Healthcare security applications
Security at healthcare premises has never been higher on the agenda. Patients expect safety and privacy. Yet many medical locations must be open and accessible around the clock. The protection of drugs, vaccines, equipment and data makes it critical to know who accesses where, and when. Mechanical lock-and-key security was not designed to meet these challenges. Wireless locking devices provide the easiest upgrade or replacement for any access system based on mechanical or magnetic locks. Smartc...
Patient falls in nursing homes are a serious problem. In the United States, for example, around 1,800 elderly people, living in nursing facilities, die each year from injuries related to falls, according to the Nursing Home Abuse Center. Those patients who survive their injuries often have a reduced quality of life and suffer some form of permanent disability. Rise in nursing home patient falls Figures show that between 50% and 75% of nursing home residents suffer falls each year, twice the c...
Dahua Technology, a globally renowned video-centric smart IoT solutions and service provider, will hold its 2nd online Dahua Technology Partner Day, from October 13 - 14, 2021, with the theme - ‘Building a digital future’. Dahua Technology Partner Day Adhering to its strategy of open cooperation, Dahua Technology is committed to creating a win-win ecosystem, with major technology partners around the world. This year, Dahua Technology will join hands with its 22 global partners, in...
The Spitalfields Estate in East London uses Genetec Security Centre to modernise CCTV security and build a platform for future service innovation. Business challenge The Spitalfields Estate is a 1.9m ft2, mixed-use development in East London managed by CBRE. It includes corporate offices, retail and residential units, public spaces, and a market independent of its famous neighbour, the Old Spitalfields market. The estate has 16,000 tenants and runs several cultural and entertainment events to...
Rapid aging population, high healthcare costs, and physician shortages are creating an increasing demand for care at home, especially for seniors with long-term health conditions. The GX-Cubic2 Series Smart Care Medical Alarm from Climax Technology Co., Ltd. (Climax), features an LCD display that shows clock time, temperature, GSM signal strength and sensor faults, to keep users fully informed at all times. GX Smart Care Medical Alarm GX Smart Care Medical Alarm is an all-in-one wellness and...
Schools present unique challenges for security and access control. But what about a school that is also a heritage site of exceptional value? The Colegio Diocesano Santo Domingo in Orihuela, Spain, is more than just a school. Its historic buildings date to the 1500s, a heritage site as well as a place of learning — with a museum that requires the protection of the same access system. The college buildings are a Resource of Cultural Interest and on Spain’s heritage registry: They mus...
Scenario: One needs to install a camera in the lobby of a building to capture the entrance area. Problem: The area has a lot of windows which overexposes the image, making it difficult to capture the people coming in and out of the premises. Solution: A security camera with a good Wide Dynamic Range (WDR). What WDR does? Dynamic range refers to the ratio between the largest and smallest measurable quantities of something. In the case of video surveillance, the dynamic range measures the ratio between the lightest and darkest elements of the image. WDR technology is great for high contrast scenes, balancing the brightness and shaded areas simultaneously so an image neither appears blown out or too dark. IHS defines WDR at 60 dB or greater, though it’s not uncommon to see WDR cameras with capabilities of 120 dB or more Decibels (dB) are the value with which dynamic range is measured. IHS defines WDR at 60 dB or greater, though it’s not uncommon to see WDR cameras with capabilities of 120 dB or more. However, keep in mind that each manufacturer has its own method of determining a camera’s dB. Therefore, when comparing product datasheets, it is possible that a camera with a lower ratio outperforms a competitor with a higher dB ratio. How WDR works? Security cameras with WDR technology (e.g. Dahua HDCVI 6.0 PLUS) are using either Digital WDR (DWDR) or True WDR. True WDR uses image sensors and a Digital Signal Processor (DSP) to provide even illumination to all areas of an image. A True WDR-enabled video surveillance camera has sensors that take two scans of each video frame. The first, at low speed (to capture more light), shows the image in normal light conditions. The second scan is taken at high speed to capture less light overall and get an image with strong light in the background. The DSP combines the two scans to form a single, balanced, well-illuminated image. DWDR uses algorithms instead of sensors to digitally brighten too-dark areas and dim too-bright areas. DWDR relies on the DSP chip instead of the image sensor to provide WDR. It adjusts each individual pixel of the image and calculates exposure accordingly. This technique has some limitations: the intense manipulation of pixels leads to the overall image being grainier. On the other hand, DWDR doesn’t need costly image sensors, so DWDR can be a more economical option when WDR is a necessity. When one doesn’t have WDR? Backlight Compensation (BLC) brightens the image so one can see darker details better There are two options for improving the exposure of an image without using WDR. In a high-contrast scene with heavy, broad, backlighting, the camera will adjust to the average illumination, which will darken the image. If no WDR is available, Backlight Compensation (BLC) brightens the image so one can see darker details better. BLC is a legacy technique that uses DSPs to increase the level of exposure for the entire image. Rather than balancing brightness on overexposed and underexposed areas of an image like WDR does, it brightens the entire image. Highlight Compensation (HLC) is a technology where image sensors detect strong light within the image and reduce exposure on those areas to enhance the overall image quality. In a dimly lit scene with bright lighting caused by hot spots (e.g. headlights, street lights), the overall image may become too dark. If no WDR is available, use HLC. The camera automatically suppresses bright light sources, allowing proper exposure of adjacent areas. Conclusion Regardless of the dB value specified, image results will vary depending on the complexity and amount of movement in a scene. To determine the best camera for an application, it is always best to test that it meets the needs and expectations of the customer.
A time attendance system can help to keep a close eye on an employee’s working hours, prevent time theft by accurately tracking and recording employees’ time and attendance. A biometric time attendance system allows employees to clock in quickly and easier compare to the standard system and eliminate “buddy punching” in advance to the traditional time card system. A complete biometric time attendance system includes both hardware and software. Include the electronic divide that scans an employee’s fingerprint or iris and software that stores all the data about time and shifts. Hardware and software can be purchased separately, but it’s best to find a vendor that provides both of them as a complete package. Price of the biometric software Small companies can purchase a basic system that includes hardware and software for about $1,000 to $1,500 Biometric time and attendance systems aren’t as expensive as one might think. Small companies can purchase a basic system that includes hardware and software for about $1,000 to $1,500. Some companies' solution, which works for companies with up to 50 employees, retails for $995 to $1,300. The price includes one fingerprint scanner and software that tracks arrivals and departures, calculates hours for payroll, and tracks vacation time and sick days. Large corporations with many hundreds or thousands of employees should expect to spend at least $10,000 on a biometric time and attendance system. For a complex system serving thousands of employees and multiple locations, the cost could rise as high as $100,000. In addition to a basic software and hardware package, one may need to purchase additional features, services, or accessories. Additional biometric scanners begin at about $1,000 to $1,300 each. Training begins at about $300 to $500 for smaller businesses and can run thousands for larger companies. Accessories like scanner covers, which protect the equipment when it is not in use, begin at about $30 to $50 each. CrossChex Cloud CrossChex Cloud's features include face recognition attendance, temperature, and mask identification Because there are so many options, it helps to talk to vendors about the products they provide. Some will charge an upfront fee for a set number of traditional software licenses; others will charge a monthly fee for web-hosted software. Although the market and advanced technology decrease the price of time and attendance system, some small companies or workshops still can’t afford extra spend besides salaries. Anviz introduces a new solution for those business owners - CrossChex Cloud. One can set up a new account and get only one hardware connected to be a lifetime free subscriber of CrossChex Cloud. Start at $500 only, one can get hardware that is suitable for CrossChex Cloud with advanced features includes: face recognition attendance, temperature, and mask identification, and get records of almost everything one wants to take control of.
