Government & public services security applications
Banks and financial institutions have more complex and diverse requirements for video surveillance technology than most other organisations. From corporate buildings, to branch offices, data centres, ATMs and cash depots. Several European Banks benefit from using Mirasys Video Management Software (VMS), which provides high privacy protection and robust technology. Networking the video management system of the bank’s branch offices provides users a single logical system that can be used fr...
VMS software and IP products from Hikvision, a supplier of innovative video surveillance products and solutions, are now being used by the Government of Gujarat Directorate of Technical Education (DTE), to protect and administer education facilities and services across Western India. A government organisation that provides qualitative and higher level technical training for students from a diverse mix of financial and social backgrounds, the Directorate of Technical Education’s (DTE) goal...
MOBOTIX has announced a raised focus on cyber security by implementing the “MOBOTIX Cactus Concept.” The concept aims to deliver a comprehensive approach to protecting MOBOTIX products against the threat of cyber-attacks along with education and tools to help customers and partners build and maintain secure video surveillance and access control environments. Multimedia cybersecurity campaign The objective of the Cactus Concept is to implement a multimedia cyber security campaign in...
The Sinan Erdem Dome is the largest multi-purpose indoor venue in Turkey. Located in Istanbul, the dome has a seating capacity of up to 22,500, and hosts a number of events, including concerts, tennis matches, and basketball games. Strengthening stadium security Upon being chosen to host a number of games during the European Basketball Championships 2017, the chief European men’s international basketball competition held biannually, the Sinan Erdem Dome looked to strengthen their securit...
The G20 Summit is an annual meeting of leaders from 20 major economies to discuss global issues. In 2016, China hosted its first-ever G20 forum in the south-eastern city of Hangzhou. Securing the leaders of multiple countries is no easy task, and would require many months of preparation by thousands of labourers in order to ensure the two-day forum, transportation, and cultural activities ran smoothly. China’s largest security project The G20 World Summit was one of the largest security...
Manchester-Boston Regional Airport opened to serve the state of New Hampshire and the surrounding New England community in 1927, a little over two decades after the Wright brother’s first powered flight. Located three miles south of central Manchester, the Manchester-Boston Regional Airport is the fourth largest passenger and third largest cargo airport in New England. The airport is also the busiest in the state, qualifying under the Federal Aviation Administration (FAA) as a “small...
I have been thinking a lot about the U.S. government’s ban on video surveillance technologies by Hikvision and Dahua. In general, I question the wisdom and logic of the ban and am frankly puzzled as to how it came to be. Allow me to elaborate. Chinese camera manufacturers Reality check: the government ban is based on concerns about the potential misuse of cameras, not actual misuse. Before the government ban, you occasionally heard about some government entities deciding not to use cameras manufactured by Chinese companies, although the reasons were mostly “in an abundance of caution.” Even so, I find the targeting of two Chinese companies – three if you count Hytera Communications, a mobile radio manufacturer – in a huge government military spending bill to be a little puzzling. I can’t quite picture how these specific companies got on Congress’s radar. The government ban is based on concerns about the potential misuse of cameras, not actual misuse What level of lobbying or backroom dealing was involved in getting the ban introduced (by a Missouri congresswoman) into the House version of the bill? And after the ban was left out of the Senate version, was there a new wave of discussions to ensure it was included in the joint House-Senate version (with some minor changes, and who negotiated those?). It all seems a little random. Concerns for the U.S. Furthermore, the U.S. ban solves neither of the two main concerns that are generally used as its justification: Concern: Cybersecurity. The U.S. ban “solves” the issue of cybersecurity only if both of the following statements are true. No security system that uses a Hikvision or Dahua camera or other component is cybersecure. Any system that does not use a Hikvision or Dahua camera or other component is cybersecure. What level of lobbying or backroom dealing was involved in getting the ban introduced into the House version of the bill? The ban ignores the breadth and complexity of cybersecurity and instead offers up two companies as scapegoats. Our industry has sought to address cybersecurity, and the one principle that has guided that effort is that cybersecurity is an issue that must be addressed by manufacturers, consultants, integrators and end users – in effect, everyone in the industry. Cybersecurity does not begin and end with the manufacturer and banning any manufacturers from the market does not ensure better cybersecurity. Concern: “Untrustworthy” Chinese companies. Hikvision and Dahua are only two Chinese companies. Any response to concerns about whether Chinese companies are trustworthy would need to cover many more companies that manufacture their products in China. Australian TV recently claimed that “all Chinese companies pose a risk. Because of Chinese laws, there is a requirement for companies to be engaged in espionage on behalf of the state.” Even if one embraces that extreme view, the logic fails when only two companies are targeted. One source told me that 60 to 65 percent of the global supply of commercial video cameras are manufactured in China, so it’s a much bigger issue than two companies.The Chinese government has much more effective ways of conducting espionage than exploiting security cameras And is U.S. security at risk unless or until it is cut off from more than half of the world’s supply of video cameras? Even Western camera companies manufacture some of their cameras and/or components in China. Why name only two (or three) companies, only one of which has ties to the Chinese government? If the goal of the U.S. ban was to address the possibility of cybersecurity and/or espionage by the Chinese government, shouldn’t there be other companies and product categories included? Clearly, video surveillance is not the only category that has the potential for abuse. The Chinese government has much more effective ways of conducting espionage than exploiting security cameras. Global response to U.S. ban And now that the U.S. ban has been passed, how is the ban being misused to justify a new level of alarm about Chinese companies? Australian television effortlessly made the leap from “software backdoors” to a concerted and organised effort by the Chinese government to use cameras to be the “number one country for espionage.” And it’s not just about government facilities: “Even on the street, [cameras] have the potential to inadvertently contribute toward Chinese espionage activity by