation recognise and diagnose intrusions before they turn into catastrophic attacks. AI can also be used to continually monitor and allocate levels of access to a network’s multitude of legitimate users – whether employees, customers, partners or suppliers – to ensure that all parties have the access they need, but only the access they need. Countering cyber security threats To harden defenses, some AI programs can be configured to perform simulated war games To harden defenses, some AI programs can be configured to perform simulated war games. Because cyber attackers have stealth on their side, organisations might need dozens of experts to counter only a handful of attackers. AI can help even the odds, scoping out the potential permutations of vulnerabilities. As CISOs – and the CIOs they typically report to – advise C-suites and boards on their growing cybersecurity risk, they can also help those leaders recognize an enduring truth: AI programs cannot replace experienced cybersecurity professionals. But the technology can make staff smarter, more vigilant and more nimbly responsive. AI-based cyber security tools Financial and healthcare companies are leading this charge because of the sheer volume and variety of transactions they handle and because of the value and sensitivity of the data. Organisations like the U.S. Department of Defense and the space agency NASA, as well as governments around the world are also implementing AI-based tools to address the cyber threat. For businesses of all types, the threat stretches from the back office to the supply chain to the store front. That is why recognising and countering that threat must involve everyone from the CISO to the CEO to the Chairman of the Board. The AI arms race is underway in security. To delay joining it is to risk letting your enterprise become one of the grim statistics.
With the recent news headlines about store closures and the collapse of well-known chains, alongside clear adjustments in business strategy amongst established high street favourites, there is no denying that the UK retail industry is under huge pressure. A recent report suggests growing issues are leading some retailers to increase risk-taking in the supply chain. But here, Steve Bumphrey, Traka UK Sales Director, looks at ways to help retailers embrace the storm, including paying attention to security, management processes and efficient customer focus. Challenges plaguing retail industry It’s been an awful year to date for UK retail if you believe the cacophony of negative headlines about the health of the UK economy and the confidence levels of the UK consumer. The sector is facing huge challenges in dealing with the evolution in on-line and smart mobile retailing The sector is undoubtedly facing huge challenges in dealing with the evolution in on-line and smart mobile retailing. Further concerns include an unwillingness of policymakers to address the changing retail environment and how business rates and general business taxation and regulation is making a difficult situation worse. Supply Chain Risk Report According to the latest Global Supply Chain Risk Report, published by Cranfield School of Management and Dan & Badstreet, those under pressure, are now facing increased exposure to risk if they are forced to cut costs in their supply chain. The report cites data for the retail sector that shows increased levels of risk-taking since Q4 2018, with retailers reporting high levels of dependency on suppliers and indicating a propensity to off-shore to low-cost, high-risk countries where suppliers are more likely to be financially unstable. In-store technology revolution The underlying evolution of technology taking hold of the retail industry and consequential changing consumer behaviour is what is really forcing the industry to step up and act. This is not only in the shift to online and smart mobile purchases, but also with the increased use of technology in store. Self-scanning and checkouts In a bid to enhance the physical shop experience, especially in supermarket outlets across the UK, retailers are increasingly giving customers autonomy with self-scanners and checkouts and need to be able to trust them to ensure an honest transaction. And for the shoppers, this dependency on technology and not human interaction to complete a shop means scanners must be instantly available and ready for use. Many different underlying competing challenges impact the retail industry Compensators At the recent British Retail Consortium’s ‘Charting the Future’ conference, looking at retail crime and security, Dr Emmeline Taylor, a criminologist at the City University of London identified in self -service shops, several new types of ‘offenders’ such as so-called ‘compensators’ including the atypical ‘frustrated consumer’ who, “fully intended to pay but were unable to scan an item properly”, adding to the security challenge. There are clearly many different underlying competing challenges impacting the retail industry. Arguably, the increase in technology and autonomous shopping, where less staff are present (or staff cuts planned) throws up more vulnerabilities, such as the opportunity for store theft. Use of body cameras Staff needs emerging technology such as body cameras to act as a deterrent to crime and keep employees safe Furthermore, staff may need greater use of emerging technology such as body cameras to act as a deterrent to crime and help keep employees safe. In essence, prevention is better than cure, and it’s certainly cheaper. Whether combating crime physically or online, or looking to find ways to counter the high street trends, working together, sharing information and taking a more holistic approach will help the development of a shared language between retailers. Retail banking It is also here where common approaches can help to deliver on efficiencies, in time, resource and budget that can serve to operate right through the supply chain, and minimise, or even negate the need to take any risks. It can even serve to enhance the customer experience, increasing confidence in the shopping environment. Of course, when discussing the high street, it is not just the department stores and chains that are feeling the impact. Well known banks are also having to redefine their priorities and role on the high street, with customers (especially younger generations) demanding a more efficient service than ever before. Well known banks are also having to redefine their priorities and role on the high street Asset protection Leading the way is Nationwide, globally renowned building society, which prides itself on being one of the largest savings providers and mortgages provider in the UK, promoting itself as running purely for the benefit of its customers, or ‘members.’ Richard Newland, Director of Branch & Workplace Transformation at Nationwide said, “Even more than getting a good ‘deal’ from a building society, the quality of our welcome, or our renowned level of service, we make sure our members feel safe with us, enough to trust us with their greatest assets. We are doing everything we can to evolve our business and focus our efforts on providing the best and most secure services that people value.” Key management systems Traka has supported Nationwide with the introduction of dedicated key management systems So committed to its branch network, it has pledged to its 15 million members that every town and city with a Nationwide branch, will still have one for at least the next two years. A bold statement in today’s climate. Traka has supported Nationwide with the introduction of dedicated key management systems, moving its branch network into a more digital system. Keys no longer need to leave site and the audit trail capability has helped to remove the manual paper recording, allowing status of keys to be established instantly, at any time. Changes in retail market This example, together with Traka’s portfolio of high street brands and globally renowned department stores that cannot be named for security reasons, demonstrates the need for retailers to embrace the need for change, both from a product offering and operational running perspective to achieve aspirations of resonating with customers. They also prove the opportunities for success, in an unquestionable difficult market environment. If retailers can listen to customers and respond accordingly, taking into consideration staff safety and security, alongside an ability to respond quickly to personalised enquiries and expectations. This way, perhaps, the current environment can be seen as an opportunity to innovate and embrace technology to form the high street of the future.