Let's Talk Interactive (LTI), a leader in customisable, HIPAA-compliant telehealth software and hardware solutions, has launched the LTI Tempscreen, a safe, standalone check-in system providing health screening and identity verification. LTI Tempscreen The LTI Tempscreen allows workplaces to facilitate a safe environment for both employees and visitors and is ideal for post-pandemic access management. The touchscreen kiosk quickly verifies a user's identity, measures body temperature, and conducts a symptom screening questionnaire, freeing valuable staff time and reducing potentially unhealthy contacts. Using touchscreen tech "It's important for us as innovators to be promoting and normalising the use of this technology in facilities around the country," said Arthur Cooksey, CEO of LTI. The LTI Tempscreen is easily deployable as both a permanent or temporary solution "The LTI Tempscreen is easily deployable as both a permanent or temporary solution and shows that companies are committed to protecting their workers and visitors from current and future threats." Availability The LTI Tempscreen is available in three tiers: Base Tier, Base Tier Plus, and Premium Tier, all of which offer PHI/HIPAA compliance, identity verification, real-time alerts, basic reporting functions, and simply go or no-go temperature scanning. Base Tier The Base Tier is designed for healthcare workers and employees, offering basic reporting functionality and easy temperature screening plus verification capabilities. Users can use one token for identity verification and security (mobile phone, QR code, ID badge, etc.). Base Tier Plus Base Tier Plus offers a greater degree of flexibility and is designed to accommodate both healthcare workers and visitors. Base Tier Plus includes all the Base Tier features, including the use of multiple tokens for identity management and security, improved workflow management, the ability to print wristbands or badges for management and/or visitors, and enhanced real-time reporting. Premium Tier Premium Tier offers full functionality and is designed to be integrated with existing back-end systems like access control, payroll, time clock, electronic medical records, and payment systems.
STARC Systems, a manufacturer of temporary modular wall containment solutions used for occupied renovations and infection isolation unveiled FireblockWall™, the first modular reusable one-hour fire-rated temporary containment system. STARC will begin taking orders in June with deliveries starting in early summer. Product innovations to solve challenges "Our customers have been requesting a one-hour fire-rated containment solution," said Bruce Bickford, VP of Product Development at STARC Systems. "Facility managers have a tremendous responsibility during an occupied healthcare renovation project. If something goes wrong and the Joint Commission, State Inspector or Fire Marshal investigates, it falls on the facility manager to explain every detail. STARC uses customer feedback to inform our product innovations and solve their most challenging needs. FireblockWall™ relieves our customers from wondering if they're meeting the proper safety requirements." Benefits of FireblockWall™ Stops fires, keeping patients, staff, and visitors safe in healthcare environments. Fast installation with minimal labour, two labourers can install a 10' x 15' corner room in 90 minutes, which is an estimated 4 times faster than traditional drywall, plus no taping, mudding, sanding, painting or clean up. Designed to meet NFPA 101 or IBC code, a fire-rated wall must be constructed from the floor to the deck above. With its perimeter tracks, specially designed panels including pre-designed negative air panels and doors, and supporting components, FireblockWall meets the requirements of a one-hour fire-rated listed assembly when installed to spec. Superior noise-blocking, with an STC rating of 40, is 65% quieter than any other temporary containment system. Exceeds ICRA Class IV (infection control),ASTM E119 and ASTM E84 requirements. Cost-effective, the panels are durable and can be used job after job, it typically pays for itself after just 3-5 uses and generates ongoing cost savings. Lower carbon footprint, the sleek, reusable walls save on the waste and debris normally created by building and tearing down drywall. Easy air management, includes a negative air panel to discharge air keeping dangerous dust off the ground, and automatically closes the damper when temperatures exceed 165 degrees. Also includes an air monitor panel that's compatible with all common manometers and has a 2" rated pass-through for wiring. Durable, reusable containment solution These panels offer a safer, more secure worksite, but they also provide us with a professional-looking solution "After making the switch from traditional containment methods such as poly and sheetrock to STARC's FireblockWall™ panels, our team noticed a drastic difference in the time we spend setting up containment in the field," said Adam Bouffard, Construction Supervisor, Hebert Construction. "Not only do these panels offer a safer, more secure worksite, but they also provide us with a professional-looking, durable, reusable containment solution for use on future projects." How it works With FireblockWall™ a one-hour fire-rated solution can be quickly installed in 4 easy steps: Step 1: Mark a centerline and mount the pre-drilled telescoping perimeter tracks. Tracks can easily be customized to length. Step 2: Place the FireblockWall™ panels using a lift & drop connection (no tools required). Step 3: Fill track to panel gaps with fire-rated insulation. Step 4: Place track covers to finish. Fire-rated corners, doors, and accessories are available when the project requires it, including handle sets with multiple lock options depending on the level of security needed. First reusable one-hour fire-rated solution "STARC is committed to delivering value beyond our customers' expectations while addressing long-standing containment challenges in the most sensitive of occupied healthcare environments," said Chris Vickers, President, and CEO of STARC Systems. "We set the standard for temporary modular containment with RealWall™and LiteBarrier™ and now we're thrilled to raise the bar again by introducing FireblockWall™, the first and only reusable one-hour fire-rated solution."
RS2, a trusted provider of access control and identity management solutions, announced its strategy for delivering integrated solutions optimised for environments where advanced security and IoT data are required to provide security, operational efficiency, insight, and agility. It will offer bundled software solutions based on razberi servers and including the most recent release of Access It! Universal, to enable customers to achieve higher levels of resilience, management, and deployment across their infrastructures. Integrated security management Customers are increasingly seeking a standardised platform on which to deploy integrated IoT and security applications. RS2 is extending its relationships with leading technology partners, including razberi and Salient Systems to deliver consolidated solutions on a single server platform. By integrating RS2’s access control software and other applications on razberi’s proven server solutions, an organisation can reduce deployment risk, time to value, and integration cost. Out-of-the-box video surveillance The razberi bundled platforms deliver network optimisation, cybersecurity, and remote health monitoring The intuitive and simple-to-deploy bundled platforms deliver network optimisation, cybersecurity, and remote health monitoring. The razberi platform replaces traditional servers, storage devices, network switches, and camera power supplies with a single appliance designed for IP video recording. With embedded software from RS2, the solution is transformed into integrated security management that offers out-of-the-box video surveillance and access control functionality. Automation “The goal of these consolidated platforms is to automate the deployment and set-up process to enable users to get the most out of their system from day one without assistance from the IT department. Once a customer purchases a bundle, RS2 will do the rest,” said Tim Vahary, RS2 Product Manager. “For our dealers, this approach reduces installation time and saves on labour costs while allowing them to offer integrated capabilities to their customers. It goes right along with our service-first approach to innovation.”