providing real-time information about the situation on the ground,” says the Australian TV report. If all Chinese companies pose a risk, why is the U.S. government targeting specific companies rather than all Chinese companies? If all Chinese companies pose a risk, why is the U.S. government targeting specific companies rather than all Chinese companies, or at least those with electronics or computer products that could be used for espionage? What about the espionage potential of the 70% of mobile phones that are made in China? What about other consumer electronics such as PCs or smart TVs? How many government facilities that are eliminating Dahua and Hikvision cameras have employees who use iPhones or use other electronic equipment from China? Artificial intelligence & IP-over-coax Also, consider the impact of the ban on business. Hikvision and Dahua have had many successes in the video surveillance market, including in the U.S. market. They have added value to many integrators and end user customers. They have been on the forefront of important trends such as artificial intelligence and IP-over-coax. And, yes, they have made technologies available at lower prices.Cybersecurity issues have plagued several companies in the industry, not just Hikvision and Dahua Cybersecurity issues have plagued several companies in the industry, not just these two, and both Hikvision and Dahua have worked to fix past problems, and to raise awareness of cybersecurity concerns in general. Is a U.S. ban on two companies an appropriate response to a series of geo-political concerns that are much bigger than those two companies (and bigger than our entire market)? Should two companies take the brunt of the anti-Chinese backlash? Video surveillance cameras Is the video surveillance market as a whole better or worse for the presence of Hikvision and Dahua? Is it up to the U.S. government to make that call? In some ways, thoughts of Chinese espionage are a sign of these uncertain political times. Fear of video surveillance is perfectly congruent with long-standing anxieties about “Big Brother;” suspicion about China taking over our video cameras just rings true at a time when Russia is (supposedly) controlling our elections. But should two companies be targeted while broader concerns are shrugged off?
Governments and corporations face crisis events every day. An active shooter terrorises a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective response plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyse. Assessing threats for prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualise all this intelligence data within the context of an organisation’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social media monitoring Free tools like Google Maps or satellite imagery from organisations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis.Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organisations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating a threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualised on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organisations or communities they are protecting Acting and automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organisations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon security guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralised within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis of a threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate emergency response Virtually every organisation has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyse. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimise the impact by improving visibility, collaboration and response.
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organisations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?
In 1973, a brilliant economist named E.F. Schumacher wrote a seminal book titled ‘Small Is Beautiful:’ taking an opposing stance to the emergence of globalisation and “bigger is better” industrialism. He described the advantages of smaller companies and smaller scales of production, highlighting the benefits of building our economies around the needs of communities, not corporations. In almost every industry or market that exists in the world today, you're likely to find a difference in size between companies. Whether it’s a global retail chain versus a small family-owned store, a corporate restaurant chain versus a mom-and-pop diner or a small bed and breakfast versus a large hotel chain — each side of the coin presents unique characteristics and advantages in a number of areas. Disparity in physical security industry Customers are drawn to products and services from large enterprises as the big names typically imply stability This disparity very clearly exists in the physical security industry, and differences in the sizes of product manufacturers and service providers could have important implications for the quality and type of the products and services offered. All too often, customers are drawn to products and services from large enterprises, as the big names typically imply stability, extensive product offerings and global reach. And that's not to say that these considerations are unwarranted; one could argue that larger companies have more resources for product development and likely possess the combined expertise and experience to provide a wide range of products and services. But the value that a company’s products and services can bring isn’t necessarily directly related to or dependent on its size. In an age where the common wisdom is to scale up to be more efficient and profitable, it’s interesting to pause and think about some of the possible advantages of small- and medium-sized businesses (SMBs). Typically, “small” companies are defined as those with less than 100 employees and “medium” with less than 500. Providing social mobility Schumacher argued that smaller companies are important engines of economic growth. Indeed, according to the Organisation for Economic Cooperation and Development (OECD), a group of 36 member countries that promotes policies for economic and social well-being, SMBs account for 60 to 70 percent of jobs in most OECD countries. Importantly, SMBs provide resilience in that there are often large economic and social impacts when big companies fail. Smaller companies are better for regional economies in general, as earnings stay more local compared to big businesses, which in turn generates additional economic activity. SMBs are also better at providing social mobility for disadvantaged groups by giving them opportunities and enabling them to realise their potential. Smaller companies are often more innovative, bringing to the market novel technologies and solutions such as Cloud, analytics, AI, and IoT New companies introduce new technologies There's no denying the role of start-ups when it comes to innovation. In the security industry, many new technologies (e.g. Cloud, analytics, AI, IoT) are first brought to the market by newer companies. In general, smaller companies’ products and services often have to be as good or better than others to be competitive in the marketplace. They are therefore often more innovative, bringing to the market novel technologies and solutions. And these companies are also more willing to try out other new B2B solutions, while larger companies