Airport environments have become more sophisticated and complex over the course of the last 20 years. What was once a simple structure to facilitate travel from point A to point B has now been transformed into a hustling and bustling setting that offers passengers the comforts and conveniences of a small city. As a result, the complexity of risks that airport operators face has grown exponentially. Security personnel must now mitigate risks like terrorism, theft, personal safety and insider threats all while streamlining operations to help preserve a positive passenger experience. Beyond the visual of long and winding security checkpoint lines, most travelers are unaware of the vast amounts of work that take place behind the scenes to ensure their safety. Increasing passenger numbers On top of the typical, day-to-day concerns security operators face, airports are only becoming busier. According to the United States Department of Transportation’s Bureau of Transportation Statistics, 2018 was a record-breaking year for air passenger travel. U.S. airlines and foreign airlines operating in the United States saw 1 billion passengers fly, which was a 4.8% increase from 2017. As these numbers continue to increase, the demand on airport security personnel to keep people and property safe also increases. This is why the latest advancements in security technology are critical as part of a comprehensive and cohesive airport security strategy. Let’s take a look at some of these advancements and how they are helping airport security operators mitigate risk. U.S. airlines and foreign airlines operating in the United States saw 1 billion passengers fly, which was a 4.8% increase from 2017 Video-based command and control Airports are operational 24 hours a day, 7 days a week, which means it is paramount (and typically mandated) to have video as the heart of modern-day security operation centres (SOC). In today’s data-focused environment, security personnel rely on a multitude of solutions and systems, which often include video surveillance, access control, alarm notifications, and more, to ensure comprehensive protection of passengers. What’s needed is a single, unified platform with integrated event management and response The rising influx of information from these systems can often be overwhelming, and in most cases, manual processes are used to manage across these domains in an attempt to achieve a coordinated response. These manual processes are not scalable. What’s needed and is now being introduced to the market is a single, unified platform with integrated event management and response to allow security operators to maximise situational control and determine the appropriate intelligence-powered response. Real-time situation management The combination of real-time video, with information from a variety of additional sensors, devices and applications is changing the game for airport security personnel. Now, in the event of an incident, security officials can use this data to gain enhanced situational awareness of what’s happening and deliver actionable insights to efficiently and effectively respond to the incident. Through numerous information sources and security systems, airports can benefit from a modernised and enriched investigative experience for a broad and deep understanding of routine or emergency situations. Advanced analytics Analytics are a powerful resource that gives security teams the ability to discover significant patterns and obtain insightful knowledge from video surveillance data. Advanced algorithms can be the key in providing early warnings to assist in detecting threats, helping to establish a proactive security strategy. By effectively correlating and assessing data, airport officials can bring latent intelligence to the forefront and present a more complete view of security situations. Additionally, analytics can automate predefined standard operating procedures to help minimise human error and optimise resource utilisation. By effectively correlating and assessing data, airport officials can bring latent intelligence to the forefront and present a more complete view of security situations Mobile reporting The Internet of Things (IoT) and ubiquitous connectivity have brought remote capabilities to airports, where instantaneous information sharing is paramount. Mobile reporting solutions allow passengers and employees to act as additional “eyes and ears”, bringing critical safety alerts to the attention of security officials. Information shared by passengers and employees can be extremely beneficial to help shed light on a security incident and enable faster and more efficient response. Some solutions even offer the ability to share video and audio with the command centre through a passenger’s smartphone. Facial recognition technology Facial recognition can provide situational intelligence through detecting, tracking, and alerting on persons-of-interest A powerful and versatile security solution, facial recognition can provide situational intelligence to security operations centres through detecting, tracking, and alerting on persons-of-interest appearing in video streams across multiple sites and thousands of cameras simultaneously. These systems are capable of forensic-search recognition capabilities and can be compared against national, local or custom databases to make investigations faster and more efficient. Interest and adoption of the technology is growing, with new use cases being introduced daily. The solution is sure to become a valuable tool in the years to come. In short, airports are very much like small connected cities, featuring a landscape with a variety of assets, a wide range of stakeholders, and numerous sites that keep safety at the forefront of the public eye. However, while global risks and day-to-day challenges can be difficult for security operators to manage, today’s advanced and intelligent technologies can ultimately help improve the overall traveler experience.