Combating the COVID-19 (coronavirus) pandemic is at the top of the global agenda and providing vaccine to populations around the globe means providing around 8 billion doses - with only one for every person in the world. In addition to the availability of the vaccine, a decisive factor in the race against time is the disposability of the glass vials. Medical-grade vaccine vials The glass must be resistant to a wide range of chemicals and temperature changes To ensure that the mass vaccination against the coronavirus does not fail because of the container, the producers of the vials are massively ramping up their production so as not to become the proverbial bottleneck in the supply chain. However, medical-grade vaccine vials are not standard glass tubes. Whether rolled-rim bottles, threaded bottles or ampoules, they are all made of the special glass borosilicate and require customised production lines. The glass must be resistant to a wide range of chemicals and temperature changes and must not contaminate medicines, for example. Industrial cameras Any interaction between the container and the liquid inside must be prevented, as any chemical interference could affect the vaccine. Even the smallest scratch, crack or fissure can render an entire batch unusable, contaminate the line during the filling process or even lead to a machine standstill. The demands on manufacturers are enormous. It is not only a matter of producing large quantities quickly, but also of maintaining particularly high quality standards. Industrial cameras from IDS Imaging Development Systems GmbH in Germany are currently becoming key components in demand. In an intelligent multi-camera system for the quality control of vaccine bottles from Isotronic GmbH, they take care of the image acquisition. High-speed processing When increasing production capacities, efficient solutions that can be integrated quickly are in demand. The ‘VialChecker’ developed by Isotronic GmbH meets this growing demand exactly. “Our system enables high-speed processing and is usually used at several points in the production line,” explains Gregor Fabritius, Managing Director at Isotronic GmbH. The system works with up to eight cameras per unit, the camera models vary depending on the requirements of the respective control task. For example, they observe the laterally rotating tube glass or the glass bottom and provide high-resolution images. Intelligent software Intelligent software enables accurate fault description analysis and classification “The IDS cameras capture at least 20 images per rotation, allowing up to 120 vials per minute to be inspected for dimensional accuracy or surface condition with very high precision,” emphasises Valentin Mayer-Eichberger, Chief Operating Officer (COO) at Isotronic. Accuracy is up to 0.01 millimetres for dimensional testing. Defects such as cracks, scratches, chips, inclusions or stains, on the other hand, are detected with an accuracy of 0.1 square millimetres thanks to the powerful cameras. Intelligent software enables accurate fault description analysis and classification. High-performance testing systems Experts estimate that global demand for vaccine vials will further increase by one to two billion over the next two years. To ensure that this valuable liquid is protected accordingly, automatic, high-performance testing systems are more in demand than ever to guarantee the immense demand for quality. “We think that we are meeting a growing demand here with our cameras and are pleased to be able to make a corresponding contribution to combating the pandemic,” explains Jan Hartmann, Managing Director at IDS Imaging Development Systems.
Recent cyber-attacks have disabled and even shut down physical assets. Robust foundational security and training staff, able to recognise an attack can help mitigate the threat, as ABB’s Rob Putman explains. Edge devices and data analytics As cyber security specialists, we must navigate an ever-changing threat landscape, one that is made even more complex by the increased interconnectivity between Operational Technology (OT) and Information Technology (IT), as companies look to leverage edge devices and data analytics, as well as remote connectivity, in the wake of the COVID-19 pandemic. As the threat surface evolves, the industry must guard against attacks on key physical infrastructure, carried out by a range of malicious actors, including nation states and criminals intent on blackmail. The chemicals sector, a high-value target for cyber-criminals Cyber-criminals view the chemicals sector, as a high-value target, because of the potential cost In 2017, not long after a ransomware attack that targeted Maersk, the world’s largest shipping firm, made the news around the world. Another cyber-attack, this time targeting physical industrial assets, generated fewer headlines, and yet could have resulted in both real, as well as financial, damage. Cyber-criminals view the chemicals sector, as a high-value target, because of the potential cost, both financial and reputational, to the operator, should production be interrupted or stopped entirely. Cyber security vulnerabilities put physical assets at risk The attack in question, a ‘Triton’ custom malware attack on a petro-chemical facility in Saudi Arabia, targeted a safety system, taking over system controllers. Bugs in the code triggered an emergency shutdown, but could have led to the release of toxic and explosive gases. It was a vivid reminder of how cyber security vulnerabilities are increasingly putting companies’ key physical assets at risk. Two more-recent high-profile incidents illustrate my point. In February, a Florida water treatment plant was hacked. The malicious actor remotely accessed the system for three to five minutes, during which time they opened various functions on the screen, including one that controls the amount of sodium hydroxide (NaOH) in the water. The hacker changed the NaOH from about 100 parts per million to 11,100 parts per million, which could have resulted in a mass poisoning event. Colonial Pipeline cyber-attack incident Then, in May, the Colonial Pipeline system that originates in Houston, Texas and carries gasoline, and jet fuel, suffered a ransomware attack. Using a VPN, hackers targeted back-office IT systems, forcing Colonial to shut down IT hosts and network infrastructure, severing communication with those OT systems that are responsible for communicating ‘transactional data’ associated with fuel delivery. In this instance, a single compromised password disrupted Colonial’s ability to invoice its customers. This dependency on OT data stopped pipeline and business operations, and the company was elected to pay the hackers an initial ransom of US$ 4.4 million, in order to restore operations. The Colonial attack was multi-dimensional, in that it not only impacted Colonial’s business, but also the wider US economy and national security, since the pipeline transports nearly half of the east coast's fuel supplies. Outdated IT system elevates physical risk The increased interconnectivity between IT and OT can also create vulnerabilit Attacks such as these prove that, armed with little more than a laptop, an email account and access to the dark web, determined hackers can cause disproportionate damage to physical infrastructure. As mentioned at the outset, the increased interconnectivity between IT and OT can also create vulnerability. Producers often want to know: Is it risky to connect a production asset or their operational environment to the Cloud? My answer is, if you do so without having done any risk audits around people, processes and technology, or without enhancing and maintaining that environment, then yes, that is risky. For example, we often observe that the life cycle of a production asset far outlasts the IT systems that are used to run it. Take a cement kiln. Several generations of plant operators may have come and gone, but that asset may still run, using legacy software, such as Windows XP and why not? Need to replace aging distributed control systems Well, that’s fine, if you are not concerned about having that asset compromised, and all that entails. A ‘flat’ IT network, an aging distributed control system, and machines with legacy versions of Microsoft Windows, all these elements, which are still commonplace in many industries, make it much easier for attackers to find and infiltrate a company, without needing sophisticated tools. The age-old mantra of not interfering with a piece of equipment or software that appears to be working, often applies to the individual assets. For example that cement kiln that are still controlled by the same Windows XP-based control software. However, if we’re honest, things have changed quite a bit, not because something was broken, but because innovation came in. That same kiln control system is most likely connected to other systems, than when first commissioned and that opens it to exposure to threats that it was never designed for. The human element There is a misconception that IoT-connected devices can open companies to risk There is a misconception that IoT-connected devices can open companies to risk, but many recent, high-profile cyber-attacks have been conducted from a laptop, by hacking someone’s VPN, or are a simple phishing/malware attack. In all these cases, the human element is partly to blame. Take the Florida attack. The compromised computer at the water treatment facility was reportedly running an outdated Windows 7 operating system and staff all used the same password, in order to gain remote access via the Teamviewer app, which the hacker was then able to use. Physical and human assets, key to robust cyber security Discussion on the best way to mitigate the threat is often framed solely around specific technical solutions and ignores the fact that robust foundational cyber security is really driven by two very different, but equally important, types