tend to be more risk-averse. Customer service Aside from the quality of products and services, arguably one of the most important components of a security company’s success is its ability to interact with and provide customers the support that they deserve. Smaller companies are able to excel and stand out to their customers in a number of ways: Customer service. Customers’ perceptions of a product’s quality are influenced by the quality of support, and smaller manufacturers often possess a strong, motivated customer service team that can be relatively more responsive to customers of all sizes, not just the large ones. A superior level of support generally translates into high marks on customer satisfaction, since customers’ issues with products can be resolved promptly. Flexibility. SMBs have a greater capacity to detect and satisfy small market niches. While large companies generally create products and services for large markets, smaller companies deal more directly with their customers, enabling them to meet their needs and offer customised products and services. And this translates to adaptability, as SMBs become responsive to new market trends. By having a pulse on the market, smaller companies have much more flexibility in their supply chain and can adjust much faster in response to changing demand. Decision-making. Smaller companies are much more agile in decision-making, while larger enterprises often suffer from complex, tedious and lengthy decision-making processes. Communication is easier throughout SMBs, as smaller teams enable new ideas to flow and can solve problems faster. Job satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction. SMBs are also generally more connected to local communities and participation in community activities leads to a greater sense of purpose. Additionally, SMBs have a much smaller impact on the environment, which is increasingly becoming an important consideration for today’s employees and customers. Though Schumacher's book takes a much deeper dive into the large global effects of scale on people and profitability, the general impact of a company’s size on its products and services is clear. It’s important for all players in the security industry to remember that the commitment and dedication to product quality can be found in businesses of all sizes. Ensuring safety of people, property and assets Large manufacturers may catch your eye, but small business shouldn’t be forgotten, as they can offer end users a robust set of attributes and benefits. While all security companies are aiming to achieve a common goal of providing safety for people, property and assets, smaller businesses can provide extensive value when it comes to driving the economy, innovating in the industry, providing quality employment and offering superior customer service.
Repercussions are rippling through the physical security industry since President Trump signed into law the ban on government uses of surveillance equipment by Chinese manufacturers Hikvision and Dahua. In addition to the direct and indirect consequences of the new law, there have also been other developments likely to impact the future of Chinese companies in the video surveillance market. The ban has raised awareness of Chinese companies’ role in video surveillance, and other developments are related to tariffs and possible sanctions, all playing out amid the backdrop of an escalating trade war. One Chinese manufacturer previously dismissed security concerns about its role in video surveillance as “Cold War rhetoric.” There has been an almost nostalgic tone recently to the escalating concerns about video cameras being used for spying. Hikvision and Dahua have both stated emphatically that they have not conducted any espionage-related activities. Even so, the U.S. government ban has emboldened the concerns. However, to be clear: No one has alleged that technologies from either of the companies have been used for espionage. Rather, the concerns are about the potential for misuse, not actual misuse. Also aggravating the situation are Chinese companies’ previous, actual problems with cybersecurity, which the companies say they have addressed. Here are some recent developments related to the U.S. government ban and Chinese manufacturers in general: Tariffs and trade concerns Additional rounds of U.S. tariffs have targeted an expanding array of Chinese goods, including data storage and processing components such as printed circuit boards, as well as video camera lenses. The escalating trade war has kept generalised concerns about China and its trade practices in the public eye and fomented a level of uncertainty in many markets, including physical security. Additional rounds of U.S. tariffs have targeted an expanding array of Chinese goods Involvement of surveillance in Chinese human rights violations Concerns have surfaced in a Congressional hearing recently about the Chinese government’s surveillance activities targeting the Uyghurs and other Muslim ethnic minorities in the Zinjiang Urghur Autonomous Region (XUAR). Specific attention is being directed at the region’s surveillance system including “thousands of surveillance cameras, including in mosques,” and Hikvision and Dahua were mentioned in the Congressional hearing as profiting from security spending in the area. Increased global media attention The ban has not been widely publicised in the U.S. mainstream media, but the topic has attracted global attention. For example, the Australian Broadcasting Corporation broadcast a 10-minute expose on the use of Chinese-made cameras in Australian government facilities, including “sensitive military facilities.” The report, which mentioned the U.S. ban, noted that “Both [Hikvision and Dahua] have had security flaws be exposed leading to fears that some of the flaws were placed there to help the Chinese government spy.” The report continues: “China is trying to set itself up as the number-one country for cyber-espionage, and this is part of that platform.” How broadly should one interpret the inclusion of "critical infrastructure" mentioned in the bill? Broader interpretation of the bill beyond the federal government The language in the bill leaves a level of ambiguity in terms of the scope of its application, and the security marketplace as a whole has been struggling to understand its full impact. Does the ban only restrict an integrator’s use of Chinese technology on a specific government job, or does it eliminate an integrator who installs the technology (even in non-government projects) from consideration for government jobs? How broadly should one interpret the inclusion of “critical infrastructure” mentioned in the bill, for example, non-governmental facilities? Will other governments and private entities assume they should ban Hikvision and Dahua in order to be compliant? For example, Suffolk, Virginia, has announced it will not to use Dahua or Hikvision cameras because the federal ban applies to “U.S. government-funded contracts and for critical infrastructure and national security usage.” The result of these developments is a kind of snowball effect, simultaneously drawing attention to the issues and adding new elements to an overall narrative. Taken together, these developments suggest the U.S. ban has set off a level of concern about Chinese companies that will have an industry-transforming impact in the months to come.
