Government & public services security applications
Your Homes Newcastle (YHN) manages more than 26,000 properties on behalf of Newcastle City Council. They are piloting an innovative fire detection system in partnership with OpenView Security Solutions, the UK’s largest privately-owned independent security company and a national supplier of fire, electrical and mechanical services to the public and private housing sector. MOBOTIX thermal imaging cameras have been installed in 3 multi-storey blocks across the city to continually monitor te...
Abu Dhabi is a major cultural and commercial centre in the United Arab Emirates (UAE), accounting for roughly two-thirds of the UAE’s economy. While oil and natural gas make up a large portion of its GDP, Abu Dhabi has positioned itself as a premiere tourist destination, with major investments in luxury resorts and business hotels. Consequently, public safety is a top priority — and FLIR Systems is playing a critical role in the city’s long-term safe city initiative. Recently,...
Upon hearing Pablo Picasso’s famous praise of art’s ability to clear ‘the dust of everyday life’, one’s thoughts could easily turn to one of Arizona’s newest landmarks, the Mesa Arts Center. Set proudly amidst the dust of the Sonoran Desert, the Mesa Arts Center is a striking complex of buildings, art installations, and public throughways, offering a rich blend of visual impressions in glass, water, stone, and metal, with splashes of vibrant colour and metalli...
One French town just north of Paris faced familiar key management challenges. Each person in their Municipal Technical Centre had to carry approximately forty physical keys. If a single key was lost or stolen, for even one door, all compromised cylinders had to be changed. To prevent unauthorised access, all the keys had to be replaced, too — at great expense. Key duplication costs were mounting. “One lost key cost from €3,000 to €4,000 for changing cylinders and replacing...
Your Homes Newcastle (YHN), which manages more than 26,000 properties on behalf of Newcastle City Council, is taking an innovative approach to fire safety with a pilot project utilising thermal imaging cameras in tower blocks. The ALMO has installed the thermal imaging cameras in three of its 45 multi-storey blocks across the city in a trial partnership with OpenView Security Solutions, with the project attracting praise from Tyne and Wear Fire and Rescue Service. Mobotix M16 thermal cameras...
A 300-plus camera city centre video surveillance scheme in Lincoln has been installed and commissioned using cameras, monitors and switching equipment from Dahua Technology. The previous analogue-based CCTV system was more than 20 years old and had become expensive to maintain, so City of Lincoln Council decided to replace the analogue cameras and transmission equipment with HD digital equipment. The total cost of ownership has been reduced by the savings made on legacy fibre lease costs, as we...
Booth number: 14039 Dahua Technology USA Inc. will display video surveillance solutions, access control and intercoms at ISC West. Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. The first year that we exhibited at ISC West was in 2012. That was before we had a local US operation. The market started to pick up our brand and was surprised that we offer extensive product portfolios. In 2014, we registered our US office and continued to participate in ISC West. Through our presence at the show, customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints. We are local here and help our customers to grow their business and increase their satisfaction with us. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organisation Q: What strategies do you use to get the most out of exhibiting at ISC West? A trade show is definitely a lot of investment within a few days. Therefore, how we create the best ROI and meet the right customers are very important. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organisation, including products and technical expertise as well as the sales team. We use an internal and highly coordinated plan with the team to get a better result. We make sure everyone is on the same page in terms of the products/technology we are going to present and have the people with the best knowledge to present to customers who visit our booth. Therefore, a highly coordinated team strategy is required. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Every company has their ways to follow up with the leads and evaluate the ROI from the show. The way we are using is to upload all our leads to our software and track all these leads afterwards. If they are not already buying from us, our goal is to convert them to become a registered dealer. Customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints If they are already our registered dealers, we seek to grow their business by using our latest technology solutions. In general, all marketing activities in business today require a clear ROI, and it has to tie into the sales numbers. From our experience, the ISC West show provides the best ROI among other shows in the North American market. Q: What company activities (outside the show floor) does your company organise each year? We have a partner event and invite our value-added dealers and partners. We’ve been hosting this event since 2015. Q: What sets ISC West apart from other trade shows on the calendar? As I mentioned, ISC West provides the highest ROI among other shows in the North America market. This show also brings many of our customers and partners to the city as well. I guess people value this opportunity to meet and discuss the technology, the industry trends, and the business to figure out how we can grow together. Other trade shows might be smaller than ISC West and targeted at different markets or address different scopes of the industry need. Every show we attend in 2019 plays a strategic role for us to communicate with the market and find the customers we are looking for.
Booth number: 8045 Costar Technologies, Inc. is a public company that designs, develops, manufactures and distributes a full range of products for the video surveillance and machine vision markets. Costar consists of five operating companies: Arecont Vision Costar, CohuHD Costar, Costar Video Systems, Innotech, and IVS Imaging. The combined product portfolio consists of surveillance cameras, video surveillance systems, recorders, monitors, lenses, cables, accessories, and cloud-enabled services. For more about their presence at ISC West, we contacted Jeff Whitney, Vice President of Marketing for Arecont Vision Costar, a Costar Technologies, Inc. business unit. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. One of our companies, Arecont Vision, exhibited in ISC West booth 17147 in 2005, a tiny space on which the hopes of the company rested. At the time AV was focused on pioneering IP megapixel surveillance cameras, but today we are part of Costar Technologies, offering cameras, VMSs, and recorders. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry. Talking with those who were with the company at time, the enthusiasm of the booth team reached the security dealers and systems integrators who were attending, helping bring megapixel cameras to a much wider audience. Q: What strategies do you use to get the most out of exhibiting at ISC West? The Costar companies have a very deep portfolio of products for the security market, and we bring our latest products from each business unit to ISC West. Attendees come in part to see the latest tech, and we drive our development cycle to have exciting new products to unveil on the show floor. We also have meeting space in the booth to provide one-on-one time with our executives and sales team, while sponsoring free admission to the expo for all who want it. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Unveiling our latest products and solutions to existing customers and partners is key to a successful event, and ISC West’s large impact on the industry ensures that many will attend. Perhaps even more important is informing those attending of the strength of the Costar product portfolio, including many Made in USA products and services that others don’t deliver. Both help to drive leads for projects in which we can really benefit our partners and end user customers. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show Q: What company activities (outside the show floor) does your company organise each year? A large show like ISC West brings many of the Costar business units together, providing an excellent opportunity to continue bonding as a team, as well as to participate in events beyond the show floor. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show. Q: What sets ISC West apart from other trade shows on the calendar? ISC West brings a very large number of interested, security-focused systems integrators, dealers, consultants, and end user customers all to one place for a three-day expo. That audience and opportunity to share our message validates the investment any large show requires from Costar or others. While some industry events have struggled to find and maintain their audiences, ISC West continues to deliver quality, knowledgeable attendees from across the Americas and around the world. The show differs from other events we do, which are typically regional in attendance or focused more on specific vertical markets.
Booth number: 12089 At this year's ISC West, VIVOTEK USA, Inc. will be showcasing their 180⁰/360⁰ product line plus other general form factors with new features and benefits, including a cybersecurity application embedded onto the cameras, crowd detection, smart motion detection, tailgating, and many more. In addition to IP cameras, VIVOTEK will display a comprehensive product line that also includes NVRs, video receivers, video servers, PoE switches, and video management software. Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. We have come a long way from a little-known surveillance manufacturer with a small booth size VIVOTEK has been an exhibitor at ISC West for many years now. Looking back, we have come a long way from a little-known surveillance manufacturer with a small booth size to one of the global providers in the security industry with a recognisable and trusted brand. Now, we are well-known in the industry and are proud of our accomplishments, but we feel greater things are still in front of us. Q: What strategies do you use to get the most out of exhibiting at ISC West? Each year, we want our booth to tell our stories – who we are, what we do and what we are capable of, and where we are heading. We do not want to just be another camera manufacturer who only promotes and displays products; we want to be the solution provider that customers are looking for. In addition, we have very knowledgeable sale managers who can assist visitors at our booth who are looking for surveillance, whether it’s an upgrade or a totally new solution. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Gain industry knowledge and perspective as to where surveillance security industry is heading Like any trade show, it is difficult to quantify success. We attend ISC West to promote the VIVOTEK brand, meet and discuss with customers and gain industry knowledge and perspective as to where surveillance security industry is heading. If we achieve these, then ISC West is a success for us. Q: What company activities (outside the show floor) does your company organise each year? Our main focus each year at ISC West has always been the interaction with customers and potential customers on the show floor. We pride ourselves in the products and technology we offer, and there aren’t any other trade shows in North America to showcase our capabilities than ISC West. Q: What sets ISC West apart from other trade shows on the calendar? ISC West is the industry standard of security trade shows in North America. Since we are a security surveillance manufacturer, ISC West is the one show that all manufacturers in this industry must attend.