of capital: physical assets (e.g. production machinery), and human assets. The truth is that smart digital software and industry-renowned cyber security applications, while critical, are in many cases, only as good as the weakest human link in the chain. Industry would, therefore, do well to ask itself the following question: Do we have a security problem, or a complacency problem? At this juncture, it is important to point out that the majority of companies that ABB works with, are at least aware of the threat posed by cyber attackers, and the potential impact of an attack, on their revenues, reputation and bottom line. User error and human-generated exposures Making sure staff are aware of the threat and training them to respond properly, if they are targeted, is vital However, user error and human-generated exposures are where most of these attacks occur. Those human failures are mostly not due to malicious intent from employees, but to the lack of training of the employees on secure behavior. Making sure staff are aware of the threat and training them to respond properly, if they are targeted, is vital. However, there are also age demographics at play here. Much of the operations employee base is heading towards retirement and often, there is no plan or ability to backfill these people. Need to invest in new digital and automated technologies If you think you don't have enough people now, in order to stay on top of basic care and feeding of the OT environment, with regards to security, what is that going to be like in 20 years? For this reason, there must be a major industry reset, when it comes to its workforce. Companies must invest in new digital and automated technologies, not only to ensure that they stay ahead of the curve and mitigate risk, but also to attract the next generation of digitally literate talent. Robust cyber security is built on solid foundations When we talk about foundational cyber security, we mean fundamentals, such as patching, malware protection, high-fidelity system backups, an up-to-date anti-virus system, and other options, such as application allow-listing and asset inventory. These basic controls can help companies understand their system setup and the potential threats, identify vulnerabilities, and assess their risk exposure. The Pareto principle states that around 80% of consequences come from 20% of the causes. In the context of cyber security, that means 80% of exposure to risk comes from 20% of the lack of security. If companies do the foundational things right, they can manage out a significant amount of this risk. Importance of maintaining and upgrading security controls However, having basic security controls, such as anti-virus software in place, is just the first step on that journey. Equally important is having someone within the organisation, with the requisite skill set, or the extra labour bandwidth, to operate, maintain and update those security controls, as they evolve. Educating, training and recruiting existing employees, and the next generation of talent, along with forging partnerships with trusted technology providers, will ensure that industry can leverage the latest digital technologies, in order to drive business value, and secure physical assets against cyber-attacks.
The COVID-19 pandemic is only accelerating the expansion of Automation, Robotics, Machine Learning (ML) and Artificial Intelligence (AI), and changing how people live their daily lives. This expansion leads the way with technologies that are developed to solve problems, improve operations, streamline processes and assist people, to focus on learning new skills, creativity, and imagination. Transformation of the physical security industry One of the latest industries to be permanently transformed is physical security. The era of utilising security cameras is slowly changing into more advanced and more efficient technological applications - security robotic solutions. SMP Robotics is a California-based company, which is a pioneer in developing robotic technologies, powered by AI, to assist, improve and deliver on new expectations in today’s world. One of their services is smart surveillance systems. This represents a proactive approach to security. The company, SMP Robotics’ Founder and Chief Executive Officer (CEO), Leo Ryzhenko, stated “Autonomous robotic technologies will become a driving force in future security solutions.” Robotics and AI in autonomous security solutions The robots can patrol 24/7, counteracting intrusion and communicating via voice message with guards The company uses robotics and AI technology to implement autonomous security solutions, which reduce liability and overhead, as well as improving the quality of services. Robotic guards are capable of patrolling all types of facilities, in both urban and rural contexts. The robots can patrol 24/7, counteracting intrusion and communicating via voice message with guards. The inspection robots, deployed by SMP Robotics, are easily integrated with many existing security technologies, armed with obstacle avoidance and anti-collision measures, automatically recharge, and can recognise faces up to 50 metres. As the world grows increasingly complex, technology like this is essential to ensure safety for all. AI-enabled autonomous video monitoring ground vehicles The advancements in technological breakthroughs of SMP Robotics position the company and its AI-powered, autonomous video monitoring ground vehicles, to be the most adaptable to any industry, cost-effective for clients’ business needs, in providing various types of services from public safety, crime prevention, to asset protection and physical security. The last few years were very productive for the company. The latest generation of the autonomous models, which outperform in efficiency, dozens of security cameras, were deployed or in a process to be delivered to a number of key clients, in various industries throughout the globe, from oil & gas, nuclear power plants to data centres, healthcare facilities, and amusement parks. Smart security robots Tal Turner, the Vice President (VP) of Business Development and Partnerships, SMP Robotics, said “We provide autonomous, artificial intelligence, all-weather, all-surface, smart security robots that are turnkey and operate independently on their own, using real-time obstacle avoidance, face recognition, and other cutting-edge technological advancements.” According to Coherent Market Insights, the Robots as a Service (RaaS) market direction will grow by 15.9% by 2028 and reach the threshold of 41.3 billion dollars. SMP Robotics stands at the forefront of the security robotic revolution, making an impactful change to make the world a safer place.
The past year has elevated consumer awareness about personal safety, from COVID-19 issues to social unrest, making safety top-of-mind and the need for personal safety solutions, even more prevalent. In addition, consumers spent more time at home, as schools closed, events were canceled and remote work increased. This prompted two major shifts that, in my opinion, most significantly opened the need for and raised the popularity of mobile safety solutions. Demand for grocery and food delivery apps surged Rise in use of app-based delivery services During the past 18 months, the use of app-based delivery services has skyrocketed During the past 18 months, the use of app-based delivery services has skyrocketed. With more use comes more interactions among strangers in homes and businesses, and while the majority of these moments are completely safe and convenient, incidents are happening, ranging from uncomfortable situations to physical assaults. And, with more delivery drivers on the road, there are going to be more accidents among gig-economy workers. Based on recent estimates, food and grocery delivery are expected to remain popular, even as we get back to normal life. High popularity of mobile security apps and wearables With more work shifting from stationary locations to working on-the-go, mobile security apps or wearables can be a lifeline in all sorts of situations. It’s important for these mobile safety products to be comprehensive, dynamic and designed to address the full range of people’s safety and security needs, from providing simple human reassurance to dispatching emergency help. Domestic violence cases increased According to the National Domestic Violence Hotline, due to COVID-19 lockdown restrictions, domestic violence rose as a result of many victims being stuck at home with their abusers, while sheltering in place and working from home. Mobile safety apps, such as ADT’s SoSecure U.S. Attorneys General and other state-elected officials have endorsed mobile safety apps, like SoSecure by ADT These situations necessitate the need for discreet ways for victims to call for help. U.S. Attorneys General and other state-elected officials have endorsed mobile safety apps, like SoSecure by ADT, as a tool to help victims of domestic abuse, safely call for help, without alerting their abuser. Over the past year, the mobile safety app market has seen tremendous innovation, including more user-friendly ways to make SOS calls. Today, within a single app, a person can summon help hands-free, by saying a secret phrase, by text or by swiping a button. Extension of mobile safety into wearable devices And, users can connect with people trained to help in unsettling situations over video, which can be an effective deterrent and provide video evidence. We’ve also seen the extension of mobile safety into wearable devices, in order to make these devices more discreet and usable. There will always be some safety risks in our lives. However, the good news is there’s no need to live in a constant state of fear. The easiest, most direct way to be prepared and ready to ‘fight back’ is by having a personal safety tool in your pocket, a mobile safety app that is there, when you need it most.