Newly modernised halls with lots of daylight will house hundreds of exhibitions and conference events at the upcoming Security Essen 2018 at Messe Essen, Germany. A new layout and hall numbering system will be unfamiliar to past attendees but promises to simplify the experience as it brings together attendees and exhibitors. European physical security market Security Essen is an international trade fair, but the emphasis is more on German, Austrian and Swiss companies. In all, Security Essen will feature 1,000 exhibitors from 40 nations. The trade fair has more of a continental European “flavour” compared to IFSEC, which focuses more on the U.K market. At the last Security Essen in 2016, organisers reported about 40,000 visitors including conference participants, VIP guests, members of various delegations and journalists. Security Essen 2018 has more of a continental European “flavour” compared to IFSEC, which focuses more on the U.K market “This year, we have sharpened the profile of Security Essen,” says Oliver P. Kuhrt, CEO of Messe Essen, a trade fair, congress and event organiser with its own exhibition grounds. “The trade fair has become considerably more digital, more modern and more interactive. Due to the optimised hall layout, we are offering our exhibitors and visitors the best possible experience with short paths and direct communication.” Newly modernised Messe Essen The newly modernised site of Security Essen will encompass eight halls, newly renumbered and with the subject areas reorganised, too. Visitors will find Services in Hall 1; Access, Mechanatronics, Mechanics and Systems in Halls 2 and 3 and the Galeria; Perimeter Protection in Hall 3; Video in Halls 5 and 7; and Fire, Intrusion and Systems in Halls 6 and 7. A helpful smart phone app, downloadable free from the Google Play Store (Android) or the Apple App Store (iOS), will be available two weeks before the event and include a show floor plan; the exhibitor list with booth numbers and contact information; and an overview of the supporting programme. A separate hall – Hall 8 – will house new Cyber Security and Economic Security categories. Cyber Security Conference At the new Cyber Security Conference, located prominently at the new East Entrance, experts will share their knowledge about the more pressing challenges and potential of cybersecurity. The programme opens and closes on 25 and 28 September with the main topic “Opportunities and Risks of Cyber Security”. On 26 September, discussions and lectures will centre on “Entry, Admission, Access: Identification Options”.A helpful smart phone app, downloadable free will be available two weeks before the event and include a show floor plan On 27 September, the topic will be smart homes and focus on “Connected Building, Security in the Buildings of the Future”. Speakers will include the president of Germany’s Federal Office for Information Security, who will address cybersecurity as a challenge for politics, business and society. The fair organises the conference in cooperation with the BHE Federal Association of Security Technology and the technical support of the Federal Office for Information Security. In Hall 8, a new Public Security Forum will enable visitors to experience digital security technologies for public spaces from the areas of sensors/IoT, cyber security and surveillance. The products and solutions will be installed in four different building scenarios (town hall, school, hospital and library) and it will be possible to test them extensively. The forum, including lectures and discussions, will target municipal decision makers and planners of public spaces. Comprehensive programme A Security Expert Forum in Hall 2 will present a continuous programme with more than 90 presentations during the period of the fair. Visitors will obtain information and solution ideas about all six subject areas covered at the fair, and the programme will begin with a keynote lecture each morning and finish with a live demonstration in the evening. On the first day of the fair (25 September), Security Essen’s Career Forum will introduce retrainees, students, trainees and graduates to companies from the security industry. Targeted and professional communication will be established between companies and job applicants to facilitate making contacts, developing networks, and filling actual vacancies. Thursday (27 September) will be observed as Fire Prevention Day, and a Drone Course will be provided each day in Hall 7. One day admission to Security Essen is €41; a four-day ticket is €105. Advance sale tickets are discounted.