Booth number: 26041 March Networks is a global provider of video surveillance and video-based business intelligence solutions. Their product portfolio is end-to-end, ensuring that customers can deploy comprehensive solutions designed to help them address real business challenges and improve performance. At ISC West this year, March Networks will be showcasing new hosted services, new PTZ cameras and additional offerings. Attendees will also be encouraged to discover their solutions for banking, retail, cannabis and transportation – all of which help organisations transform video into business intelligence through the integration of surveillance video, analytics, and data from business systems and IoT devices. For more about their presence at ISC West, we contacted Peter Strom, President and CEO, March Networks. And not surprisingly, the technology was a lot less sophisticated compared to what we see today Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. I believe March Networks first exhibited at ISC West in 2001. I did not join the company until 2003, however I had been working in the industry for several years already, and can recall that the exhibitions back then had a much different feel. For one thing, there weren’t the very large companies we see today dominating a lot of the landscape. And not surprisingly, the technology was a lot less sophisticated compared to what we see today. Anyone who has worked in physical security for a long time can attest to the remarkable shift we have seen over the years, first with the transition from analogue to IP video and all that entails, to security analytics, to today’s truly advanced business intelligence applications, hosted solutions, and artificial intelligence, computer vision and similar content analytics. Q: What strategies do you use to get the most out of exhibiting at ISC West? Our most effective strategy by far is scheduling our business meetings in advance of ISC West. Our sales team does a very good job of planning meetings with enterprise end users and channel partners ahead of time, so we’re hitting the ground running even before the doors open on Day 1 of the event. In addition, our channel partners are also very well organised, and know which organisations they are going to bring to our booth during ISC West. This pre-planning saves us a tremendous amount of time and ensures that we make the most of the opportunity to meet face-to-face with the many decision-makers who have travelled to the show. The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year Q: How do you quantify your success at ISC West? What ROI do you receive from the show? The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year. Of course we do track the number and quality of the leads we capture as well; however, our face-to-face meetings with end user organisations and channel partners are the primary measures of our ROI. Q: What company activities (outside the show floor) does your company organise each year? The activities we organise outside of the show floor vary from year to year. We have hosted customer appreciation events and roundtable events. We will typically organise an internal sales meeting as well to take advantage of the fact that many of our salespeople and product managers are in the same location. Q: What sets ISC West apart from other trade shows on the calendar? The timing of ISC West is good for most people, as it is still early enough in the budget cycle for most customers to leverage the show to help make decisions – particularly in our banking, retail, cannabis and transit target verticals. Holding the event consistently in Las Vegas is also beneficial, as it makes it easier for people and exhibitors to plan in advance. The city itself is well equipped to handle large exhibitions, offering everything from a central conference space at the Sands to the convenience of nearby accommodations, restaurants etc. Travel is typically convenient as well. In our opinion, ISC West is the premier industry show in North America and appears to be gaining momentum each year.
Booth number: 18037 Hikvision will showcase a wide-range of its video surveillance solutions and security products such as its DarkFighterX dual-sensor with patented bi-spectral fusion technology for low light color imaging; thermal technology for critical perimeter applications, as well as preventive maintenance through temperature alarming and fire detection; specialty solutions for vertical markets including retail, education, gaming and commercial real estate with tailored products and valuable business intelligence analytics; TurboHD (HD over coax) for high resolution video using existing cabling; PanoVu and multi-sensor cameras. We will also feature Hikvision’s central management system, HikCentral, which provides a highly-scalable, reliable, and efficient centralised system management. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience? Hikvision has exhibited at ISC West since 2006. Our presence has grown considerably since then. Each year we showcase Hikvision’s latest technologies and the evolution of the brand through ad campaigns: “Heartbeat of Security” (2016), “Art of Video Surveillance” (2017), and “Achieve Extraordinary” (2018). At ISC West, Hikvision enjoys re-connecting with existing customers and developing new partnerships. Over the years, Hikvision has demonstrated growth and strength within the industry and will continue to support its partners through the dedicated workforce that makes up Hikvision North America. Q: What strategies do you use to get the most out of exhibiting at ISC West? The strategy is simple. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners. With our latest products displayed at our booth and our team of product managers, vertical-market leaders, and other technical gurus readily available in one place, it’s a great opportunity to connect with our current and future partners. Of course, we also have one-on-one client meetings in our meeting rooms throughout the show. And, we also host interactive experiences including trivia games, product demonstrations, and other technical presentations at the Thought Theater in our booth. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Hikvision quantifies its success with a variety of metrics including traffic throughout the booth, attendance at educational sessions we host, the number of meetings we conduct with customers, and responses from our sales team on the engagement with integrators and end users after the show. We also measure the feedback we receive from our advertising campaigns whether it’s through our signage at the show or coverage in publications. Q: What company activities (outside the show floor) does your company organise each year? We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners, and end users. We consider it a fun way for us to say thank you to our valued partners in a casual setting. We’re also an enthusiastic sponsor of the Mission 500 Security 5/2K. Hikvision is fielding a running team, and we’ve begun our fundraising in earnest. Corporate social responsibility is part of our DNA at Hikvision, and the Security 5/2K is a wonderful way to join with our security industry colleagues to make a difference in kids’ lives and give back. Q: What sets ISC West apart from other trade shows on the calendar? Hikvision attends a variety of important conferences and trade shows throughout the year, but ISC West is the big show that attracts international attendees that everyone looks forward to. We wouldn’t miss it.
Booth number: 20031 Pelco is highly invested in providing end-to-end video surveillance solutions for customers, so this priority will remain the same in 2019 and beyond Pelco’s priorities for 2019 at ISC West are informed by worldwide trends in the security industry. As a result, Pelco will be focusing on enhancing cloud connectivity and cybersecurity for their customers. In addition, VideoXpert is Pelco’s best-selling video management solution, so this system will be the primary solution focus moving forward. Pelco is also planning to build upon Pelco Professional Services, which will include VxCare, a three-tier service plan for VideoXpert owners available worldwide this May. Overall, Pelco is highly invested in providing end-to-end video surveillance solutions for customers, so this priority will remain the same in 2019 and beyond. Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. Pelco was established in its current form around the year 1987, we have been attending ISC West since at least then. One memory that stands out is having to make many coax cables connect with all the analogue cameras and switchers. Q: What strategies do you use to get the most out of exhibiting at ISC West? We truly value the media relationships we’ve nurtured over the years. The security trade media specifically have played a pivotal role in sharing the latest news as it relates to our industry and ISC West. In addition to media relations, e-mail blasts and blogs are also key tools to build buzz around our exhibit. Lastly, we utilise a playbook and training protocols developed for our sales department. This information ultimately benefits our customers because they will receive accurate and up-to-date information about our video surveillance solutions. One way we quantify our success at ISC West is to keep track of the number of people attending our booth Q: How do you quantify your success at ISC West? What ROI do you receive from the show? One way we quantify our success at ISC West is to keep track of the number of people attending our booth. The show is considered the premier event in North American security so a major way we measure our ROI is through initial or final meetings with customers and partners. These initial connections can happen on or near the show floor. In addition, our product managers and engineers create a dialogue with our customers so they can determine the transferrable value of a potential solution, which in turn influences our product world map. Q: What company activities (outside the show floor) does your company organise each year? We have participated in the Security 5K in support of Mission 500. Additionally, we sometimes host customers at local end user sites so they get to see the system in operation. Q: What sets ISC West apart from other trade shows on the calendar? It’s the best-attended security conference in North America by far, attracting both domestic and international visitors.