Gunshot detection today is part of more physical security systems than ever before, and many manufacturers are developing interfaces to the latest gunshot detection technologies. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform, Security Center. Thanks to this integration, police departments and security professionals will be able to receive more actionable information, gain rapid access and detailed location insights when a gunshot situation occurs. Cloud-based analysis software ShotSpotter uses wide-area acoustic surveillance that automatically gets activated when gunfire occurs ShotSpotter uses wide-area acoustic surveillance that automatically gets activated when gunfire occurs, providing comprehensive outdoor coverage on campuses and in complex urban geographies. ShotSpotter sensors and cloud-based analysis software triangulate and pinpoint the precise location of each round fired within seconds, the number of shots fired and provide an immediate gunfire alert with an audio clip. Data capture form to appear here! Detailed incident data is immediately sent to SST’s Incident Review Center (IRC), a secure data processing and alert validation facility, where acoustics experts analyse the data and qualify the incident in real-time 24/7. Once validated, an alert is sent directly into Genetec’s Security Center, all in under a minute. Once the alarm is triggered within Security Center upon gunshot detection, operators can quickly access video and other related data surrounding the location of a gunshot alert, and immediately visualise it on Security Center maps, leveraging the dynamic visualisation capabilities of the Security Center Plan Manager. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform Gunshot identification software Stanley Security has announced a partnership with Shooter Detection Systems LLC (SDS), gunshot detection solutions provider. As an authorised dealer, STANLEY Security is now certified to sell, install and service SDS products and services. SDS’s Guardian Indoor Active Shooter Detection System combines acoustic gunshot identification software with infrared gunfire flash detection for a fully automated gunshot detection and alerting solution. The Guardian System immediately detects gunshots and simultaneously alerts building occupants The Guardian System immediately detects gunshots and simultaneously alerts building occupants and first responders within one second and with zero false alerts. Johnson Controls has announced that its exacqVision video management system now integrates with Databuoy Corp.’s ShotPoint acoustic gunshot detection and localisation system to speed response time and heighten the decision-making process for local responders during active shooter situations. Integrated security systems Johnson Controls has also released the Detect360 Active Shooter Response (ASR) system, combining reliable gunshot detection with notification technology to provide immediate warning when a gunshot is fired within a building. By providing early notification and precise location of the shooter, the ASR system gives occupants time to find safety and allows police and security personnel to mitigate the threat up to 60 percent faster. Detect360 ASR gives first responders information as it develops at the scene, including shot location, number of shots, location of the shooter in near real-time and the ability to remotely monitor the situation through integrated security systems. It also collects forensic information that can later be used by law enforcement. The system supports multiple integration options, including video feeds from existing CCTV and intrusion systems, mass notification systems, access control systems and panic button/manual initiation systems. Detect360 ASR gives first responders information as it develops at the scene Public safety access points Listed as one of the most important new technologies debuted at CES 2019 by the Wall Street Journal and NBC News, Safe Zone also showcased its Safe Zone Gunfire Detector (GFD) at ISC West 2019. Priced at $149 per unit, the Safe Zone Gunfire Detector combines infrared and sound detection technologies with immediate cloud-based data analysis that can analyse more than 3,000 data points of each loud noise that exceeds ambient levels by a certain threshold. The system determines the location of shots fired, the number of shots, and the type Utilising the data from multiple detectors simultaneously, the system determines the location of shots fired, the number of shots, and the type and calibre of gun being used. Within 10 seconds of the trigger pull, an alert is sent to Public Safety Access Points in the appropriate dispatch center, giving local 911 dispatchers all critical information on their computers. Reseller recruitment programme Shot Tracer has launched a reseller recruitment programme with a highly attractive on-boarding proposition for qualified dealers. Qualifying resellers can receive a Gunshot Simulator Kit valued at $1,000 when they commit to becoming a Shot Tracer dealer. Shot Tracer’s Eagle Gunshot Detection System easily integrates with virtually any security, alarm, surveillance and access system via contact closure – or wirelessly via IP integration. In fact, Shot Tracer gunshot detection sensors are as easy to install as a smoke detector, so there’s virtually no learning curve for installing dealers. The new Shot Tracer Reseller Recruitment Program includes an exclusive offer for installing dealers to receive a free Gunshot Simulator Kit, valued at over $1000, which is essential for demonstrating Shot Tracer Eagle Gunshot Detection sensors. Terms and conditions apply for qualifying resellers.
Some of the electronic features we all love in our new cars depend on a connection to the Internet. But what are the cybersecurity risks involved in that connection? Could a widespread cyberattack turn our cars into deathtraps and create a traffic catastrophe on the scale of 9/11? That’s the scenario described in a report from the nonprofit group Consumer Watchdog, which warns that a fleet-wide cyberattack at rush hour could result in a 9/11-style catastrophe with approximately 3,000 deaths. The organisation recommends that automobile manufacturers install a ‘kill switch’ that would disconnect a vehicle from the Internet in an emergency to mitigate the threat. Protecting transportation system Automakers are keeping the public in the dark as they market new features based on Internet connections"Consumer Watchdog contends that the vulnerability of automotive computer systems, and the possibility of a cyberattack, has been communicated privately to investors but not widely to consumers. “Automakers are keeping the public in the dark as they market new features based on Internet connections,” says Consumer Watchdog. “Connecting safety-critical systems to the Internet is an inherently dangerous design,” says Jamie Court, President of Consumer Watchdog. “American car makers need to end the practice or Congress must step in to protect our transportation system and national security.” Future designs should completely isolate safety-critical systems from infotainment systems connected to the Internet or other networks, according to Consumer Watchdog. By 2022, at least two-thirds of new cars on American roads will have online connections to the cars’ safety-critical systems, putting them at risk of deadly hacks. Updating vehicle software over-the-air One economic motive of connecting vehicles to the Internet is the ability of car manufacturers to update vehicle software over-the-air rather than having to recall a vehicle. Systems also enable collection of valuable data on how fast a car owner drives or where he/she shops. Security-critical components inside cars are driven by ‘black boxes’ that may contain software of questionable origin Security-critical components inside cars are driven by ‘black boxes’ that may contain software of questionable origin. Software may be written by third parties and/or include contributions from hundreds or thousands of different authors around the world, with little accountability for flaws. The ability to update software ‘over the air’ without touching the vehicles lets automakers cover up safety problems and sloppy testing practices, contends Consumer Watchdog. “Allowing consumers to physically disconnect their cars from the Internet and other wide-area networks should be a national security priority,” says Court. “If a 9/11-like cyber-attack on American cars were to occur, recovery would be difficult because there is currently no way to disconnect our cars quickly and safely. The nation’s transportation infrastructure could be gridlocked for weeks or months. Mandatory ‘kill switches’ would solve the problem.” Understanding the risks of connected cars In addition to more attention to cybersecurity, there also needs to be more transparency to enable consumers to understand what is at risk and the choices they make. For example, a group of more than 20 car industry engineers and insiders helped to prepare the Consumer Watchdog report, but many of them remained anonymous for fear of losing their jobs. Consumers have a right to understand the risks they are taking and how they can minimise them. In the Internet of things, cybersecurity dangers extend to almost every device in the connected world, from cars to smartphones to medical devices. Increasingly, we will be asked to weigh the convenience of cranking our car with a smartphone, for example, against the possible risk in the form of vulnerability to cyberattack.