"Many disasters have occurred in the world, but few have also provided so much delight for posterity." There probably are no better words to describe Pompeii than Goethe’s during one of his trips to Italy – the area of Pompeii encompasses 440,000 square meters that include the archaeological excavations of the ancient Roman city submerged by the eruption of Mount Vesuvius in 79 AD, frozen in time by the sudden rain of ash and lava rock that preserved it for centuries. In 1997 UNESCO declared Pompeii a World Heritage Site, on account of the fact that the extraordinary findings in the cities of Pompeii, Herculaneum and neighbouring cities buried by the eruption provide a complete and vivid picture of society and daily life that have been preserved nearly intact for two millennia. Presently Pompeii is the flagship of the Pompeii Authority, an Institute of the Ministry of Cultural Heritage and Activities and Tourism provided with special autonomy, which is active in the area of protection, conservation, and public access to cultural heritage sites. The Great Pompeii project: video security needs The need to install a video security system was born of the Great Pompeii project, an undertaking ordered by the Italian Government for the purpose of reinforcing the effectiveness of the conservation actions and programmes in the archaeological area of Pompeii, by developing an extraordinary and urgently needed programme of conservation, prevention, maintenance, and restoration. An important and demanding operation, also in financial terms – €105 million from Fesr and national funding – with the objective of modernising the Pompeii archaeological site, not only by stabilising and restoring decorated walls and surfaces, but also by means of security and leveraging the video security system. Metoda's technical expertise "The reasons underlying theneed to implement a videosecurity system included protection of archaeological findings, to tourist control" The project, supported and accompanied by a suitable scientific and technical study plan for the purposes of identifying, researching the scientific knowledge and guiding the operating choices, called for launching a bid for tenders for a new video security system, which was eventually awarded to Metoda in August 2014. An Italian company in the providing solutions, software projects, and consulting in diverse IT and tele-communications sectors – from mobile payments to building management, including civil protection, security and networking – Metoda employs more than 300 experts, from professionals and specialised technicians involved in the business units dedicated to specific applications, including research and development, which collaborates with prestigious research institutes and universities for many years. "The feather in the cap for Metoda is SOA certification, which was received precisely because of our complex internal organisation and attests to the financial and technical capacity of the firm to qualify for designing and implementing large scale public tenders," explains Cesare Gonnelli, Deputy Manager of Metoda. From "under observation" to "under video surveillance" "The reasons underlying the need to implement a video security system were multifaceted, from protection of the archaeological findings, which are often the object of theft and vandalism, to tourist control," adds Gonnelli. The archaeological site, which may receive up to 15,000 tourists in a single day – a numerical turnout second to only the Coliseum – sends us very frequent reports of graffiti, scratches, and defacing of the walls and frescoes of the Roman Domus villas, which are at the heart of the archaeological site. These acts of vandalism are carried out by tourists with their pens and fingernails when they somehow manage to stay within the walls on purpose even after the site is closed to the public. Furthermore, as a result of the recent terrorist attacks, the Authority evaluated the opportunity of utilizing an advanced video security system in support of the physical surveillance activity of the guards. "In fact one of the priorities was being able to clearly distinguish the face of the people and monitoring behaviour that looked out of place inside the area, as well as any objects left behind and considered potentially suspicious," continues Gonnelli. MOBOTIX video surveillance solution Cameras were installed on light posts along the perimeter, and on the walls of the Roman Domus villas Partnering with MOBOTIX since 2011, Metoda had no doubt about the best product to offer to the Pompeii Authority for implementing the video surveillance project. "MOBOTIX easily satisfied the requirements of the bid for tenders, and was in fact the only technology truly capable of providing an answer to the actual requirements of the Authority. A resounding victory, most of all because of the quality of the images, which completely surpassed all the expectations of the customer.". The installation of the first video cameras – almost all of them D15, with the exception of about ten D25 chosen to blend with the architecture and style – started in July 2015, but already in December Pompeii was under surveillance by 240 video cameras, with the objective of reaching more than 380 before the end of the summer, installed both on the light posts placed both along the perimeter of the archaeological site, and on the internal and external walls of the Roman Domus villas. In any event, the video security system is a much more complex IT and telecommunications project, as it required the implementation of a complex network support infrastructure (12 fibre optic rings and 88 nodes) thanks to the strong expertise of Metoda in networking, with a department specifically dedicated to software development and the integration of IT and telecommunication systems. Event-activated video surveillance The video cameras are in operation 24 hours a day, but with the exception of special particular requirements, are only event-activated, in order not to overload the storage, notwithstanding the 700-TB NAS archive system. The recordings can later be viewed on nine 42-inch monitors in a dedicated control room provided with four workstations dedicated for the monitoring personnel. The cameras are event-activated, in order not to overload the storage, notwithstanding the 700-TB NAS archive system No issues were encountered during neither the installation phases nor the deployment of the system, thanks also to the technical expertise of Metoda. "Likewise, no complaints from the personnel in charge of using the system (for the time being the same guards at the park), who received a minimum amount of training, but certainly cannot be called ‘expert’ in the utilisation of advanced technology systems. The ease of use of MOBOTIX solutions certainly gave us an advantage in the quick deployment of the project," concludes Gonnelli. High image quality As in most of the projects implemented by MOBOTIX, the praise should also be attributed in this case to the excellent quality of the images, which cannot be compared – also according to Metoda – to any other system available in the market. Certainly the decentralised concept of MOBOTIX played an important role in promoting all the virtues of the system, especially because of the number of video cameras involved, which prevents overloading the network under "critical" utilisation conditions. Both Metoda’s and the end user’s needs have been satisfied – a fact only confirmed by the idea that considerations are being made to implement a video analysis system to support the anti-graffiti activities, with the objective of studying behaviours considered "suspicious." As such, they could prevent acts of vandalism that could cause irreparable damage to the artistic and cultural heritage.