The explosive expansion of IT infrastructure has led to the identity and access management market gaining substantial momentum. As the onslaught of information technology continues, organisations are able to offer users quick and easy access to systems and information from any place, at any time. However the ease of access is inherently associated with the risk of security breach. Organisations must find a balance between fulfilling user demands and doing so in a manner that is safe enough so that cybercriminals cannot take advantage of the system, thus strengthening identity and access management market trends. The prominence of IAM solutions in the BFSI sector In 2016, the world was shocked by the news of the Bangladesh bank heist in which cybercriminals were successful in conducting unauthorised money transfer from Bangladesh Central Bank to banks in Philippines, Sri Lanka and other parts of Asia. In the heist, criminals used Society for Worldwide Interbank Financial Telecommunication (SWIFT) credentials of Bangladesh Bank's employees to carry out more than three dozen fraudulent transactions and extracted $81 million from Bangladesh Central Bank. More than three dozen fraudulent transactions and extracted $81 million from Bangladesh Central Bank. More recently in 2018, hackers were able to siphon nearly $20 million from Mexican banks. Analysts point out that targeted bank systems had security holes that made access to internal servers much easier. Lack of strong access controls were also used by hackers to use credentials of a compromised employee to gain considerable mileage in the siphoning. Identity and access management industry has therefore registered a lot of interest through the financial sector and banks as financial institutions need to prove themselves reliable of customers’ trust. Banks and other financial institutions are rapidly adopting identity and access management solutions capable of providing strong security starting at authentication level and extending to application and data layers. IAM solutions make it possible for financial institutions to integrate new applications and deploy to cloud with greater ease and rapidity. With versatile hybrid deployment model provided by leading IAM solutions, connectivity to SaaS applications as well as legacy enterprise web applications happens more quickly as well as securely. IAM solutions make it possible for financial institutions to integrate new applications and deploy to cloud The significance of cloud and its impact on IAM market outlook Just as the banking sector is facing the challenge of identity authentication as customers around the world are demanding any time access, the proliferation of IoT and cloud technologies is changing the very essense of society in multiple ways. With advancement in IoT technologies, the advent of smart cities has gathered considerable traction. While sensors have been installed in New York that can detect gunshots and alert police, the city of Boston has developed a mobile app to help citizens report civic problems such as burnt out streetlights and potholes. Cities like Paris, Oslo and Hong Kong have large internet-connected statues that are filled with moss to absorb air pollution and notify operators about malfunctions. The network of connected devices continues to expand and the rise of 5G connectivity is anticipated to connect traffic signals, air quality sensors, police patrol cars, etc., over the coming years. Reportedly there would be billions of connected devices around the world by 2020 which will naturally create immense opportunities for identity and access management industry players. This is because new security threats will continue to surface, as without efficient security all connected devices are at the risk of being hacked. The evolution of the smart era – how will it impact IAM market dynamics? Connected devices that constitute the very fabric of smart cities are essentially IoT devices that would be in the field for the next ten fifteen years and therefore identity and access management must be built into the system from the beginning. As identities, keys and tokens have to be managed every time new devices are added, or old ones are removed and the cloud ecosystem is updated, the security components within devices have to be managed well to extend their lifecycle. Identity and access management must be built into the system from the beginning Not only cities but factories are also getting smarter. The term Industry 4.0 came to be first used when the German government used it to define the country’s strategy towards increased digitization in manufacturing. As technologies like IoT and cloud computing continued to expand, they came to be included in the term, and Industry 4.0 came to represent the ecosystem of Internet-connected machines with streamlined and automated workforce and reduced production costs. As the ecosystem continued to expand, trust and identity became important issues in order to ensure the integrity of a smart factory. Healthcare is rapidly becoming a fully digital environment IAM solutions – Influencing the coveted medical domain Other fields like healthcare have also not been impervious to the effects of technological transition. Healthcare is rapidly becoming a fully digital environment that has reaped the benefits of sophisticated IT tools in delivery of care. This has however exposed sensitive healthcare data to cybercriminals who had attempted to hold critical systems and patient records of hospitals to ransom. Healthcare is rapidly becoming a fully digital environment In recent years more than 80% of healthcare institutions have reported that they registered some degree of cyberattacks. Providers and users are increasingly operating from multiple locations, many of which are outside the hospital premises. With users demanding to access systems through a variety of devices, identity and access management has come to witness greater traction from healthcare providers. Over the coming years, the world will be rapidly adopting 5G networks. Though 5G promises much more speedy services for users and business ecosystems, the technology is also expected to impose greater responsibilities on confidentiality of user data and integrity of applications. Identity and access management industry players had been investing in expansive R&D as cyber threats continue to evolve and introduction of new technologies and advent of IoT drastically changes the relationship that users have with their devices. Identity and access management is expected to be useful when much more than personal information is at stake. When cyber criminals have the power to hold hospitals or traffic signals to ransom and disrupt daily lives, health and safety become a priority for authorities and security measures have to be tightened. For instance, after the bank heists in Mexico, the Mexican bank authorities have come to recognize the inevitability for the need of greater control and security of banking networks. Mexican banks have invested heavily over the last year in strengthening their defenses. As such measures against cyberattacks become the norm, identity and access management market is expected to register massive gains over the ensuing years.
Protecting against fire and security risks is an essential aspect of life for people and across all sectors. However, there is an increasing expectation and demand on fire and security providers, in areas such as education. The securitisation of our world paired with the rapid speed of communication and news updates means that young people especially have the potential to be more aware of potential dangers and threats to their own safety and the safety of those around them. Education institutions are large and sometimes sprawling sites that present considerable fire and security challenges. From kindergarten to university Each education site brings distinct challenges, with differing facilities and specialties, as well as the need to maintain the capacity of students, teachers and lecturers to study, learn and teach at the high level expected.Each education site brings distinct challenges, with differing facilities and specialties While some schools and universities are based in urban areas with a mix of heritage and high rise buildings, others are sprawled across green open spaces. Some of these sites have specialised sporting facilities, while others may be focused on engineering or scientific study, with costly technical equipment. Kindergartens and primary schools have their own unique requirements. Parents expect the highest safety standards, while schools require safety in addition to efficient facilities management. The demographic of these institutions is predominantly young children, who are often unaware of or only just learning about fire safety and personal safety. This creates a huge vulnerability and an added onus on teachers to keep their students safe. Facial recognition at West Academy of Beijing In response to this need, Chubb China upgraded the closed-circuit television (CCTV) system for Western Academy of Beijing (WAB) focusing on elevating video content analytic features, including maximised CCTV monitoring, automatic police calling, and a smart search solution. Complementing this, a facial recognition system capable of finding the exact location of a student on campus within 30 seconds was added, aided by real-time remote gate operation. This integrated and advanced system resulted won the "High Quality Educational Technology Suppliers for School" award for the WAB project at the 2019 BEED Asia Future Oriented Construction of Universities and Schools Seminar. This award recognises outstanding solution design and project execution. Parents expect the highest safety standards, while schools require safety in addition to efficient facilities management Awareness remains important at university As students graduate from kindergarten, primary school, junior and senior school, they become more aware of fire safety, relevant dangers and how to protect themselves. Unfortunately, external dangers remain. There are particularly high stakes for university campus facilities managers The safety of students in a university environment is also critical. It is often the first time young people live away from their family home and have the independence of adulthood. For this reason, there are particularly high stakes for university campus facilities managers. In the eventuality of a fire, students could be at great risk and, beyond the immediacy of physical harm, this can have serious ramifications for the reputation of an educational institution. Integrated solutions Integrated solutions must be nimble and adapted to a range of site types including campus residences, recreational areas, open spaces and lecture theatres. Chubb Sicli recently identified and overcame these challenges through the installation of a full suite of fire safety and security equipment and services at Webster University Geneva. Established in Switzerland in 1978, Webster University Geneva is an accredited American university campus that offers programs in English to students interested in undergraduate or graduate-level education. Located in the Commune of Bellevue, just a few kilometres from Geneva's central station, the campus of Webster University Geneva includes five buildings in a park-style atmosphere. Full fire and security audit Chubb Sicli provided Webster’s fire extinguisher maintenance for over 25 years. This business relationship led to a full fire and security audit that identified the need for updates to the university’s security installation. The initial audit showed several improvements to the university’s security profile were needed.The challenge was to create and provide an effective and interconnected fire and security solution The challenge was to create and provide an effective and interconnected fire and security solution, enhancing the security of the student population and its ever-evolving needs. This included complete fire detection and intruder alarms for all five buildings, upgrades to existing CCTV systems, new video surveillance equipment and an automated fire extinguishing system in the kitchen areas. In addition to this integrated system solution, Webster University required access control for all main entrances, with the requirement that all documentation to be made available in English, because Webster is an American company. Customised solution Chubb Sicli’s quality, capability, and security expertise provided a customised solution for the unique educational establishment. Not only was the solution both tailored and integrated, the approach and planning were based on audit, fire extinguisher and emergency light maintenance, fire detection, intrusion detection, access control, video surveillance and Fire Detection. Through dedicated and integrated fire safety support, Chubb provides students and families peace of mind and security. From the moment a young child enters the education system, Chubb’s diligent and effective surveillance and fire safety systems work to prevent and protect, offering a new kind of ‘end-to-end’ service for education systems around the world.