A video analytics system that provides ‘behavioural understanding’ can yield more meaningful and actionable data for a range of applications. In public safety and security, such a system can alert on violent or suspicious behaviours, such as people fighting, vandalism, people with weapons, etc. In advanced traffic surveillance and monitoring, it can provide alerts to vehicle collisions (accidents), traffic hazards or vehicle that aren’t using the road properly, such as a car that stops in the middle of the junction. For enterprise and campus security, it can provide advanced anti-tailgating and detect unauthorised activity. Video surveillance infrastructure viisights was founded by a group of entrepreneurs with track records in developing technology businesses These uses are among the benefits of viisights’ video analytics technology based on behavioural understanding of video content. “It means we can extract more meaningful data from the huge amount of video content that is captured, and we can transform that data to actionable insights that eventually justify the massive investment in video surveillance infrastructure,” says Asaf Birenzvieg, CEO of viisights. Their behavioural understanding systems for real-time video intelligence leverage artificial intelligence technology. viisights was founded by a group of serial entrepreneurs with track records in developing technology businesses. The Israeli company’s founders recognised a growing global need for intelligence to make physical and virtual public areas safer – and realised the role that smart video understanding technology can play. Developing artificial intelligence technologies viisights is committed to developing artificial intelligence technologies that facilitate human-like video understanding, which in turn serves as the basis for fully autonomous video intelligence systems powered by pattern prediction technology. “Behavioural recognition is the future of video analytics and the next generation of the object classification analytics systems that hold the majority of the market today,” says Birenzvieg. viisights has developed a video understanding technology for real-time video processing “To date most video analytics systems still base their product features on static analysis of objects from images using image recognition, even the ones that use ‘AI analytics.’ Products built using such object classification technology are extremely limited.” For example, object classification analytics cannot recognise behavioural events in a video such as people fighting or a car collision because such behaviours can’t accurately be concluded in large scale from analysing a single static image/frame. Video understanding technology viisights has developed a video understanding technology for real-time video processing. The technology can process live video feeds. In addition to recognising a particular object (e.g., person) and its attributes (e.g., red shirt), the system can understand an object’s actions, interactions with other objects (events), the scene being viewed (i.e., crowd is gathering, riots) and the context (a car is driving on the road or on the sidewalk). The main verticals are smart cities, enterprises and campuses, banks and ATM security “Basically, we are able to extract more meaningful data from a live video feed and therefore create actionable insights and greater ROI,” says Birenzvieg. The company focuses mostly on security and safety use-cases. The main verticals are smart cities, enterprises and campuses, banks and ATM security, security guard companies and transportation hubs. The company is working on a new product for in-vehicle monitoring mostly for security, safety, vehicle protection and proper vehicle use; it monitors passengers’ behaviour inside a bus, train, or taxi. The product will come to market next year. Video management system viisights’ video analytics offering is currently optimised for server-side deployment, and the integration architecture is similar to most video analytics systems. From one side it is integrated with the video management system (VMS). They are a Milestone verified partner and soon will be part of Milestone's marketplace. From the other end, it is connected to a command-and-control system for processing the data and presenting the alerts to the end-user. The analytics company makes most sales through system integrators. They have partnerships with big system integrators like Motorola Solutions and NEC and are also working with smaller ones. They are looking to expand their system integrator network, mostly in the USA and Europe. Behaviours can have many variations and they can be very diverse Cloud video surveillance “We will continue to invest in performance and accuracy, meaning higher recall and lower false positive rate,” says Birenzvieg. “Since our major value proposition is in behaviour recognition, behaviour events many times are not clearly defined, which is very different from object classification. Behaviours can have many variations and they can be very diverse.” An example is a simple behaviour like a person falling on the floor. A person can fall on the floor in many ways, but the challenge is to ignore similar behaviours that are not a person falling and that confuse the system, such as a person bending over to tie his shoelaces. With cloud video surveillance becoming a trend, viisights is also looking into offering some of their advanced functionalities in a video-analytics-as-a-service-model.
Founded in 1871, Fulton County School System is the fourth largest school district in Georgia, United States. It consists of 101 schools and administrative support buildings, including 67 elementary schools, 19 middle schools, 17 high schools and eight charter organisations. Fulton’s mission is to provide a safe and secure environment for its more than 96,000 students and more than 12,000 full-time employees. To help enhance safety at more than 100 schools, Fulton has installed a full Avigilon security solution that includes Avigilon cameras with self-learning video analytics, Avigilon network video recorders, and Avigilon Control Center (ACC) video management software with Avigilon Appearance Search technology. Fulton is also deploying Avigilon Access Control Manager to secure physical access points, providing an integrated security solution for the district. Simplifying recording and capturing of footage Fulton sought to replace analogue cameras with an end-to-end high definition security system camera system in order to maximise protectionFulton sought to replace analogue cameras with an end-to-end high definition security system camera system in order to maximise protection, enable proactive event response, and facilitate the recording, capturing and sharing of clear footage with its school board, police and the concerned public. Securing more than 100 buildings is no easy feat, but it’s of utmost importance to the Department of Safety and Security at Fulton, which also includes the School Police and Student Health Services and Emergency. Upgrading video