The trend of video customers moving to the cloud has reached a tipping point. At the same time, artificial intelligence (AI) is being adopted on a massive scale. Combining the two trends adds a higher level of value than either component individually. Merging the power of AI and the cloud is a driving force behind cloud surveillance company Eagle Eye Networks’ acquisition of Uncanny Vision, an AI and video analytics company headquartered in Bangalore, India. Expensive AI resources Cloud systems empower customers to leverage AI without having to install and program complicated and expensive hardware, in effect stripping away the barriers to entry that customers face when seeking to embrace AI. The cloud also enables customers to share expensive AI resources. One of the key components is ease of deployment – click, click and turn on the AI for any camera" Simplicity of implementation is crucial to the combined value proposition of Eagle Eye Networks and Uncanny Vision. “One of the key components is ease of deployment – click, click and turn on the AI for any camera (in a cloud system),” says Dean Drako, Eagle Eye Networks CEO. There is also a benefit of having AI systems networked, enabling 25 banks to perform facial recognition of customers from a single cloud-based system, he adds. A transition is also under way in the perception of AI. Video surveillance applications While previously it was seen as an add-on to surveillance systems, now it is seen as a very desirable feature on any system. “Centralised management of the cloud benefits the AI database,” says Drako. “In a project built around licence plate recognition (LPR), for example, all the data goes up to the cloud into a single database, and the customer can get a mobile view of everything going on across the world. You can’t do that without the cloud. And AI for LPR is more accurate.” Uncanny Vision’s targeted focus on AI for video surveillance applications was one factor that attracted Eagle Eye Networks to make the acquisition, says Drako. In contrast, some other companies have embraced broader applications of video AI. Uncanny Vision also has more customers using their system in real-world applications than competitors. Finally, the acquisition will help to expand Eagle Eye Networks’ presence in the LPR market, where Uncanny Vision is especially strong. Improving business operations The 60 employees at Uncanny Vision are mostly engineers and programmers Uncanny Vision’s deep learning algorithms enable recognition, identification, and prediction, improving business operations, customer service, and site safety. Applications include smart parking, retail, smart cities, ATM monitoring, worker safety and perimeter security. The 60 employees at Uncanny Vision are mostly engineers and programmers. “These guys understand how to translate AI algorithms to run very efficiently on various types of hardware,” says Drako. “They optimise how they get the code to run so we can implement in the cloud cost-effectively. They do it at a modest cost to make it more accessible. They understand how to deploy software for high performance on low-cost hardware.” For Uncanny Vision, the new ownership provides more reach. “We have a huge channel and a huge brand,” says Drako. “They are strong technical guys who need a sales and solution channel.” Video analytics solutions Even in light of the acquisition, Eagle Eye Networks will continue to provide a selection of third-party AI and video analytics solutions to customers. Use of AI and video analytics is specific to the application and business needs of each customer. Use of AI and video analytics is specific to the application and business needs of each customer In addition to AI functionality, systems need a ‘business logic’ component that drives how that capability is integrated into a system. System needs vary widely by vertical market, and many third-party vendors are focused on a specific vertical and how AI can benefit that market. Recurring monthly revenue “Third parties can provide analytics and the business logic, which is different for a factory, an office building or for a drive-thru restaurant,” says Drako. “The market is looking for many solutions, and one company couldn’t own a majority of them.” To ensure flexibility, Eagle Eye Networks will accommodate third party solutions, deploy their own analytics, or leverage analytics embedded in cameras. For Eagle Eye Networks’ dealer and integrator customers, the expansion into AI presents a new opportunity for recurring monthly revenue (RMR) and provides greater value to customers. Drako says the impact of the acquisition will be global as AI applications grow in popularity worldwide.
Video is an enormous wellspring of unstructured data in the enterprise environment. Finding new ways to use video data requires easy access for analysis. Gone are the days when video was recorded just to be played back later. New computer capabilities can analyse video to provide business intelligence and trends, all of which requires that a lot of unstructured data be captured, stored and kept immediately accessible. It's a driving force for companies specialising in video storage such as Quantum, which is focused on storing and managing unstructured data, including video, photos, music and sound. Managing various analytics “Unstructured data is driving the massive growth in storage today, and video surveillance fits right in there,” says Jamie Lerner, CEO and President, Quantum. As data multiplies in business, matters of storing and accessing the data take on a larger profile. Especially challenging is meeting the need to store and access expanding amounts of unstructured data, such as video. Video is also part of a changing end-to-end architecture in the enterpriseWhereas 10 years ago, video surveillance was all about recording and playback, now the emphasis is much more on an end-to-end approach. In addition to capturing and playing back video, systems have to manage various analytics, archival and data retention aspects as well as recording. Video is also part of a changing end-to-end architecture in the enterprise, including hybrid, cloud and on-premise storage. Video surveillance industry Historically, structured data, such as financial information, was stored to allow future analytics. The same trend extends to unstructured data, such as video analytics. Quantum has expanded its video storage capabilities with acquisition this year of the video surveillance business of Pivot3, provider of a hyperconverged system that provides recording, analysis and seamlessly archives data on a converged platform that is less expensive and easier to manage. In acquiring Pivot3, Quantum is refocusing the smaller company on the video surveillance industry. “We are now focused 100% on surveillance and having the highest quality while being very cost-effective,” says Lerner. “The industry is ready for an IT-forward solution that is totally focused on surveillance. You can’t make a platform all things to all people.” Traditional security customers There is overlap in large stadiums and theme parks, where Lerner sees even more opportunity to expand Pivot3 will also help to expand Quantum’s customer base. The larger company has a history of serving customers in entertainment, movies, television and sports production. The addition of Pivot3’s 500 new customers in large surveillance, transportation and critical infrastructure markets will expand the mix. There is overlap in large stadiums and theme parks, where Lerner sees even more opportunity to expand. Pivot3 also helps to bridge the gap between traditional security customers and the information technology (IT) department. “Pivot3 has a reputation as simple to use,” says Lerner. “My belief is that physical security can run separately [from IT] until you reach a certain size, then IT has to be involved. Pivot3 gives IT people in the security space a product that is well formed and fits into an IT strategy. They are not undertaking a piece of equipment that will be a burden.” Physical security presence Customers expect their infrastructure vendors to provide systems that allow them to “Set it and forget it,” says Lerner. It’s one of the big advantages of cloud computing and also central to Quantum’s approach with their traditional products. “At the end of the day, you want to run a hospital, for example, so you want your systems to be easy to use,” says Lerner. The Pivot3 acquisition will also allow Quantum to expand their physical security presence more broadly and globally. Previously, the geographic reach of Pivot3 was limited by the high cost of placing personnel in diverse locations. Under Quantum, which has been serving global companies for 40 years, the problem disappears. “Quantum has global support on all continents and in more countries,” says Lerner. “It’s a higher level of support, given size and legacy of our organisation.”