Video surveillance is commonly associated with security. But in most cases, it's used to record incidents and assist in investigations after the fact rather than prevent undesirable events. Artificial intelligence–powered video analytics is a highly promising trend that fundamentally changes the way things work. Extracting manageable data from a video stream can help recognise risky situations early on, minimising damage and, ideally, completely avoid emergencies. At the same time, AI significantly expands the areas of application of video surveillance beyond security systems. AI significantly expands the areas of application of video surveillance beyond security systems However, the hype around this new, trendy technology prevents the potential user from choosing quality solutions in a wide variety of products. This often leads to over-expectation, followed by a complete let-down. Can AI-powered video analytics really be the key to a technological breakthrough in video surveillance? We'll take a look at what the technology can do, what it can't, and where it can go from here. Technological breakthrough or just another bubble? It's often said that the video management software (VMS) market is becoming increasingly commoditised and widely available. A lot of products with similar features (or, at least, similar promises from the manufacturer) make it hard to choose. As a result, vendor names and reputations are turning into one of their primary selling points. Manufacturers have two choices available: get wrapped up in a price war and rely on cutting expenses, or offer a product that's truly innovative and revolutionary. Manufacturers have two choices available: get wrapped up in a price war, or offer a product that's truly innovative and revolutionary VMS developers who choose the second route are gravitating towards creating products that use artificial intelligence based on neural networks and deep learning. Emerging two or three years ago, the AI video analytics market is experiencing a boom in growth. This new tech wave has stirred the still, stagnant backwaters of the VMS world and gave small, ambitious developers something to be optimistic about. It seems they now have a chance to emerge as market leaders in the next few years. However, the hype around this popular trend is raising reasonable concerns among experienced security industry professionals. These concerns come from clients looking for a solution to their problems, and from suppliers building a long-term development strategy. This largely resembles another tech bubble, like the one built up around pre-AI video analytics and burst when it became clear that the sensational promises around it were pure marketing hype (and rather unscrupulously so). However, there are a lot of factors that indicate that AI-powered video surveillance systems aren't another bubble. The three factors The first — and the main one — comes from systems already in place on customers' sites. They fulfill the same promises made during the previous bubble by hotheads in a rush to teach the computer to analyse events in real time using a classical algorithmic approach. The second is the fact that this new technology has seen investment from not only software and cloud startups, but also established VMS developers. Even giants like Intel, which has presented a full line of neural network accelerator hardware and a set of software tools that streamlines working with them, specifically in the field of computer vision. This new technology has seen investment from not only software and cloud startups, but also established VMS developers The third factor lies in artificial intelligence's abilities. AI plays chess, drives cars, and works wonders in many other fields. Why shouldn't it be applied to video monitoring and analysis? What AI can do Just what can artificial intelligence do in video surveillance systems at this stage of development? It can't quite analyse a sequence of events and understand the "logic" of what's happening in the cameras' field of view. At least not yet. But it's probable that AI will learn to do this in the next few years. But neural network analytics can already detect, classify, and track objects very well, providing high accuracy even in busy scenes. Artificial intelligence can be used in the real world to: Detect smoke and flames for early fire warning at open areas (forest, open warehouse, parking lot, etc.) Distinguish people/vehicles from animals and other moving objects, e.g. to protect the perimeter of a nature park from poachers Distinguish a person in a helmet and protective clothing from a person without them to prevent accidents at a dangerous production facility or construction site Count objects of a specific type, e.g. cars in a parking lot, people in the sales floor, wares moving on a conveyor belt, etc. in non-security-related solutions Those are just a few examples. After training a neural network, it can tackle other, similar tasks, too. Generally, a neural network trained in specific conditions isn't replicable. In other words, it won't work as well under different conditions. On the other hand, developers have learned how to quickly train AI for the needs of a specific project. The most important requirement is having enough video footage. Somewhat apart from that is the use of neural networks in facial and automatic number-plate recognition. This is an example of reproducible neural networks (train once, deploy everywhere), which makes them more appealing commercially. If non-reproducible neural networks have only recently become economically feasible due to the rapid evolution of specialised hardware (aforementioned Intel's product, for example), then the use of AI in facial recognition and ANPR has been well established for a long time. The use of AI in facial recognition and ANPR has been well established for a long time Another kind of AI analytics that we'll explore is behaviour analytics. This function, probably more than any other, is bringing video surveillance systems closer to understanding what's happening on camera. Its potential is vast. How behaviour analytics works From a technical point of view, behaviour analytics combines artificial intelligence with a classic algorithmic approach. A neural network trained on a multitude of scenarios can determine the position of the bodies, heads, and limbs of humans in the camera's field of view. The algorithm outputs an array of data containing descriptions of their poses. Conditions can be set for data to detect a specific pose, such as raised hands, prostrated or crouching persons. Developers can use this to quickly create new detection tools to identify potentially dangerous behavior specified by a government or business client. There's no need for additional training of the neural network. How behaviour analytics can be deployed Someone crouched down next to an ATM could be a technician, CIT guard, or burglar. Bank security should be notified in any of the cases. A person in shooter position, together with a bank employee or cashier with their hands raised could indicate a robbery. The system can be configured to automatically send alerts with a surveillance snapshot to the police so they can assess the threat and take action if needed. It's vital that the police receive the alert, even if the employee is unable to activate the alarm. In many cases, attention should be directed to a prostrate individual. This could be somebody who needs immediate help, or it could be someone sleeping in an inappropriate public place, for example, a 24/7 ATM space. Behavioural analytics can also be used to ensure workplace safety. For example, tracking whether employees are holding the handrails when using the stairs at a manufacturing facility or a construction site. What now? Behaviour analytics can be deployed wherever your clients' imagination takes them. With this feature, practically any pose that indicates potentially dangerous behaviour can be detected. Timely response to an alarm helps avoid material damages or, in other situations, casualties. Practically any pose that indicates potentially dangerous behaviour can be detected An area of potential development for behaviour analytics is the ability to analyse a sequence of poses by the same person or a combination of poses and relative positions of several individuals. That will be the next level of evolution in AI's use in video surveillance: moving from "detecting" to "understanding" behaviour in real time. In its most basic form, this type of analytics can be deployed to detect deviations from the search procedure in correctional facilities when a person being inspected must assume a pre-defined sequence of poses. A more advanced form allows it to detect any kind of abnormal behaviour, such as a brawl breaking out in a public space. Ideally, behaviour analytics can predict dangerous situations based on nearly imperceptible cues gleaned from collected statistics and a Big Data analysis. At the moment, this sounds like pure fantasy, but what seemed like whimsy not too long ago is now a reality with AI. It's already beaten humans in chess and the game of Go (Weiqi). Will artificial intelligence be able to outplay humans at charades one day? It's entirely possible that we'll soon see for ourselves.