security system With recent data showing above average student incident rates and student disciplinary concerns at some schools, upgrades to the security system were needed to allow better local and remote monitoring in important areas. “One of the biggest security challenges we face is our ability to reliably monitor important areas throughout our schools, especially during an emergency. With Avigilon, we not only benefit from exceptional image quality, but their advanced video analytics, like Avigilon Appearance Search technology, save us valuable time and effort, ultimately making our schools a safer place.” - Paul Hildreth, Emergency Operations, Safety and Security, Fulton County School System. Appearance Search technology Avigilon high-definition cameras with self-learning video analytics and access control solutions have been installed in 101 schoolsAvigilon high-definition cameras with self-learning video analytics and access control solutions have been installed in 101 schools. ACC 6 video management software with Avigilon Appearance Search technology is a particularly exciting new development for the district. “We chose Avigilon because of the capabilities it offers in its advanced video analytics search technologies, including Avigilon Appearance Search,” said Paul Hildreth, Emergency Operations, Safety and Security for Fulton. “Their analytics are easy to set up and use, and can save us valuable time and effort, ultimately making our schools a safer place for generations to come.” Video data analysis Avigilon Appearance Search video analytics technology uses a sophisticated deep learning artificial intelligence search engine to sort through hours of footage with ease. This technology allows Fulton’s operators to click on a button and search for all instances of a person or vehicle across all cameras on a site, quickly and efficiently. This can save Fulton time and effort during critical investigations as Avigilon Appearance Search technology intelligently analyses video data, helping to track a person’s or vehicle’s route and identify previous and last-known locations. Avigilon self-learning video analytics enable proactive, real-time event response. Built from the ground up to manage high-definition video, Avigilon offers self-learning analytics on camera resolutions of up to 5K (16 MP). Avigilon Multisensor cameras were also set up to capture challenging angles and provide total coverage within a 180 to 360-degree area Avigilon H4 platform Avigilon H4 bullet and dome cameras from the new H4 platform were installed, offering self-learning video analytics, greater resolution performance and Wide Dynamic Range support. Avigilon H4 cameras are available in 1 to 5 MP and 4K Ultra HD (8 MP) resolutions. Avigilon Multisensor cameras were also set up to capture challenging angles and provide total coverage within a 180 to 360-degree area. Upgrading the district’s security solutions began three years ago with a single high school as a pilot program. The success of this replacement led the district to integrate ACC in other school projects and, in 2014, Fulton opened new administrative centres with both Avigilon access control and video security solutions. At the start of 2017, Fulton began implementing a three-year approach to completing the upgrade. Image quality and resolution Before switching to the Avigilon solution, the district was challenged with low system reliability, which resulted in not having video evidence when needed. Furthermore, in situations where there was recorded footage, it was not of high enough quality to provide value. With the installation of Avigilon video surveillance, Fulton has benefited from exceptional image quality and resolution across wide areas in all lighting conditions. The ongoing Avigilon implementation will provide the district with crucial and powerful insights that can help save time and effort during critical investigations. With the help of Avigilon trusted security solutions, the future looks bright for Fulton County Schools.
An initial investment of $100 million launched the first American public university campus in Mexico: Arkansas State University Campus Queretaro (ASUCQ). Within five years of its 2017 opening, around 7,500 staff and students are expected to use the site, including campus accommodation for up to 1,500 students. To accompany such a high-profile development, the university needed security and access control systems with a trusted and proven track record protecting staff, students and other university assets. They sought a technology-based solution to reduce security risks across the campus, and specifically an access control system able to monitor multiple spaces and monitor all access points in real time. System software and hardware should make it fast and intuitive to generate or modify access rights for any campus user. A single solution needed to work across both common university facilities and separate areas with student accommodation. Monitoring campus in real time With the SMARTair Wireless Online option, facilities managers monitor the campus in real time, with live updating of who enters where, and when ASUCQ turned to SMARTair to protect its investment and site users. So far, around 600 SMARTair battery-powered online escutcheons have been installed across campus. High traffic flows through many campus doors required robust access control devices. With the SMARTair Wireless Online option, facilities managers monitor the campus in real time, with live updating of who enters where, and when. Intuitive SMARTair software enables all day-to-day administration from a central control point. "SMARTair is a very secure access control system that is also very intuitive for user and access management,” says Jose Alfonso Suarez Torres, Operations Chief at ASUCQ. Future plans for ASUCQ envision a ‘university city’ with up to 20,000 students — all protected in real time with SMARTair access control. And because a SMARTair system is wireless, expanding and upgrading access control will never disrupt the daily work or campus life at this fast-growing university. SMARTair mobile solution Openow A single interaction with the SMARTair TS1000 software is all it takes to make a virtual key disappear automatically from a user’s Openow app The new SMARTair mobile solution, Openow also gives facility managers the option to send, revoke and amend the validity of users’ keys, wherever they (or the keyholder) may be — with no need for physical credentials like keys or smart-cards. Students and staff save time, with no access cards to collect or validate. Each user installs and validates their Openow app and collects keys virtually. Tap a SMARTair escutcheon with your phone... and the door unlocks, if you are authorised to enter. Administrators save time and resource at the end of a student or staff member’s time on campus. A single interaction with the SMARTair TS1000 software is all it takes to make a virtual key disappear automatically from a user’s Openow app. A simple, secure, modern solution to university access control.