A new generation of video cameras is poised to boost capabilities dramatically at the edge of the IP network, including more powerful artificial intelligence (AI) and higher resolutions, and paving the way for new applications that would have previously been too expensive or complex. Technologies at the heart of the coming new generation of video cameras are Ambarella’s newest systems on chips (SoCs). Ambarella’s CV5S and CV52S product families are bringing a new level of on-camera AI performance and integration to multi-imager and single-imager IP cameras. Both of these SoCs are manufactured in the ‘5 nm’ manufacturing process, bringing performance improvements and power savings, compared to the previous generation of SoCs manufactured at ‘10nm’. CV5S and CV52S AI-powered SoCs The CV5S, designed for multi-imager cameras, is able to process, encode and perform advanced AI on up to four imagers at 4Kp30 resolution, simultaneously and at less than 5 watts. This enables multi-headed camera designs with up to four 4K imagers looking at different portions of a scene, as well as very high-resolution, single-imager cameras of up to 32 MP resolution and beyond. The CV52S, designed for single-imager cameras with very powerful onboard AI, is the next-generation of the company’s successful CV22S mainstream 4K camera AI chip. This new SoC family quadruples the AI processing performance, while keeping the same low power consumption of less than 3 watts for 4Kp60 encoding with advanced AI processing. Faster and ubiquitous AI capabilities Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions" “Security system designers desire higher resolutions, increasing channel counts, and ever faster and more ubiquitous AI capabilities,” explains John Lorenz, Senior Technology and Market Analyst, Computing, at Yole Développement (Yole), a French market research firm. John Lorenz adds, “Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions for meeting the growing demands of the security IC (integrated circuit) sector, which our latest report forecasts to exceed US$ 4 billion by 2025, with two-thirds of that being chips with AI capabilities.” Edge AI vision processors Ambarella’s new CV5S and CV52S edge AI vision processors enable new classes of cameras that would not have been possible in the past, with a single SoC architecture. For example, implementing a 4x 4K multi-imager with AI would have traditionally required at least two SoCs (at least one for encoding and one for AI), and the overall power consumption would have made those designs bulky and prohibitively expensive. By reducing the number of required SoCs, the CV5S enables advanced camera designs such as AI-enabled 4x 4K imagers at price points much lower than would have previously been possible. “What we are usually trying to do with our SoCs is to keep the price points similar to the previous generations, given that camera retail prices tend to be fairly fixed,” said Jerome Gigot, Ambarella's Senior Director of Marketing. 4K multi-imager cameras “However, higher-end 4K multi-imager cameras tend to retail for thousands of dollars, and so even though there will be a small premium on the SoC for the 2X improvement in performance, this will not make a significant impact to the final MSRP of the camera,” adds Jerome Gigot. In addition, the overall system cost might go down, Gigot notes, compared to what could be built today because there is no longer a need for external chips to perform AI, or extra components for power dissipation. The new chips will be available in the second half of 2021, and it typically takes about 12 to 18 months for Ambarella’s customers (camera manufacturers) to produce final cameras. Therefore, the first cameras, based on these new SoCs, should hit the market sometime in the second half of 2022. Reference boards for camera manufacturers The software on these new SoCs is an evolution of our unified Linux SDK" As with Ambarella’s previous generations of edge AI vision SoCs for security, the company will make available reference boards to camera manufacturers soon, allowing them to develop their cameras based on the new CV5S and CV52S SoC families. “The software on these new SoCs is an evolution of our unified Linux SDK that is already available on our previous generations SoCs, which makes the transition easy for our customers,” said Jerome Gigot. Better crime detection Detecting criminals in a crowd, using face recognition and/or licence plate recognition, has been a daunting challenge for security, and one the new chips will help to address. “Actually, these applications are one of the main reasons why Ambarella is introducing these two new SoC families,” said Jerome Gigot. Typically, resolutions of 4K and higher have been a smaller portion of the security market, given that they came at a premium price tag for the high-end optics, image sensor and SoC. Also, the cost and extra bandwidth of storing and streaming 4K video were not always worth it for the benefit of just viewing video at higher resolution. 4K AI processing on-camera The advent of on-camera AI at 4K changes the paradigm. By enabling 4K AI processing on-camera, smaller objects at longer distances can now be detected and analysed without having to go to a server, and with much higher detail and accuracy compared to what can be done on a 2 MP or 5 MP cameras. This means that fewer false alarms will be generated, and each camera will now be able to cover a longer distance and wider area, offering more meaningful insights without necessarily having to stream and store that 4K video to a back-end server. “This is valuable, for example, for traffic cameras mounted on top of high poles, which need to be able to see very far out and identify cars and licence plates that are hundreds of meters away,” said Jerome Gigot. The advent of on-camera AI at 4K changes the paradigm Enhanced video analytics and wider coverage “Ambarella’s new CV5S and CV52S SoCs truly allow the industry to take advantage of higher resolution on-camera for better analytics and wider coverage, but without all the costs typically incurred by having to stream high-quality 4K video out 24/7 to a remote server for offline analytics,” said Jerome Gigot. He adds, “So, next-generation cameras will now be able to identify more criminals, faces and licence plates, at longer distances, for an overall lower cost and with faster response times by doing it all locally on-camera.” Deployment in retail applications Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once Retail applications are another big selling point. Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once (e.g., in a mall), to provide not only security features, but also other business analytics, such as foot traffic and occupancy maps that can be used later to improve product placement. The higher resolution and higher AI performance, enabled by the new Ambarella SoCs, provide a leap forward in addressing those scenarios. In a store setup, a ceiling-mounted camera with four 4K imagers can simultaneously look at the cashier line on one side of the store, sending alerts when a line is getting too long and a new cashier needs to be deployed, while at the same time looking at the entrance on the other side of the store, to count the people coming in and out. This leaves two additional 4K imagers for monitoring specific product aisles and generating real-time business analytics. Use in cashier-less stores Another retail application is a cashier-less store. Here, a CV5S or CV52S-based camera mounted on the ceiling will have enough resolution and AI performance to track goods, while the customer grabs them and puts them in their cart, as well as to automatically track which customer is purchasing which item. In a warehouse scenario, items and boxes moving across the floor could also be followed locally, on a single ceiling-mounted camera that covers a wide area of the warehouse. Additionally, these items and boxes could be tracked across the different imagers in a multi-headed camera setup, without the video having to be sent to a server to perform the tracking. Updating on-camera AI networks Another feature of Ambarella’s SoCs is that their on-camera AI networks can be updated on-the-fly, without having to stop the video recording and without losing any video frames. So, for example in the case of a search for a missing vehicle, the characteristics of that missing vehicle (make, model, colour, licence plate) can be sent to a cluster of cameras in the general area, where the vehicle is thought to be missing, and all those cameras can be automatically updated to run a live search on that specific vehicle. If any of the cameras gets a match, a remote operator can be notified and receive a picture, or even a live video feed of the scene. Efficient traffic management With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself Relating to traffic congestion, most big cities have thousands of intersections that they need to monitor and manage. Trying to do this from one central location is costly and difficult, as there is so much video data to process and analyse, in order to make those traffic decisions (to control the traffic lights, reverse lanes, etc.). With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself. The camera would then take actions autonomously (for example, adjust traffic-light timing) and only report a status update to the main traffic control centre. So now, instead of having one central location trying to manage 1,000 intersections, a city can have 1,000 smart AI cameras, each managing its own location and providing updates and metadata to a central server. Superior privacy Privacy is always a concern with video. In this case, doing AI on-camera is inherently more private than streaming the video to a server for analysis. Less data transmission means fewer points of entry for a hacker trying to access the video. On Ambarella’s CV5S and CV52S SoCs, the video can be analysed locally