It is an exciting time at German intelligent video company MOBOTIX, which has launched a next-generation platform that builds on their legacy of video at the edge while opening up the system to third-party partners that can build even more capabilities. MOBOTIX unveiled the new M7 platform and M73 camera at the MOBOTIX Global Partner Conference in Mainz, Germany, in October. MOBOTIX M7 is a powerful, decentralised and secure modular IoT-video system based on deep learning modules. The feedback has been “overwhelming,” says MOBOTIX CEO Thomas Lausten. The new technology will also be featured in the United States at the 2020 MOBOTIX Partner Summit in Hollywood, Fla., in January. A different video surveillance "What you see is a different way of doing video surveillance,” says Lausten. “Our focus on the edge is the difference between us and other companies.” The new MOBOTIX 7 open solution provides an “edge platform” that can be used for a variety of applications, which are provided as “apps” that leverage the platform’s hardware for specific uses, from object detection to face detection to people counting. The new M75 high-end camera incorporates the new platform. The MOBOTIX application programming interface (API) makes it possible for hundreds more apps to be developed over time Currently there are 19 apps available to empower various applications, and availability of the MOBOTIX application programming interface (API) makes it possible for hundreds more apps to be developed over time. If a MOBOTIX partner creates a new app for a specific project, “now he can use it not just for one project but can put it in the app store and sell it all over the world,” says MOBOTIX CTO Hartmut Sprave. Field Programmable Gate Array The new MOBOTIX platform uses Field Programmable Gate Array (FPGA) integrated circuits that provide flexibility and versatility to be adapted to a variety of needs, from deep learning, to higher resolution, or to use with a variety of sensors, such as color, black-and-white or night vision cameras, temperature sensors or microphones. “We can literally include any sensor requested by the market,” says Lausten. The new camera can also be used for age analysis, crowd management or traffic analysis. It can even be used for fire or biohazard detection, incorporating thermal sensors and deep learning. MOBOTIX have added to their legacy of video with a next generation platform Partnerships MOBOTIX developed its new platform in conjunction with Konica Minolta, which owns a majority share of the German manufacturer. The combined knowledge of the two companies created the new platform, with most of the engineering done in Germany. Konica Minolta provided an object detection algorithm, for example, and deep learning capabilities that are being used with the cameras. The two companies are also developing the business together. “They are rolling out our technology on their website throughout the world,” says Lausten. “We are basically part of a global development organisation.” MOBOTIX developed its new platform in conjunction with Konica Minolta The new platform is also completely compatible with legacy MOBOTIX systems: “We have added what we need to what we have,” says Lausten. Cybersecurity is a top priority for MOBOTIX. “With our camera, everything is under our control, every single line of code, and we do all the penetration testing and everything is safe,” says Sprave. In fact, MOBOTIX won the French "Trophée de la Sécurité 2019" Gold Award in the cybersecurity category for the MOBOTIX Cactus Concept, which refers to the fact that all the modules in the MOBOTIX system have “digital thorns” that protect them from unauthorized access. End-to-end encryption is used with no blind spots. Driven by cybersecurity Stronger cybersecurity and a focus on edge devices makes MOBOTIX inherently more cybersecure than a system of networked low-cost cameras, each of which could present a possible cyber-vulnerability. Stronger cybersecurity and a focus on edge devices makes MOBOTIX inherently more cybersecure The flexibility of the MOBOTIX platform expands its utility beyond security to include broader business functions. For example, the same camera that can detect criminals with face recognition can track where people are moving in a retail store, and even analyse age or demographics of customers to track buying patterns. “Cameras are required to think and process at the edge, and that is where we see a lot of focus going, driven by cybersecurity,” Lausten says. Lausten sees opportunity for even faster growth in the U.S. market, where they already have 30 or 40 partners. In the near term, there will be large opportunities provided by the U.S. trend toward “Chinese skepticism,” and cybersecurity concerns that have plagued the lower-cost Chinese imports. MOBOTIX products are proudly “Made in Germany.”
In the banking world, the threat of unwanted intrusions into premises leading to loss of property and even risk to life is always present. Small wonder then that banking institutions take so much care over their security systems and also over their choice of suppliers for those products. In the retail banking sector, requirements for intrusion detection and related security measures are necessarily more stringent and more specialised than in most other areas of business and commerce. The banks clearly need to work with suppliers whose integrity is beyond question. They should also be looking for organisations that can offer expert advice, gained through their knowledge of design and manufacturing security products. Systems need specialist installer partners in order to provide a seamless solution. Systems need specialist installer partners in order to provide a seamless solution The special requirements of the banking sector These supplier organisations must also fully understand the special requirements of the banking sector and, ideally, should be able to demonstrate proven experience in that sector. They must also be willing and able to work with the bank as a partner, to find better ways of addressing old threats and to develop effective measures to counter new ones. Video is a big component of providing security, and variable lighting conditions pose a persistent challenge in video surveillance applications such as large banks and financial institutions. Typically, these venues include an abundance of windows. The resulting excessive light can damage video image quality, by flooding the image plane of the surveillance camera. Dramatic differences between light and dark areas complicate the ability of video cameras to view someone standing in the shadows. A contrasting lack of windows at teller stations can result in dim lighting, equally damaging video image quality, in critical surveillance areas where clear, detailed images are needed the most. Stark contrasts between white and black levels in video images can obliterate faces and finer details of a subject when in a darker area. Particularly, this happens when a person is amid dark internal lighting, with his/her back to the sun. Data capture form to appear here! A new network architecture When upgrading a bank’s digital security system, a new network architecture needs to be created. Usually, this means switching from DVRs to NVR servers. As a result, network switches attach to the camera allowing for easier future system expansion. Along with the newly gained scalability, throughput performance on servers can achieve significantly higher levels. Servers, networking and workstations provide enterprise-quality performance for all financial projects, regardless of size. Servers, networking and workstations provide enterprise-quality performance for all financial projects Implementing a complete video solution with high-performance servers, modern networking protocols and powerful workstations is now possible in financial institutions, even for small projects. Servers, networking and workstations provide enterprise-quality performance for all financial projects, regardless of size. Software is also part of the solution. A new software platform helps banks and credit unions simplify, modernise, and automate security, surveillance and fraud investigations across their enterprise. The platform eases the daily challenges security investigators face. It simplifies and reduces the time to access live and recorded video through an intuitive interface, empowering users to quickly find the data needed to eliminate risks while increasing productivity. With an enhanced user experience, investigators can reduce training time, align investigation workflow, streamline video sharing, and focus on more critical tasks. The fraud and security challenges banks contend with can be overwhelming, but prompt action is necessary to limit the damage that can greatly affect customers, employees, and the brand. When an incident occurs, investigators must turn to innovative security tools to be able to swiftly locate and analyse data. But these solutions are typically complex to use and manage. Investigators must turn to innovative security tools to be able to swiftly locate and analyse data Changing work environments The changing work environment of financial institutions is impacting security needs. A credit union in Australia operates an innovative, modern working environment that utilises flexible workspaces in place of traditional desks. Staff are not allocated a specific desk but instead choose where they wish to sit each day. To facilitate the operation of the flexible work environment and provide employees with storage for their personal effects (work-related material is stored elsewhere), the credit union uses banks of brightly colored lockers that are managed by electronic access control. Using Gallagher’s smartcard, multi-technology T20 and T10 readers on each locker bank, staff badge their access card to open their allocated locker. With the readers communicating with Gallagher’s Command Center software management platform, the credit union has a simple-to-operate, customisable system that enables staff to carry just one card on site. Missed part one of our banking security mini series? Catch up here!