Security expert Abloy UK has supplied South Staffs Water (SSW) with a bespoke PROTEC2 CLIQ® electromechanical security system for 91 of its operational sites. SSW supplies high quality drinking water to approximately 1.3m people and 35,000 commercial customers over 1,500 square km in the West Midlands, South Staffordshire, South Derbyshire, North Warwickshire and North Worcestershire areas. The SSW clean water sites include treatment works, reservoirs, pumping stations, boosters, and water towers. PROTEC2 CLIQ® electromechanical locking system The installation of the PROTEC2 CLIQ® system, which was completed by Lincoln Security, comprised of 600 Padlocks, 392 Cylinders, 200 User Keys and four Desktop Programmers. In addition, 10 Wall Programming Devices were strategically placed at offices and depots throughout the SSW geographical area to allow key holders to re validate when required. The locking systems are now fully operational, securing and maintaining the safety of equipment - such as pumps and telemetry units - operational apparatus, chemicals, and potable water within reservoirs. There is also scope for the system to be expanded to fulfill additional security and site access requirements, as they are needed. CLIQ®-powered electronic security Abloy’s PROTEC2 CLIQ® cylinder system was chosen because it is specially designed to provide the highest level of security for the most sensitive areas; it offers a patented disc controller structure that requires a moving element in the key. PROTEC2 CLIQ® also possesses key and key blank patent protection to prevent systems from becoming compromised through the unauthorised duplication of keys. The patent, which lasts until 2031, is one of the longest in the industry and covers the entire range. "We chose the Abloy PROTEC2 CLIQ® system because of the versatility and flexibility it offers" In a PROTEC2 CLIQ® locking system, different products can be keyed into the same master key system, meaning all products can be operated with just a single key, simplifying the locking system and key management. In addition, there are 1.97 billion different key combinations; providing the possibility to create extensive master key systems that fulfill the clients’ exact specifications. Versatility and flexibility Kate Wilkes, Resilience and Security Manager at South Staffs Water, said: “We chose the Abloy PROTEC2 CLIQ® system because of the versatility and flexibility it offers – our employees can use just one key for every site they need to gain access to. Individuals that only need to access certain assets can have a particular level of key and other employees can have a higher level where required.” Rob Bennett, Senior Market Development Manager at Abloy, added: “There are a number of specific requirements when securing water sites, and it can be difficult to maintain access to all areas without the risk of keys being lost and a system becoming compromised. “A web-managed, patent protected master-key system that combines electronic access control with the strength of Abloy’s mechanical locks is the ideal solution, as it reduces the number of keys carried by individual employees or contractors, offering a convenient and flexible high security provision.”
The municipality of Haarlemmermeer wanted to replace the existing access control system and bring city hall security up to modern standards. They looked for a system that could manage all municipal buildings centrally. For this reason, the system had to be easily expandable. The access control system also had to include camera supervision of employees' sign-in and sign-out process. Existing access control infrastructure When implementing the new system, the municipality wanted to reuse existing infrastructure and to be flexible in terms of the types of card readers that could be connected; an unambiguous design was preferred. Furthermore, the system had to be able to be expanded to include burglary protection and parking control in the future. There was also the desire to scale down and improve management of the current key plan. Integrated video management The municipality uses access control and IP video on the AEOS platform. AEOS also takes future desires into account such as intrusion detection, lockers and filing cabinets, wireless online locks and key cabinets. All this functionality can be implemented at a later date using the same AEOS platform and the same controller by adding the desired software components - also new locations can be easily added. AEOS was implemented in November 2010 with reuse of the existing infrastructure. AEOS provides access control and IP video management in a single integrated system. In this manner, cameras can be operated from a single location and the foundation is laid for simple, efficient integration and expansion with other systems in the future.
The municipal council of Odense, Denmark’s third biggest city, uses Vanderbilt’s SPC Connect to help monitor and maintain public buildings such as schools, libraries, museums, gyms, housing, and government offices. Remote and instant access Due to the number of buildings under their authority, the municipality of Odense needed a security solution that would provide remote and instant access to deal with potential alarms from any location, at any time. For example, a janitor in charge of maintaining several buildings throughout the municipality, could not be in all places at once should an alarm trigger. Or, if an alarm triggered in the middle of the night, the team leader at a government office might have to leave their bed and drive into the workplace to investigate. SPC Connect is helping to solve this problem. Vanderbilt's SPC currently protects 36 buildings in the municipality of Odense. Therefore, upgrading to SPC Connect was a natural progression for the municipal council. SPC Connect SPC Connect is a cloud-based service that can be used by installers or end system users to access their SPC systems securely. The SPC panel and Connect communicate using FlexC. This is a powerful protocol and can be used to support multiple paths such as Ethernet, GRPS, and 3G. This ensures the system is always connected.SPC Connect is a cloud-based service that can be used by installers or end system users to access their SPC systems securely With SPC Connect, the municipality of Odense’s end users are benefiting greatly from the SPC Connect app. This can be downloaded free of charge from the Apple App Store or Google Play. The app provides them with an interface that contributes clearer arming and status information and allows for remotely carrying out tasks such as controlling doors, setting or unsetting an alarm, or isolating a zone. This instant and remote access to any potential alarms helps save a huge amount of time for those involved in maintaining the system. For example, say a caretaker oversees maintenance for a dozen or so buildings, and an alarm is triggered in one of the buildings. If he happens to be working on the other side of the town and physically getting to the incident is logistically difficult, all he needs to do is take out his smartphone, access the SPC Connect app, view the event investigate further remotely. Simple as. Real-time security alerts The SPC Connect app allows you to receive real-time security alerts. You can then immediately investigate the issue and act if necessary. When an alarm is triggered, you will receive an email notification to your smartphone and then, with your IP cameras connected to SPC, you can check the live video feed on your smartphone to examine the alert further. It saves a lot of time and money, but it also brings comfort and peace of mind to the end user as well. All the user’s interactions through SPC Connect are secured with financial grade SSL security, giving peace of mind alongside powerful control.