VMS software and IP products from Hikvision, a supplier of innovative video surveillance products and solutions, are now being used by the Government of Gujarat Directorate of Technical Education (DTE), to protect and administer education facilities and services across Western India. A government organisation that provides qualitative and higher level technical training for students from a diverse mix of financial and social backgrounds, the Directorate of Technical Education’s (DTE) goal is to deliver global standards of excellence in technical education for all its students. Looking to provide a more secure environment and enhance education management, both inside its college campuses and within classrooms, DTE enlisted the help of Prama Hikvision India to evaluate their needs and recommend a practical solution. Enhancing education processes Working closely with the client, Hikvision undertook site surveys at 43 campuses across Gujarat and in respect of DTE’s management and system performance needs, proposed a cost-effective solution that would provide the required level of indoor and outdoor surveillance coverage. The considerations for the surveillance solution would also take-in DTE’s objective of enlisting the new system to play a role in enhancing the day-to-day education processes, where it could also be used to remotely monitor examinations, as well as being a time-saving facilities management tool for use across the large Western India state.The Hikvision control software fully supports smart search, playback, and smart detection Centralised surveillance monitoring Providing centralised remote surveillance and alarm monitoring, Hikvision proposed an IP-based solution that would use DTE’s existing secure virtual private network (VPN), which connects all education sites across Gujarat to a central point at the Directorate of Technical Education, in the capital city of Gandhinagar, Gujarat. At two control rooms, Hikvision iVMS-5200 Professional VMS software was installed to control and monitor the new surveillance system 24/7. Ideal for controlling any mix of surveillance system products, the iVMS-5200 Professional software fully supports all Hikvision products, including DVRs, NVRs, cameras and speed domes, as well as any mix of third party manufacturer products that conform to ONVIF standard. Allowing DTE’s security and management application needs to be addressed, regardless of its size and complexity, the Hikvision control software fully supports the installed Hikvision products’ smart features, including smart search, playback, and smart detection. Low-light surveillance capability To provide affordable high-quality surveillance imaging across the 43 college campuses covered, Hikvision specified a mix of DS-2CD2620F-IS HD 2 Megapixel vari-focal IR network bullet, and DS-2CD2720F-IS HD 2 Megapixel outdoor network IR dome cameras. Both camera models provide 1920×1080 resolution, and true day and night (ICR) low-light capabilities, along with back-light compensation (BLC). Approximately 1,300 Hikvision cameras installed now provide comprehensive surveillance within the campuses lobbies, classrooms, laboratories, staff rooms, examination halls, auditoriums, storerooms, exit and entry doors, and open campus area access gates and car parks. Integrated campus security The Hikvision iVMS-5200 Professional VMS software enables 43 campus locations to be monitored easily and reliably"The Hikvision IP-based surveillance solution successfully illustrates just what can be achieved with large-scale integration,” explains Pinkal Shah, Asst. Manager - Technical Support, at Prama Hikvision India. “The Hikvision iVMS-5200 Professional VMS software enables 43 campus locations to be monitored easily and reliably, encompassing central video management, integration and failover mechanism." "Supporting all remote sites’ local storage and camera SD storage, the system uses Hikvision’s Center Video Record (CVR) mode using NAS to receive data streams directly from network cameras. With CVR mode, there is no need for an intermediate storage server, which not only increases storage efficiency and system stability, but also greatly reduces system hardware cost for the end-user.” Remote surveillance DTE system operators can remotely check the status of facilities or presence/absence of support staff "The Hikvision video surveillance system utilises a WAN/VPN to connect each of the separate locations in this massive multi-site project,” explains Mr. Dayashankar of Progility Technologies Pvt. Ltd., systems integration company responsible for the installation of the project. “The excellent Hikvision iVMS-5200 Professional VMS software enabled us to integrate the many existing third-party manufacturers cameras into the new system, as well as providing out of office hours remote alarm configuration and monitoring. We found the quality of the Hikvision networked camera images to be exceptional under every operating condition.” Viewed from the central monitoring stations, DTE system operators can now remotely check the status of facilities or presence/absence of support staff across Western India. In addition, on examination of the high definition play back, since the installation went live, incidents of petty theft have been recorded, and stolen belongings of students and facilities recovered.
The Vienna University of Economics and Business (WU) was founded in 1898 by the k. k. Ministerium für Cultus und Unterricht as the "k. k. Exportakademie". At that time, tuition was being given in the following relatively modern fields: Foreign languages, economics, business affairs, economic geography, public law, private law and consumer affairs. Relocation to Vienna Due to steadily increasing numbers of students, the WU had to relocate to various sites in Vienna several times in its history. The previous location in Althanstraße – originally designed for around 9,000 students – was already fully occupied when the university moved there in 1982. In the 1990s, the number of students grew further and eventually settled at over 20,000. As a result, in 2009 work began on a new campus in Vienna's second district to the east of the Prater park. Six renowned architects from around the world were involved in the planning of the WU campus, with the stated goal of constructing world-class architecture. What was ultimately created was an open site with clear spaces and green areas, with a total of nine standalone and very differently designed building complexes distributed across it. The heart of the WU campus is the Library & Learning Centre designed by the Zaha Hadid design office, which houses central service facilities, banqueting halls and a library, among other areas. Campus WU was opened in a ceremony on 4th October 2013 and provides space for 24,000 students and 2,300 employees. SeeTec software offers encrypted communication between the server and the client, and also supports secure connections to the cameras Viable concept for campus security Even during the planning stage of the WU campus, the topic of security played an important role. A viable concept had to be developed, in particular for the large outdoor areas that are accessible day and night, to protect students, staff and visitors on the campus against attacks and thefts, whilst still respecting their personal rights. A further key task of the security technology is visual support for the emergency services in the event of an alarm as well as the securing of escape routes. Design aspects also needed to be taken into account; this means that the cameras should be placed as inconspicuously as possible, and should not in any way affect the overall architectural impression, a tricky task for the installation engineers in particular. SeeTec VMS An invitation to tender was launched for the security technology on the WU campus, with Siemens AG Austria ultimately winning out with a comprehensive overall concept which also takes the architectural features into account. Since its launch in 2013, a networked video system with several hundred IP cameras has been guaranteeing security on the WU campus. The image data is recorded, managed and supplied using SeeTec video management software. The SeeTec software was chosen for the video management system; and thanks to its flexible and modular design the SeeTec solution is expandable and can be easily