Nigel Waterton recently joined cloud video company Arcules to lead the sales and marketing efforts as Chief Revenue Officer (CRO). He brings to the task the benefit of 22 years of experience building and managing large, high-growth technology organisations. Waterton joins Arcules from Aronson Security Group, an ADT Commercial Company, where he served as Senior Vice President of Corporate Strategy and Development. We caught up with the new CRO to discuss his position and to reflect on how industry changes are impacting integrators and manufacturers. Q: What fresh insights do you bring to Arcules from your previous positions? Waterton: Generally, most manufacturers don’t understand the business model of the integrator. And if they do, their programs don’t necessarily help achieve their goals. Since most manufacturers use integrators to get to the end user, they are often disconnected from truly understanding the customer, their organisation’s business and its impact on the value of the security program. In my previous role, I spent most of my time bridging the gap between these two worlds. It gives me a great platform for understanding how to achieve that with Arcules. Q: How is ‘Chief Revenue Officer’ different from your previous jobs? I have the responsibility of driving innovation for the companyWaterton: While the title is different, the ultimate role I’m in isn’t too different from previous roles that I’ve held in my career. I have the responsibility of driving innovation and strategy for the company, as well as serving as a leader for the sales and marketing team and developing a sales and marketing strategy for the company. This position allows me to build on what I’ve learned throughout my career from an end-user and integrator partner perspective and brings that expertise into the fold of this young, fresh, innovative company that’s paving the way for cloud-based innovation in the marketplace. Q: Is there an industry-wide ‘culture clash’ between the IT-centric nature of cloud systems and the physical security market? How can it be managed? Waterton: Adopters from the IT and physical security worlds are a little at odds over the software-as-a-service (SaaS) offerings as a result of a disconnect with how the cloud is defined in both spaces. A lot of people and companies are creating their own notion of what cloud and SaaS mean. And without a common nomenclature in place, there is a lot of confusion among all users. Similarly, there is a clash among integrators around how to monetise the SaaS offering. This gap can be closed through increased awareness, education and the reiteration of how ubiquitous the cloud already is in our everyday lives. Q: From the integrator perspective, what is the impact of a transition to a cloud/SaaS model on how revenue is managed in the increasingly service-oriented security market? Waterton: Transitioning to a cloud/SaaS model shifts the mindset of the integrator significantly, as the focus changes from project-centric to more customer service-based impact. Becoming more service-minded creates a greater awareness of what the client’s needs are on a day-to-day basis and how that can be improved over time. When operating with a per-project focus, it can be difficult to create a more long-term impact on an organisation. With a cloud-based, service-oriented model, integrators now have the ability to manage client expectations in real-time, which greatly increases their value proposition. Q: What about from the end user perspective? Waterton: There are so many benefits from the end user perspective, including the ability to remove the process of a large investment in capital expenditures (CapEx) and shift to a more manageable, predictable operational expenditure (OpEx). Not only does this allow organisations to adjust as needs change; it also prevents being locked into a long-term solution that might not be able to move with the speed of the company as it scales. That being said, the main benefit is the ability of SaaS/Cloud services to drive innovation and introduce new features as they’re introduced without additional investment from the end user. Q: What impact does the recurring monthly revenue (RMR) model have on the operations/management/cashflow of a supplier/manufacturer company? Waterton: Traditional manufacturers struggle with the introduction of a SaaS modelTraditional manufacturers struggle with the introduction of a SaaS model for many of the same reasons integrators struggle. They must sell the board and possibly their investors on a new valuation model as well as revenue recognition model. That is constraining their innovation in the market. Oddly enough RMR from a manufacturer’s perspective is very similar to the integrator model in that cash flow is more predictable in nature. An RMR model allows a company to grow strategically and innovate constantly, expanding and adjusting to cater to client needs on a daily basis while also providing the ability to look ahead and ensure we’re meeting the needs communicated to us in the market now and into the future. Q: What will be the biggest challenge of your new position at Arcules (and how will you meet the challenge)? Waterton: One of the biggest challenges we’re seeing — and one that will have a significant impact on my role — is the challenge of market adoption of SaaS/cloud services, as well as the awareness about why cloud is a significant part of the future of the industry. There’s also an opportunity to shift the conversation within Arcules from tech-focused outcomes to becoming practitioners of risk-based outcomes. We have to focus on the risk model for organisations, not technology. If we truly understand the risks to the organisation, the tool will become apparent. Answering the questions: Why does a retailer lose product? Why does a facility experience vandalism? We have to understand the sociology of it because that’s how we can address what the service does in the marketplace. Q: Taking the various elements into consideration, what will the ‘physical security industry’ look like five years from now? Waterton: In sum, wildly different. It’s much different than what it was five or even 10 years ago, and with each leap, the industry has moved forward. Products are maturing, bandwidth is improving and the knowledge that we have is exponentially more advanced. There is increasing use of outside perspectives aimed at shaking up the ‘this is how it has always been done’ mentality that many organisations have suffered from. It’s going to look very different five years from now, and cloud-based initiatives will be the key to the success of many organisations.
Manufacturer ROCKWOOL International A.S. has chosen Nedap’s Global Client Programme to secure its offices and factories worldwide. AEOS, the physical security platform by Nedap, installed during the programme, enables ROCKWOOL to establish a truly global security policy and unified work processes. An advanced project rollout, the Global Client Programme is developed for large multinationals and offers several benefits, including standardisation across sites, shorter implementation times and cost efficiencies. Standardising company’s security measures The Global Client Programme connects all of ROCKWOOL’s factories and office premises, and standardises the company’s security measuresROCKWOOL has 28 factories across the world. The Global Client Programme connects all of these factories and ROCKWOOL’s office premises, and standardises the company’s security measures throughout the world. Fokko van der Zee, managing director at Nedap Security Management, says: “The implementation of a standardised security solution across the world is a complex process. It involves a large project spanning many years and involving many stakeholders, and demands a high level of project management. In the absence of a structured program with defined guidelines, a global security rollout is likely to be a stressful execution. That’s why we set up our carefully designed Global Client Programme.” ROCKWOOL Digital Service Lead, Matthew Thorne, agrees: “We’ve worked with Nedap over the past few years and recently became a member of their Global Client Programme. Now we’re equipped with the people and tools we needed to standardise our physical security solution. The Global Client Programme also minimises risk and guarantees compliance. It really meets our needs in every possible way.” Central security platform saves money The programme helps achieve cost savings by avoiding initial setup costs per site and having one central security platform instead of severalThe Global Client Programme is designed to ensure monitoring and control during every step of the rollout process. Timon Padberg, responsible for business development at Nedap Security Management, explains: “The repetitive nature of local site deployments allows us to work with models and templates, such as standard proposal and calculation documents. We can therefore produce a scalable process that ensures uniformity and a consistently high quality of implementation across each site.” By using the Global Client Programme, ROCKWOOL is aiming for uniformity and alignment across all sites. The programme also helps achieve cost savings by avoiding initial setup costs per site and having one central security platform instead of several. Moreover, there are significant savings on operational and maintenance costs due to shared services and economies of scale.
On December 11 to 16, 2018, the 14th FINA World Swimming Championships was held at the Olympic and International Expo Center in Hangzhou, China. Nearly 1,000 world swimming stars from 178 countries and regions competed here, creating a new glory with breaking 9 world records and 22 event records. The Chinese team won three gold medals, five silver medals and five bronze medals with the total medal number ranking the third in the world. The World Swimming Championships is one of the world's highest-level international swimming events. It is also the highest-standard individual international sporting event ever held in Hangzhou. For an international sporting event of this scale, the safety and security of the venues are of paramount importance. Security monitoring equipment As an important guarantee force for the security of the World Swimming Championships, Dahua Technology ensured the event’s safety with the host spirit and a great sense of responsibility. Dahua Technology once again shouldered the mission of guarding international events after successfully guaranteeing the G20 Hangzhou Summit. Dahua Technology provided a complete set of professional intelligent security monitoring equipment and system solutions In the periphery and outside of the venue, important entrances and exits, various passages and commanding points in the venues and security commanding headquarters, Dahua Technology provided a complete set of professional intelligent security monitoring equipment and system solutions, assisted the security department to establish security command headquarters, refined the security deployment of the venues and realised the full coverage of security monitoring from the periphery to the stadium and from the bottom to the commanding heights, facilitating the safe and smooth host of the 2018 Hangzhou FINA World Swimming Championships. Dahua turned the cameras inside and outside the stadium into ‘smart brains’ to guarantee the safety of every corner of the Championships Intelligence equipment At the venue of the 2018 Hangzhou FINA World Swimming Championships - the surrounding area and interior of the Hangzhou Olympic and International Expo Center, Dahua Technology has teamed up to deploy a number of professional intelligent HD PTZ cameras, fiber cameras, bullet cameras, domes, transmission and other intelligence equipment, covering all areas within the venue, which helped the security department to control all corners inside and outside the stadium in real time so that to ensure the safety of the venue and the event. Dahua Technology combined the requirements of ‘first-class venue facilities, first-class organisation guarantee, first-class opening and closing ceremonies, and first-class city image’ in the Championships, focused on key links and built a set of intelligent security video management system with the support of advanced technology platform. Integrated control system It integrated control system, storage and management, and enjoyed the advantages of simple deployment and operation, flexible combination, excellent performance, and a high level of security and stability. It turned the cameras inside and outside the stadium into ‘smart brains’ to guarantee the safety of every corner of the Championships, meeting the high-level security needs of the event. Dahua Technology set the command and dispatch of the security department as the core At the security command headquarters of the site, Dahua Technology set the command and dispatch of the security department as the core, with high-definition tiled LCD screens as the display carriers and brought more intuitive and flexible display and control to the security management of the venues before and after the event to ensure the real-time handling, efficient command and visual control of the entire venues, thus winning the praise of the security department leaders. Display control equipment On the evening of December 16, the 2018 FINA Annual Awards Ceremony was held at the Hangzhou International Expo Center. As a ceremony of the most authoritative awards, with the largest scale and the greatest number of world-class swimming athletes in the global water sports field, Dahua Technology assisted the security units to reuse a large number of equipment around the venue, including intelligent cameras, storage, management platforms and display control equipment, making sure the ceremony was successfully being held. As an essential force in the escort 2018 World Swimming Championships, Dahua Technology actively devoted to the security work. Stationed professional and technical personnel were responsible for on-site equipment support, achieving zero failure of the equipment, successfully completion of the tasks, and winning the praise of the security department leaders.