Decommissioned in San Diego, California, the USS Midway served from 1945 until 1992, as the longest-serving American aircraft carrier of the 20th century. The historic naval ship museum opened to the public for tours on June 10th, 2004, and receives 1,000,000 visitors annually. The USS Midway’s mission is to preserve, inspire, educate, and entertain visitors as well as serve as America’s living symbol of freedom. Video surveillance system Throughout USS Midway’s 47 years of service, the aircraft carrier played key roles in the Cold War, served with the Atlantic Fleet, was combat deployed in Vietnam as well as the Arabian Gulf for Desert Storm, and many other operations throughout the world. The aircraft carrier is home to flight simulators, a gift shop, café and a theatre, measures 1,001 feet long, and contains 18 decks. The large number of tourists, volunteers, and museum staff occupying the facility, along with the many events held on-board on any given day, make safety and surveillance a top concern for the museum’s Board of Directors. Earlier this year, Director of Safety and Security, Bill McClurg, with the full support of the CEO and the museum’s board, led a team of USS Midway department directors including information technology, finance, and operations, and launched a project designed to update and improve the museum’s existing video surveillance system. The process culminated in the selection of VIVOTEK’s valued partner, Layer3 Security Services, a systems integration company headquartered in San Diego that serves companies, government agencies and institutions throughout Southern California. Network cameras The new video surveillance system features dozens of VIVOTEK network cameras including fixed domes, box cameras, and Pan Tilt Zoom models. “There were many reasons for selecting VIVOTEK for this demanding application,” said Dario Santana, President of Layer3 Security Services. “These include the breadth of VIVOTEK’s product line, the high degree of integration with ExacqVision’s VMS platform, and the products’ superior price and performance. In the end, it only made sense to select VIVOTEK for the USS Midway upgrade,” concluded Dario. In the end, it only made sense to select VIVOTEK for the USS Midway upgrade" VIVOTEK’s FD8365HV and FD8338-HV fixed dome network cameras were also positioned in areas in need of surveillance. Both camera models are able to withstand inclement weather and the IP66 and IK10-rated housing protects the unit against acts of vandalism, making these units a great selection for installation aboard the aircraft carrier. A variety of camera models were chosen to monitor specific areas of the museum and surrounding areas. VIVOTEK’s FD8373-EHV fixed dome network cameras were installed throughout the premises due to the 3-megapixel wide dynamic range CMOS sensor’s excellent ability to adjust to challenging lighting conditions. The WDR Pro feature allows the camera to capture both the dark and bright areas of an image and combine the differences to generate a highly realistic representation of the original scene. Zooming capabilities Working closely with Layer3, Bill McClurg also chose SD8364E, speed dome network cameras for the zoom capabilities in parking lot as well as ship deck monitoring and IP8155HP, box network cameras. VIVOTEK’s SD8364E 1080p full HD resolution speed dome delivers superb image quality with its 30x optical zoom lens, perfect for monitoring wide open spaces. SD8364E’s IP67 and NEMA 4X-rated housing protects against rain, dust, and corrosion as well as operates under extreme weather conditions making it suitable for San Diego’s climate. The IP8155HP professional box network camera offers 1.3-megapixel resolution and WDR Pro II providing extreme visibility in high contrast environments. “Layer3 Security Services and VIVOTEK far exceeded our expectations with the installation of our new upgraded surveillance system. Layer3’s ability to translate our needs into a workable design and their recommendation of VIVOTEK’s superior yet efficient product line led to a successful deployment. Effective video surveillance on a museum, whose mission is to be, ‘America’s Living Symbol of Freedom,’ is an essential element in preserving it for generations to come,” said Bill McClurg, Safety Director.