connected to third-party systems. For the WU campus, this was important because all security systems were to be linked and managed via a centralised building management system. Securing public spaces As the public spaces on the WU campus also needed to be secured, observing the highest possible standards on data. To minimise the system load, the video images are recorded and supplied via multiple servers that are also protected against failure via a made-to-measure redundancy concept. The live images can be displayed as required on a large-screen system in the WU campus control centre. Protection and maintaining the personal rights of students, staff and visitors was of paramount importance. In this respect, the SeeTec software offers encrypted communication between the server and the client, and also supports secure connections to the cameras. In addition, sensitive areas can be masked out in the camera image or persons can be made unrecognisable by pixilation; access to the recorded original data is then only possible with the works council being present, for example. Inconspicuous CCTV To permit interaction of the total of 16 different systems (such as fire, access control, video technology), they are linked to one another via the Winguard SiControl building management solution from Siemens. If, for example, a fire alarm is triggered, action plans can be automatically displayed in the control room or in the deployment centre, and live images from cameras in the vicinity can be displayed. This means that the emergency services personnel can quickly gain an overview of the situation and ensure that escape and access routes are clear. The challenge faced by the WU campus was to reconcile the requirements of security and fire protection with protecting personal rights and video data The cameras distributed across the terrain and in the buildings focus primarily on the outer shell, the escape routes and the critical infrastructure. Thanks to specially developed mounting concepts from Siemens, it was possible in many cases to incorporate them inconspicuously into the façade and ceiling structures, thus preserving the overall architectural impression. SOS telephones on premises To offer additional security to students, staff and visitors on the site, SOS telephones have been erected at multiple points on the premises. If an emergency call is sent from there, this triggers an alarm on the Winguard SiControl. In addition, the nearest PTZ camera focuses the column and turns on the live image in the control room. This means the security personnel can immediately gain a picture of the situation on the ground. Johann-Wolfgang Hörtl, responsible for the security department at WU Vienna, and therefore also for the video system, summarises the special features of the video system at WU Vienna: “The challenge faced by the WU campus was to reconcile the requirements of security and fire protection with protecting personal rights and video data - after all, we operate in the public space here as well as in areas where lots of people are working. The SeeTec software does both – it seamlessly integrates with building and hazard management systems and at the same time offers numerous features to protect data and personal rights." Expandable system Another important aspect when selecting a suitable video solution was the simple expandability of the system to keep pace with potential further rises in employee and student numbers in future as well. Thanks to the modular design of the SeeTec video management software, new camera channels can be integrated quickly and easily into the system. In addition, new functionalities can be added at any time in the form of expansion modules – examples of this include intelligent video analysis or licence plate recognition for managing parking areas.
Given the choice, would you rather run security at a bank vault or at a student halls of residence? At least the bank job is straightforward: Keep the money inside, and everyone else out. If only protecting hundreds of young people was so easy. Securing student accommodation Student accommodation blocks are usually large, with high traffic moving from bedrooms to common areas, canteens and libraries. A single resident travelling between her room, a study area, the gym and a couple of trips offsite would use secure doors 15 times a day. In a residence housing just 200 students, that’s 3,000 daily events for the access system to handle. Rapid student turnover puts a further admin burden on facility managers. Imagine, among hundreds of students living at the halls, just a handful leave or arrive each semester. That’s a couple of manual key handovers to schedule every week, and to chase if a key-holder fails to appear. If keys are not handed in, is a room really secure for its next occupant? And how can you know if one has been copied? With physical keys and mechanical locks, security lacks flexibility, and it’s impossible to get a site overview without a time-wasting manual key audit. Today’s students, tomorrow’s secure solutions Mechanical security is not the answer, because mechanical locks don’t offer the control or flexibility managers need. There’s no real-time monitoring, and you can’t generate detailed audit trails for locks or users, meaning there’s no easy way to track unauthorised access — in cases of a theft, for example. The current crop of students — so-called “Generation Z” — were raised as digital natives. They expect convenience as a standard feature, not a mechanical solution first used in Ancient Egypt. In Europe’s increasingly international, marketised higher education system, attracting these tech-savvy students and keeping them satisfied with the campus experience are critical.A wireless access control system like SMARTair™ solves admin problems with a combination of control and cost-effectiveness The SMARTair™ wireless access system is built to meet the challenges of securing a student residence: A system needs the product and software robustness to handle so many users, high traffic, and fast resident turnover. SMARTair™ has it. A system should make student life easier with cards, rather than keys. SMARTair™ does. A system should secure more than just doors, including cabinet locks and devices to protect secure areas like car parks. SMARTair™ does. A system must be easy to upgrade in the future, both adding new doors and upgrading the functionality of the devices already installed. SMARTair™ is; it future-proofs your investment. A system should be able to handle additional student services like the vending machines and canteen on the same credential card as the room door lock. SMARTair™ can. Swapping mechanical for wirelessA wireless access control system like SMARTair™ solves admin problems with a combination of control and cost-effectiveness. It is based on battery-powered locks and is easy to retrofit wirelessly to existing premises or incorporate in a new-build. Installers simply swap the existing mechanical lock for a wireless device and link the door to the management software. Slim, robust SMARTair™ devices can secure almost any opening. Escutcheons (with optional keypad for added security) are ideal for student bedrooms, and fit wood or glass, emergency exit and even fire doors. Available with or without PIN entry, SMARTair™ wall readers can filter lift, main door or car park access. The SMARTair™ knob cylinder is easy to retrofit to management offices; you just replace an existing mechanical cylinder with the SMARTair™ device. For storing belongings, SMARTair™ cabinet and locker locks are configurable in the same system without the need for an extra module. With SMARTair™, students come and go using programmable smart cards, tags, or even the secure SMARTair™ mobile app — not a cumbersome, easy-to-lose key. SMARTair™ devices support all major RFID technologies. Plus, students only need carry one credential to open their door and access additional onsite services. A single card to unlock their room, secure their belongings inside a locker, enter the library, pay for photocopying and buy lunch makes sense for them. It’s another step to boosting resident convenience.Because SMARTair™ devices run on standard batteries, the system is also cost-effective for accommodation providers And because SMARTair™ devices run on standard batteries, the system is also cost-effective for accommodation providers. Already trusted by students all over Europe SMARTair™ is already making life easier for student residence managers all over Europe, including at Mezzino’s Rialto Court in Middlesbrough, UK. “We are so pleased with the result. We are already looking to adopt the access control system for the other student accommodation properties we manage nationwide,” says James McGrath, Mezzino’s co-owner and director. At Funway Academic Resort in Madrid (www.funwayresort.com), student rooms are locked with SMARTair™ escutcheons. Energy-saving wall devices inside rooms regulate electricity use, and students have an individual safe fitted with a SMARTair™ cabinet lock. Students and staff open all their authorised doors with the same access card: the Funway gym, study rooms, games rooms, swimming pool and changing rooms, spa and staff areas are also locked with SMARTair™ escutcheons. “The system meets the expectations we had and offers very easy maintenance,” says Mario Arias, Facility Manager at Funway. To discover how SMARTair™ can upgrade student security and put you in total control of your halls of residence, visit www.tesa.es/smartair-students