MOBOTIX has announced a raised focus on cyber security by implementing the “MOBOTIX Cactus Concept.” The concept aims to deliver a comprehensive approach to protecting MOBOTIX products against the threat of cyber-attacks along with education and tools to help customers and partners build and maintain secure video surveillance and access control environments. Multimedia cybersecurity campaign The objective of the Cactus Concept is to implement a multimedia cyber security campaign in order to raise awareness among potential and existing MOBOTIX customers of the importance of data security in network-based video security systems and how organisations can protect themselves through cost-efficient and intelligent solutions. The Cactus Concept protects every element of the design, manufacture and operation of each device End-to-end encryption with no blind spots is required, from the image source via the data cables and the data storage through to the video management system on the user’s computer. Like a cactus, whose every limb is covered in thorns, all of the modules (camera, storage, cables, VMS) in the MOBOTIX system have digital thorns that protect them from unauthorised access. Protecting people, places and property “Modern video surveillance and access control technologies help protect people, places and property across the world but they are increasingly targeted by criminals aiming to infiltrate, take-over or disable these vital systems,” says Thomas Lausten, Chief Executive Officer of MOBOTIX. “With the Internet of Things trend adding billions of IP connected devices each year, our industry must lead the way in creating secure platforms that can reduce the risk posed by these damaging attacks.”MOBOTIX uses the services of SySS, a third-party security-testing company that examines the security of both software and hardware elements As an important company within digital video surveillance, MOBOTIX believes in its “Cactus Concept” that protects every element of the design, manufacture and operation of each device along with end-to-end encryption across the entire usage and management cycle. SySS third party security testing To ensure the highest levels of security, MOBOTIX uses the services of SySS, a highly-regarded and independent third-party security-testing company that examines the security of both software and hardware elements. SySS customers include Basler Versicherungen, Bundeswehr, CreditPlus Bank AG, Daimler, Deutsche Bank, Deutsche Flugsicherung, Festo, Hewlett Packard, Innenministerium/LKA Niedersachsen, SAP, Schaeffler, Schufa, T-Systems and Union Investment. Sebastian Schreiber, SySS CEO said: “MOBOTIX has a contract with us to provide further penetration testing of its technology elements. The initial platform testing on a current camera model revealed very positive results and we will continue security testing as an ongoing process.” “Cyber security has been and will continue to be a core focus for MOBOTIX,” adds Lausten, “and we look forward to working with our peers in the industry, customers and government agencies to protect the very technologies and systems that help make society safer for all.”
Banks and financial institutions have more complex and diverse requirements for video surveillance technology than most other organisations. From corporate buildings, to branch offices, data centres, ATMs and cash depots. Several European Banks benefit from using Mirasys Video Management Software (VMS), which provides high privacy protection and robust technology. Networking the video management system of the bank’s branch offices provides users a single logical system that can be used from any site or from an external service provider's service centre. Hence, VMS services are produced in the most cost-effective way whether it be locally, centrally or outsourced.The unique, non-fragmenting storage file system provided by Mirasys protects against hard disk failure The Mirasys VMS checks the system performance in real time and helps to prevent system failure. Enhanced multi-disk recording minimises data loss and maximises recording continuity. The unique, non-fragmenting storage file system protects against hard disk failure. Benefits to financial sector Perimeter and motion detection monitors sensitive and restricted areas, such us bank vaults or safety deposit boxes, and alerts personnel only if an important event occurs, saving time and operational costs. People counting and other data reporting enables reduction of business inefficiencies and enhances customer service. Advanced alarm management tools enable the creation of specific alarm lists based on the motion, sound or text data triggers; reducing the number of false alarms. Dwell time and stopping detects people loitering at the ATM. Automatic Number Plate Recognition (ANPR) alerts on potential threats and suspicious vehicle movement and reports on car parking utilisation.Automatic Number Plate Recognition (ANPR) alerts on potential threats and suspicious vehicle movement and reports on car parking utilisation Recorded video watermarking guarantees the integrity and authenticity of recorded and exported video data for court evidence. User authentication and setting specific user rights ensures control of system access and protects sensitive data. Also, product features such as audit trail and versatile material management and search functionality support, e.g., the new EU General Data Protection Regulation (GDPR) requirements. The purpose of the audit trail events is both to show what the user has done, and also to track other (programmatic) changes that change the user interface. Key to data security is operational policies for: account security (e.g., personal user accounts, instead of shared accounts, rename default administration accounts, etc.); password security (don't leave systems with default passwords, don't permit too short passwords, use passphrases instead, etc.), and; software and device firmware updating. Mirasys recommends that systems are kept up to date with the latest software versions. In a networked, multi-server or multi-site environment, all Mirasys VMS servers and client applications can be centrally upgraded from the Mirasys management server. Manage easily various event sources in multiple locations with the flexible Mirasys Smart Event Management platform How to protect your surveillance online For deployments, Mirasys recommends that surveillance cameras are installed, when possible, in a private camera network, where the direct camera communications take place only inside the camera network to VMS servers, and is separate from the client access (“viewing”) network (and from the public Internet, in particular). This also prevents the camera streaming and signalling from being forwarded inadvertently to any external systems not part of the VMS solution. In addition, camera access from outside the private network is thus not possible. It is also recommended to protect wide area network links with VPN (Virtual Private Networking), or other secured, connections.Integrated systems such as access control, intruder detection and fire alarm systems serve as sensors for the video management system For server-to-server and client-to-server signalling, the data communication is in Mirasys VMS both compressed and encrypted by default for sensitive data (such as usernames and passwords and other details). Integration and Internet of Things in VMS With larger video management solutions, the integration of different systems is valuable because it allows automated functionalities that eliminate human errors and delays. Integrated systems such as access control, intruder detection and fire alarm systems serve as sensors for the video management system. IoT (Internet of Things) is increasingly applied in the video management. The sensors continuously provide information and, if necessary, based on this information, the predefined decision chains automatically open a video connection to the event place without any delay or error. The resulting snapshot may be one image or a set of several images that supports decision making in a problem situation. All the information is also stored for later processing. The event picture is routed either automatically or manually for people and organisations needing the information. Also, related Standard Operating Procedures can be automatically opened.Mirasys VMS is the answer to the scalability and performance needs of new camera technologies from any manufacturer Mirasys VMS is quick and easy to install, and especially effective in networked, IP-based CCTV systems and their operational and management needs, such as centralised management and upgrading/updating of servers, drivers and client applications without requiring on-site travel to remote locations. User profiles are easy to create and change. Servers can be pre-installed and pre-configured before delivering to the deployment location. Easy-to-use user interface The Mirasys VMS user interface can be adapted to individual and specific needs and preferences and provides more visual space for videos without sacrificing any functionality. A HTML5 (Hypertext Markup Language, Version 5) based user interface in Version 8.4 offers easy access to the Mirasys system from anywhere; PCs, tablets or smartphones. Video surveillance camera features are consistently improving. Image quality can be exceptionally good compared to what it used to be only a few years ago. The newest cameras also require much less network bandwidth due to more effective encoding formats, such as H.265/HEVC (from 40% up to 60% of bandwidth and storage space savings, depending on the footage and device without any loss of quality, or increased quality at the same level with the H.264/AVC encoding) that many IP camera manufacturers have started to support. Individual servers can handle more simultaneously connected cameras than before, and the entire system has no actual upper limit. Mirasys VMS is the answer to the scalability and performance needs of new camera technologies from any manufacturer, and the Mirasys based video management system can be designed freely using the best equipment for the customer-specific requirements and can support also all future needs.