and then discarded, with just a signature or metadata of the face being used to find a match. No actual video needs to be stored or transmitted, which ensures total privacy. In addition, the chips contain a very secure hardware cyber security block, including OTP memory, Arm TrustZones, DRAM scrambling and I/O virtualisation. This makes it very difficult for a hacker to replace the firmware on the camera, providing another level of security and privacy at the system level. Privacy Masking Another privacy feature is the concept of privacy masking. This feature enables portions of the video (say a door or a window) to be blocked out, before being encoded in the video stream. The blocked portions of the scene are not present in the recorded video, thus providing a privacy option for cameras that are facing private areas. “With on-camera AI, each device becomes its own smart endpoint, and can be reconfigured at will to serve the specific physical security needs of its installation,” said Jerome Gigot, adding “The possibilities are endless, and our mission as an SoC maker is really to provide a powerful and easy-to-use platform, complete with computer-vision tools, that enable our customers and their partners to easily deploy their own AI software on-camera.” Physical security in parking lots With a CV5S or CV52S AI-enabled camera, the camera will be able to cover a much wider portion of the parking lot One example is physical security in a parking lot. A camera today might be used to just record part of the parking lot, so that an operator can go back and look at the video if a car were broken into or some other incident occurred. With a CV5S or CV52S AI-enabled camera, first of all, the camera will be able to cover a much wider portion of the parking lot. Additionally, it will be able to detect the licence plates of all the cars going in and out, to automatically bill the owners. If there is a special event, the camera can be reprogrammed to identify VIP vehicles and automatically redirect them to the VIP portion of the lot, while reporting to the entrance station or sign how many parking spots are available. It can even tell the cars approaching the lot where to go. Advantages of using edge AI vision SoCs Jerome Gigot said, “The possibilities are endless and they span across many verticals. The market is primed to embrace these new capabilities. Recent advances in edge AI vision SoCs have brought about a period of change in the physical security space. Companies that would have, historically, only provided security cameras, are now getting into adjacent verticals such as smart retail, smart cities and smart buildings.” He adds, “These changes are providing a great opportunity for all the camera makers and software providers to really differentiate themselves by providing full systems that offer a new level of insights and efficiencies to, not only the physical security manager, but now also the store owner and the building manager.” He adds, “All of these new applications are extremely healthy for the industry, as they are growing the available market for cameras, while also increasing their value and the economies of scale they can provide. Ambarella is looking forward to seeing all the innovative products that our customers will build with this new generation of SoCs.”
GX-DT35B Smart Care Medical Alarm comes with a brand-new case design. The battery level and the cellular signal strength will be indicated through the white bar on the top cover. In addition, the current status of the system, for example, in learning mode or alarm reporting, will be also indicated through the LED backlight of the large Help button. Users can always be informed of the system status and have peace of mind. GX-DT35B can be compatible with Bluetooth medical devices, like blood glucose/blood pressure monitors, pulse oximeters, etc., to track medical data and remote monitoring directly from caregivers/physicians; and also has telecare alarm features, including emergency monitoring, inactivity monitoring, voice control, and home automation capabilities to assist seniors to have a more secure, healthy living. GX-DT35B Smart Care Medical Alarm is all-in-one wellness, and personal safety medical alarm solution, bridging medical health monitoring and emergency alarm to keep seniors safe in their own homes. Bluetooth Medical Device Pairing GX-DT35B is compatible with Bluetooth Medical devices, like blood pressure/blood glucose monitors, pulse oximeters, thermometers, etc., to track health and medical data and allow caregiver/physicians to remote monitor and provide treatment as needed. Smart Home Automation ZigBee, Z-Wave, or Bluetooth automation devices incorporated into GX-DT35B creates a smarter and safer home, by auto turning on hallway lights at night to decrease the chance of a fall; or auto turn on the heater if there’s a sudden temperature drop. Wi-Fi Hotspot GX-DT35B can serve as a Wi-Fi hotspot, allowing users’ computers, smartphones or other devices to connect and access the Wi-Fi network. Location Tracking GX-DT35B can be paired with BRPD-1 Bluetooth pendant, a small wearable panic button that partners with a smartphone application for GPS location reporting and trigger help alarm with one button press, whether the user is at home or out for a walk. Voice Control GX-DT35B is compatible with Google Home and Amazon Alexa voice control to control home electronic devices, allowing seniors to use their voice to make their environment more suitable without lifting a finger. Pivotell® Advance Automatic Pill Dispenser GX-DT35B is compatible with Pivotell® Advance Automatic Pill Dispenser, keeping secure of all pills, remind users to take their medication, keep track of their medicine intake, and allow caregiver/physician to monitor pill taking results/record and keep an eye on user’s needs. Voice over Internet Protocol (VoIP) & DECT GX-DT35B’s built-in VOIP function allows users to initiate two-way voice calls to contact CMS and family members during alarms and emergency. With the optional add-on of DECT, GX-DT35B can pair with voice extenders, talking pendants, call points…etc placed around the home to create a safety net and peace of mind. Visual Monitoring and Verification GX-DT35B can integrate Camera PIR Motion Sensors to deliver real-time visual monitoring and verification. When an emergency occurs, alerts are immediately sent to family members, and Monitoring Centre to verify the event and sending immediate assistance as needed. Safety & Inactivity Monitoring GX-DT35B can support wireless sensor devices, allowing users to add smoke detectors, water leakage sensors, and gas sensors to monitor emergencies; and motion sensors, door contacts, sensor pad transmitters for inactivity monitoring, to build healthier, safer independent living.
Doncaster Culture and Leisure Trust (DCLT), The Dome, required a new solution that would protect several areas, including one of the largest gym’s in Doncaster, The Fitness Village. Vanderbilt ACT365 system DCLT had a specific brief for this project that specified enhancing the staff and customer experience, while simultaneously providing access control solutions to restricted areas from the general public, members, and staff alike. Oliver Law Security (OLS) Ltd. did not hesitate to recommend the Vanderbilt ACT365 system. ACT365 is not only a fully cloud-based solution, but also offers a flexible solution for installation and management that OLS identified as a key ingredient to meet DCLT’s project brief. API Integration In addition to DCLT’s security requirement, OLS also realised ACT365 as an ideal solution for this task, given the product’s very focused API integration. Thanks to the ACT365 interface, OLS was able to integrate DCLT’s gym management system to enable single-source data to be used to populate the access control system, keep records up-to-date, and enhance customer experience. For instance, previously, the older system had taken up to 3-5 seconds to validate members and open the entry turnstiles. Once the API interface had been achieved, this validation is now done instantly through ACT365 and allows members with active memberships through the entry points without any minimal delay. Game-changer security solution According to Oliver Law Security, using ACT365 and its API interface is a game-changer for this type of project The scope of this project, although not significant in the number of doors, was a very technical project with integration into SQL server and a third-party membership system with the potential for thousands of would-be users. According to Oliver Law Security, using ACT365 and its API interface is a game-changer for this type of project. With multiple updates per day, the access control system is always fully populated with the correct, validated members ensuring DCLT’s premier venue, The Dome, is protected against memberships that have lapsed. Cloud-based off-premise solution The system is entirely cloud-based offers an off-premise solution with no additional new servers required or PC’s running software. Through the ACT365 app, DCLT’s site administrators can manage the system for staff. The beauty of the interface is once the schedule runs, all information is autonomously sent to the ACT365 database, meaning adding new memberships, updating memberships, or revoking access is seamless, not tying up staff verifying and administering the membership/access control systems respectively. Commenting on the project, Oliver (Ollie) Law, Managing Director of Oliver Law Security (OLS) Ltd., stated “We didn’t hesitate to recommend the Vanderbilt ACT365 system. As a Vanderbilt Gold Integration Partner, this is our go-to product, and for Doncaster Culture and Leisure Trust, the flexibility and scalability of the product was best placed to grow with their business.” He adds, “We are fully committed to working and growing with Vanderbilt, and we look forward to other projects of this nature in the future.”