Public safety and the protection of property initiatives led the city of Mankato, Minnesota to deploy a city-wide IP-based video surveillance system. Founded in 1852, the city is the seat of Blue Earth County. It encompasses 18.26 square miles of land and water, and supports a population of about 41,000 (2015 US census estimate). Home to a variety of natural landmarks and higher educational institutes, Mankato provides a dynamic lifestyle for its citizens all year round. Surveillance for key community areas The new city surveillance system uses a range of Arecont Vision megapixel cameras to cover key areas of the community, with the largest concentration of cameras deployed in the popular downtown entertainment district. Surveillance is also in place throughout Mankato’s city hall, civic event centre, shopping areas, parking ramps, public safety centre, municipal water plant, public works centre, regional airport, and for multiple public parks and community streets. The limitations of the previous surveillance system inspired extensive enhancements and capabilities for the new project. The original system NVR supported primarily analogue technology cameras, with a small percentage of early generation IP cameras supporting only JPEG video. The image quality of megapixel cameras could not be matched by this system, nor could it be cost effectively grown to address city requirements. In order to enjoy enhanced security, increased public safety, and the protection of property, a more modern and capable surveillance system was required. The city thus engaged security and communications integrator WW Communications to design and deploy such a project.The limitations of the previous surveillance system inspired extensive enhancements and capabilities for the new project WW Communications WW Communications’ COO Mike Bales led the effort and selected Arecont Vision’s IP megapixel cameras as the core of the new project. With regards as to why Arecont Vision was selected for the project, Bales explained: “A variety of factors led to the use of Arecont Vision, not least of which was the commitment and quality they provide as an American-based manufacturer. They are one of the few vendors who design and build their cameras in the U.S., and their cameras’ features and reliability reflect that.” Delving further into what features specifically appealed to them, Bales concluded, “Simplified installation features such as remote focus, along with advanced features such as true WDR (wide dynamic range) were key factors in the decision. Additionally, the SurroundVideo camera series’ cost effectiveness and coverage capabilities placed Arecont Vision ahead of its competitors for the job.” SurroundVideo cameras were first designed and pioneered in the surveillance industry by Arecont Vision in 2006. Now in their fifth generation, they provide non-stop coverage with four individual megapixel sensors for superior situational awareness and image quality while reducing the total number of cameras required for surveillance projects. After deciding on a manufacturer, Milestone Systems was then brought on as the video management software for Mankato’s new surveillance system. Arecont Vision and Milestone are proven integration partners, having completed thousands of seamlessly-integrated city surveillance projects around the world. Arecont Vision and Milestone Systems Additionally, Milestone is a top-tier participant in the Arecont Vision Technology Partner Program and its VMS software is among those used in Arecont Vision’s MegaLab. “The close technology and support integration between Arecont Vision and Milestone helped ensure that a best-in-class surveillance system was delivered to the Mankato,” commented Bales. “The result is a single system for the city that is second to none in capabilities and can grow with the community’s needs.” The surveillance system has exceeded the expectations of the city to protect both people and property City surveillance project phases Phase one of the project included deploying thirteen cameras to the newly-built public safety centre. Phase two resulted in the deployment of thirty-seven cameras to the city’s entertainment district. The effectiveness of these cameras led to additional installations at city sites which greatly assisted in reducing common vandalisms and other public safety crimes. Phase three of the project involved the installation of twenty-three MegaDome 2 single sensor cameras onto the fourth floor of a brand-new, four-storey parking facility in the downtown area. Surveillance of the structure was further enhanced through use of a SurroundVideo Omni — a unique omni-directional camera introduced to the industry by Arecont Vision in 2014. Unmatched surveillance capabilities The Omni camera series offers four megapixel sensors that are mounted on three-axis gimbals inside a low-profile dome enclosure. The sensors can be individualised to cover virtually any direction, providing unmatched surveillance capabilities with a single high-resolution camera that is fully integrated with the VMS. With the recent Public Works Centre campus construction project, another three MicroDome G2 and five SurroundVideo Omni cameras were added to the city’s overall surveillance system. Five SurroundVideo Omni cameras and MicroDome G2 cameras were also installed along a pedestrian walkway that stretches from local hotels to the city’s civic centre and entertainment district. The system is expected to continue growing in order to address public safety and property protection concerns as they arise. Security and city-wide situational awareness After a Mankato bar closed for the night, a major altercation took place, where the Arecont Vision Cameras were crucial in solving the crime Depending upon the location and local requirement, the Mankato’s city surveillance system uses a range of Arecont Vision cameras. These include single sensor 2 – 5MP MegaDome 2 and MicroDome G2 cameras. 20MP SurroundVideo multi-sensor cameras provide 180° situational awareness coverage, while omni-directional SurroundVideo Omni G1 and G2 cameras cover an even wider range of deployments. The city surveillance system is managed and monitored from a command centre with a multitude of large screens displayed across a wall. “The surveillance system and the screens are critically important during high-traffic events in the city,” said Mr. Bales. “With three colleges here in town, homecoming is a very busy time of the year. There are also numerous festivals that take place in the city combined with a very dynamic downtown. Our staff is able to view the activities as they happen, enhancing security and city-wide situational awareness.” Video streaming to mobile devices It is not just the security centre that can monitor this system either — video can also be streamed to mobile devices and can be monitored for official use all over the city. The system provides public monitoring as well. There are about half a dozen locations downtown with indoor walkways and skyways that are covered by Arecont Vision cameras with live video, providing the public with supplementary awareness and security. The surveillance system has exceeded the expectations of the city to protect both people and property. An example of the system’s usefulness was evident in a recent incident that made national news. After a Mankato bar closed for the night, a major altercation took place, where the Arecont Vision Cameras were crucial in solving the crime. The city surveillance system caught the incident on camera, providing detailed video evidence which assisted law enforcement in proceeding accordingly. The cameras prompted the ideal outcome in an unfortunate situation, helping make the legal process more efficient and serving to greater deter the occurrence of future incidents. When probed on how the system has performed to date, Bales responded that Arecont Vision “exceeded the expectations.” Arecont Vision looks forward to continuing this legacy throughout its work with the City of Mankato.