The Ottawa Elementary School District is in Ottawa, Illinois, a river town 80 miles southwest of Chicago. The district consists of five schools, the campuses of which include Jefferson Elementary School, Lincoln Elementary School, McKinley Elementary School, Shepherd Middle Schools, and the Jefferson Elementary “Art House” building. In the spring of 2015 a variety of issues caused the schools’ administration to determine that they needed a surveillance system upgrade. The district’s IT director Kyle Olesen met with Nick Melnyk of systems integrator Ficek Electric & Communication Systems and the Arecont Vision regional sales team, ultimately sparking a major collaboration to redesign the surveillance systems used by all their schools. No formal coverage strategy The district had been using mostly analogue cameras for its school surveillance. The original cameras had been placed throughout the five campuses without a formal coverage strategy, greatly hindering the usefulness of the surveillance system. This prevented key areas from being effectively monitored and the images that were provided by the analogue cameras were of low quality. New challenges presented themselves as the project continued. With five completely different locations to work with, it was clear that the project would be a long-term one. It was imperative that the installation efforts be planned accordingly. Part of planning was to treat each school as a separate project with its own surveillance coverage layout and system requirements. Education session on IP technology Such a long undertaking also meant staffing challenges. The project manager changed five months into the project, resulting in the bidding process to be undertaken a second time. A The school then hired Chicago-based Architecture and Engineer company to help facilitate the project. Arecont Vision delivered educational sessions to bring the new firm up to date on IP megapixel camera technology. The Ottawa School District approved the installation of Arecont Vision cameras in all five locations in July 2016 During the first meeting with the district in 2015, the IT director was introduced to Arecont Vision megapixel single- and multi-sensor cameras. The end user was impressed, and a more in-depth meeting was scheduled. This led to walkthroughs at each of the five campuses to outline recommendations for camera locations and models. Detailed layout of coverage area The individual schools were pleased with Arecont Vision’s camera performance during this series of events, and the project continued into the design phase. During this period, the district received a detailed layout for each school. The layouts outlined the coverage area that each camera would provide. After completing the design phase, the systems integrator and the school district participated in the Arecont Vision Try-and-Buy Program. This program provided the end user community with the opportunity to experience Arecont Vision megapixel cameras before committing to a full installation. Impressed with what they saw, the Ottawa School District approved the installation of Arecont Vision cameras in all five locations in July 2016. Solutions installed Exacq Technologies, part of the Security Products business unit of Tyco, was selected as the video management system (VMS) provider. Exacq and Arecont Vision have thousands of joint installations for schools and other surveillance projects around the world. Exacq is a member of the Arecont Vision Technology Partner Program, and their VMS software is available in the Arecont Vision MegaLab certification and support facility for the best possible continued integration. The five schools utilise an array of Arecont Vision products throughout the district. The multisensor, panoramic 180o SurroundVideo and adjustable-view SurroundVideo Omni series provide coverage of large areas such as cafeterias, gyms, and parking lots. Arecont Vision pioneered the multi-sensor surveillance megapixel camera market in 2006, and has continued to lead the industry with new features, performance, and reliability. Now in their fifth generation, SurroundVideo cameras provide coverage with four individual megapixel sensors for superior situational awareness and outstanding image quality. The Arecont Vision camerasare monitored both locallyand remotely by the schools,using the Exacq software Arecont Vision MicroDome G2 series cameras were used for interior areas such as for coverage of hallways and doorways. MegaView 2 series cameras equipped with STELLAR (Spatio Temporal Low Light Architecture) technology were implemented for day and night outdoor coverage. The Made in USA Arecont Vision cameras used by the project are hardened against potential cybersecurity attacks, and cannot be repurposed for malicious purposes, giving the schools an added level of security protection. The Arecont Vision cameras are monitored both locally and remotely by the schools, using the Exacq software. Each school’s administration has access to the cameras monitoring their individual campus, allowing for real-time monitoring throughout the day. Video can be accessed remotely, with playback from any camera using district laptops and tablets. Superior image quality and user-friendly interface “The customer and our company are very satisfied and happy with the quality of the equipment,” said Nick Melnyk, of Ficek Electric and Communication Systems, Inc. “The accessories, the mounts, everything fit very well and works very well. That all comes into play because a lot of times you can be sent cameras with wrong accessories and other things that don’t fit, extending the installation process longer than it needs to be. For this project, installation went very smoothly.” “Arecont Vision provided superior image quality and a user-friendly interface,” continued Mr. Melnyk. “The school district was so pleased with Arecont Vision products that they are now looking to put additional cameras onto to the surveillance systems on most of the campuses.” Upon being asked if Arecont Vision could do anything better in the future, Mr. Melnyk stated, “We are very satisfied with everything we have received from Arecont Vision.”
Round table discussion
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
Driven by technology developments such as voice recognition, smart devices and the Internet of Things, our homes are getting “smarter” all the time. Increasingly, we expect our residential environments to be responsive to our voice commands, whether we are adjusting a thermostat, turning on a light, or lowering the window shade. Smarter home integration yields new opportunities and challenges for home security, too, which contributes an element of safety and protection to the convenience aspects of smart homes. We asked this week’s Expert Panel Roundtable: How are new smart home systems impacting security?
Passwords are one of the most familiar elements of information systems, but also one that can be overlooked or underutilised. New alternatives are emerging, and the role of passwords is evolving in the age of the Internet of Things. We asked this week’s Expert Panel Roundtable: How is the role of passwords changing in physical security systems?