With a history dating back to the 1850s, the Sioux City Public Museum has evolved from its original focus on natural science to a broader emphasis on preserving the area’s heritage, offering a variety of educational programmes, events, and historical exhibitions valued at more than $2 million. Having outgrown its former location in a prominent Victorian-era mansion, the museum moved to a new downtown site in April 2011—a modern, open-concept building that has become known as one of the premier cultural destinations in Siouxland and beyond. With more than 5,000 visitors each month, the Sioux City Public Museum has made public safety and asset protection top priorities. Chosen for its advanced management features, ease-of-use, and exceptional image clarity, the Avigilon high-definition security system has played a key role in helping the museum meet its security goals.The Avigilon high-definition security system is used to deter criminal behaviour and to safeguard valuable artefacts Crime mitigation Located in the heart of downtown, the Sioux City Public Museum is a 55,000 square foot facility with an outdoor plaza, loading dock at the rear, and skyway connected to public parking. “Because of the size of the building, as well as its location in an area known for attracting a transient crowd, we wanted an advanced, high-definition security system to monitor people coming and going from our facility around the clock,” explained Steven Hansen, museum director at the Sioux City Public Museum. “We use the Avigilon high-definition security system to deter criminal behaviour and to safeguard our valuable artefacts.” Based on research and a strong recommendation from the City of Sioux City facilities manager, Hansen chose to work with Electric Innovations, a local provider of security system design, installation, and service who installed the Avigilon high-definition security system to monitor the entrances, permanent exhibition area, temporary exhibition area, and loading dock. “We needed an advanced, high-definition security system that would provide broad coverage, overcome architectural challenges in our open-concept building, and remain unobtrusive,” explained Hansen. “Providing excellent local support, Electric Innovations has installed the best quality security solution possible to deliver optimal system performance.”Each user can select relevant camera views from their own desktop Live monitoring and broad coverage Administrators and exhibition staff at the Sioux City Public Museum manage the Avigilon high-definition security system using the Avigilon Control Center network video management software (NVMS) monitoring the system live throughout the day from their desktop computers. A permanent monitor has been set up in the main reception area to monitor visitors as they enter and exit the permanent exhibit space. The museum installed 15 Avigilon 1 MP and 2 MP cameras in the main exhibit areas as well as in hallways, key entry points, and at the loading dock, and store 29 days of continuous security footage on an Avigilon network video recorder (NVR). Without a permanent security staff, the museum’s administrators are responsible for the facility’s security in addition to all other operational responsibilities, so ease-of-use was a key requirement for the new system. “The Avigilon high-definition security system is very simple to use, providing each of us with a variety of camera views right from our desktop, making it much easier and less time-consuming to monitor throughout the day,” said Deanna Mayo, administrative assistant at the Sioux City Public Museum. “Because each user can select relevant camera views from their own desktop, we can ensure broader coverage of the museum at all times.”Avigilon’s image quality makes it much easier to identify events with greater accuracy Effective security “While our needs are pretty basic, we can quickly and easily identify people and events because of Avigilon’s simple and intuitive user interface,” confirmed Mayo. Avigilon Control Center provides full control over security video playback, making it easy for users to quickly retrieve evidence and speed up response times. “Avigilon Control Center software is 1,000 percent more effective than our previous analogue-based system,” added Hansen. Hansen and Mayo have also been very impressed with Avigilon’s image quality, which makes it much easier to identify events with greater accuracy than before. “I recently spoke with the captain of the police force who is very pleased that we have invested in the Avigilon high-definition security system,” noted Hansen. “We are located in an area that has caused concern for the police, and we have noticed a marked reduction in trespassing since deploying the Avigilon high-definition security system.”Sioux City Public Museum will be able to reduce its insurance costs and protect itself against the threat of false liability claims Safe educational experience The Avigilon high-definition security system has played a critical role in helping the museum ensure public safety and protect its assets worth more than $2 million. “I am confident that the Avigilon high-definition security system will deliver a lower total cost of ownership than other solutions because it offers greater image quality and reliability, requires less maintenance, and will free up our time for other important tasks,” explained Hansen. By installing such an advanced security system, Sioux City Public Museum will also be able to reduce its insurance costs and can more effectively protect itself against the threat of false liability claims. “Most traveling exhibits stipulate strict security guidelines before they can be displayed in a new location,” commented Mayo. “With the Avigilon system in place, we are in a much better position to host new exhibits and share the latest collections to attract new audiences,” said Mayo. With the knowledge that activity is being accurately captured around the clock by the Avigilon high-definition security system, Sioux City Public Museum administrators and patrons alike can enjoy a greater sense of security as they experience the region’s past at this leading cultural institution. “Avigilon has delivered the quality, reliability, and ease-of-use we need to help us deliver a safe, enjoyable, and educational experience,” concluded Hansen. “We have invested in the best quality and most reliable products in the industry.”
VMS software and IP products from Hikvision, a supplier of innovative video surveillance products and solutions, are now being used by the Government of Gujarat Directorate of Technical Education (DTE), to protect and administer education facilities and services across Western India. A government organisation that provides qualitative and higher level technical training for students from a diverse mix of financial and social backgrounds, the Directorate of Technical Education’s (DTE) goal is to deliver global standards of excellence in technical education for all its students. Looking to provide a more secure environment and enhance education management, both inside its college campuses and within classrooms, DTE enlisted the help of Prama Hikvision India to evaluate their needs and recommend a practical solution. Enhancing education processes Working closely with the client, Hikvision undertook site surveys at 43 campuses across Gujarat and in respect of DTE’s management and system performance needs, proposed a cost-effective solution that would provide the required level of indoor and outdoor surveillance coverage. The considerations for the surveillance solution would also take-in DTE’s objective of enlisting the new system to play a role in enhancing the day-to-day education processes, where it could also be used to remotely monitor examinations, as well as being a time-saving facilities management tool for use across the large Western India state.The Hikvision control software fully supports smart search, playback, and smart detection Centralised surveillance monitoring Providing centralised remote surveillance and alarm monitoring, Hikvision proposed an IP-based solution that would use DTE’s existing secure virtual private network (VPN), which connects all education sites across Gujarat to a central point at the Directorate of Technical Education, in the capital city of Gandhinagar, Gujarat. At two control rooms, Hikvision iVMS-5200 Professional VMS software was installed to control and monitor the new surveillance system 24/7. Ideal for controlling any mix of surveillance system products, the iVMS-5200 Professional software fully supports all Hikvision products, including DVRs, NVRs, cameras and speed domes, as well as any mix of third party manufacturer products that conform to ONVIF standard. Allowing DTE’s security and management application needs to be addressed, regardless of its size and complexity, the Hikvision control software fully supports the installed Hikvision products’ smart features, including smart search, playback, and smart detection. Low-light surveillance capability To provide affordable high-quality surveillance imaging across the 43 college campuses covered, Hikvision specified a mix of DS-2CD2620F-IS HD 2 Megapixel vari-focal IR network bullet, and DS-2CD2720F-IS HD 2 Megapixel outdoor network IR dome cameras. Both camera models provide 1920×1080 resolution, and true day and night (ICR) low-light capabilities, along with back-light compensation (BLC). Approximately 1,300 Hikvision cameras installed now provide comprehensive surveillance within the campuses lobbies, classrooms, laboratories, staff rooms, examination halls, auditoriums, storerooms, exit and entry doors, and open campus area access gates and car parks. Integrated campus security The Hikvision iVMS-5200 Professional VMS software enables 43 campus locations to be monitored easily and reliably"The Hikvision IP-based surveillance solution successfully illustrates just what can be achieved with large-scale integration,” explains Pinkal Shah, Asst. Manager - Technical Support, at Prama Hikvision India. “The Hikvision iVMS-5200 Professional VMS software enables 43 campus locations to be monitored easily and reliably, encompassing central video management, integration and failover mechanism." "Supporting all remote sites’ local storage and camera SD storage, the system uses Hikvision’s Center Video Record (CVR) mode using NAS to receive data streams directly from network cameras. With CVR mode, there is no need for an intermediate storage server, which not only increases storage efficiency and system stability, but also greatly reduces system hardware cost for the end-user.” Remote surveillance DTE system operators can remotely check the status of facilities or presence/absence of support staff "The Hikvision video surveillance system utilises a WAN/VPN to connect each of the separate locations in this massive multi-site project,” explains Mr. Dayashankar of Progility Technologies Pvt. Ltd., systems integration company responsible for the installation of the project. “The excellent Hikvision iVMS-5200 Professional VMS software enabled us to integrate the many existing third-party manufacturers cameras into the new system, as well as providing out of office hours remote alarm configuration and monitoring. We found the quality of the Hikvision networked camera images to be exceptional under every operating condition.” Viewed from the central monitoring stations, DTE system operators can now remotely check the status of facilities or presence/absence of support staff across Western India. In addition, on examination of the high definition play back, since the installation went live, incidents of petty theft have been recorded, and stolen belongings of students and facilities recovered.
Round table discussion
Cloud applications are an everyday facet of business these days, exemplified by systems such as Office 365, Salesforce.com and Dropbox. The physical security market is also embracing the cloud after overcoming some initial concerns and thanks to improvements in cloud offerings. We asked this week’s Expert Panel Roundtable: which security markets are likely to embrace the cloud?
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
The role of video surveillance is expanding, driven by all the new ways that video – and data culled from video – can impact a business. As a growing population of video cameras expands into new fields of view, we asked this week’s Expert Panel Roundtable: What is the most unusual application of surveillance cameras you have seen recently?