An important heritage site which played a key role in protecting the UK during World War II is itself being made safe and secure with the installation of a comprehensive and fully integrated security system, including more than 75 Dahua HD CCTV cameras. Battle of Britain Bunker The Battle of Britain Bunker is an underground operations room in Uxbridge, formerly used by No. 11 Group Fighter Command during the Second World War, most notably in the Battle of Britain and on D-Day. The operations room was one of the key parts of the world’s first integrated defence system, which linked Fighter Command with Anti-Aircraft Command, Barrage Balloon Command, the Observer Corps, radar, and the intelligence services. The site is run by Hillingdon Council as a heritage attraction with a museum and a visitor centre. Fully integrated security solution DSSL Group installed more than 75 Dahua HD CCTV cameras linked to a Genetec Security Centre VMS DSSL Group completed a full analysis of the existing CCTV and intruder alarm systems, with the aim of creating a fully integrated security solution, to enhance the security around the site, reduce manned security costs, and speed up remote security and police response times. Using the existing wireless network also designed by them across the borough, DSSL Group installed more than 75 Dahua HD CCTV cameras linked to a Genetec Security Centre video management system (VMS), as well as Axis IP PA speakers externally. All cameras are viewable by management and the security team on site, and also from Hillingdon Council’s main CCTV control room. Surveillance cameras with smart analytics using AI External cameras are equipped with smart analytics using AI, to help secure the perimeter of the site. In 2018, a state-of-the-art wireless CCTV system consisting of more than 1,000 Dahua HD cameras, along with Dahua NVRs, XVRs and control and viewing equipment, was installed across the borough by DSSL Group. More recently, an additional 1,000 Dahua HD cameras have been added to the council's network making it 2,000 in total. In addition to the cameras, DSSL Group installed a Honeywell Galaxy 62-zone intruder alarm system which feeds back to a central monitoring station and is also integrated with the VMS. Dahua CCTV system installed Cllr Richard Lewis, Hillingdon Council’s Cabinet Member for Cultural Services, Culture and Heritage, said “The Battle of Britain Bunker is one of Hillingdon’s treasured heritage sites. It played a pivotal role in the Second World War, and it’s important that we keep it protected. Dahua CCTV system will help us to do that with their state-of-the-art system and high performing cameras.”
St. James Hospital in Dublin, Ireland, which has more than 1,000 beds, is a teaching hospital that specialises in not only treatment but health promotion and preventative services at its central location. It is also a central location for the treatment of COVID-19 patients. Tasked with keeping patients and staff safe from the threat posed by the COVID-19 pandemic, St. James Hospital needed a way to add additional screening capabilities to its facility alongside its existing access control terminals. The technology needed to bring a multi-layered approach to screening individuals entering the hospital facility who could potentially introduce a significant amount of risk to those within the facility. Access control solution integrated St. James Hospital chose the Vanderbilt ACTpro access control solution integrated with the ZKTeco Proface-X-TD Facial Recognition Terminal to address its challenges. The ACTpro solution specifically used the ACT1500 Single Door IP Controller and ACT1030 MiFare Card Reader alongside the ZKTeco system. The Proface-X-TD solution uses intelligent engineering facial recognition algorithms and the latest computer vision technology. It supports both facial and palm verification for a fully touchless experience. Coupled with the Proface-X-TD solution, ACTpro can not only grant and restrict access based on biometric functionality, but can detect mask-wearing and high temperatures as a means to grant or restrict access to the facility. As a result, better hygiene is achieved with touchless biometric authentication, skin temperature detection, and masked individual identification. Anti-spoofing algorithm If a member of the staff presents to the door with high skin temperature, that individual is routed to another location, and the door will not open to identify potential infection. The Proface-X-TD solution is also equipped with an anti-spoofing algorithm for facial recognition against almost all types of fake photos and videos. The solution is ideally suited to hospitals like St. James because of their ability to be layered as part of a comprehensive approach to screening individuals considered at-risk for infection as a means to protect patients and other staff members. Elevated temperatures detections The touchless nature of the terminals brings safety and hygiene issues to the forefront, cutting down on possible exposure to infectious disease. The device detects people with elevated temperatures who can then be further scrutinised to add extra screening processes and identify potential disease exposure. This ability, along with the visitor check-in and tracking processes integrated with the ACTpro access control system, is a critical component in today’s modern healthcare facilities to provide real-time data for security officials.
Today’s medical institutions have a large number of patients who require constant supervision, risk malpractice and patient negligence claims, need to ensure hygiene compliance, and find solutions for the high security and video storage costs. When faced with limited high administrative costs, government funding, or recession, intelligent video security solutions can help hospitals relieve the pressure. Choose Ava Unified Security (formerly Vaion) to reduce liability claims, detect threats proactively, improve operational efficiency, and provide surgery documentation for educational purposes. Why Ava? Anomaly detection and analysis in real-time Ava’s pervasive, integrated video analytics use self-learning to give an enhanced understanding of all of the user’s cameras’ feeds. The staff can use the dynamic Video view with Spotlight that brings only the relevant feeds to their attention. In unusual activity cases, the operators can immediately respond when a high-risk patient leaves his room unattended or visitors are wandering in prohibited areas. Increased situational awareness Add maps of the user’s facilities and rooms to keep track of high-risk patients, visitors, and staff and their exact location. Maps include Smart Presence, a capability that lets the users track them as they move through their facilities. Combine with access control to locate patients and staff in critical moments. Administrators can also have a clear picture across their locations to improve patient care and daily operations. Quick search within minutes for insurance claims Operators can find visual evidence to prove or disprove liability claims fast and accurately or if hygiene protocol compliance is followed correctly. Smart Search allows personnel to search by appearance, events, objects, similarity, or image. The vcore VMS integrates with access control systems through the generic access control API. It is possible to get a clear picture of historical entries and exits of patients and staff and the video associated with it. Sharp images and integrated audio analytics Equipped with directional acoustic sensors, Ava vcam Dome and Pano notify security and healthcare professionals instantly when loud noises, screaming, glass breaking, and gunshots occur. The cameras also deliver unmatched video quality required to provide recordings for scientific presentations, research, and education. vcam is suitable for different settings, from parking lots and storerooms to patient wards and operating rooms. Key benefits, delivered: Build from existing investment while retaining privacy Integrates with existing cameras Hundreds of hours saved in forensic searches Add access control to extend capabilities Video and metadata storage remain securely on-premises Full site survivability and local access Safe and reliable environment Capture every detail at all times with discreet security cameras Monitor high-risk patients at all time with remote monitoring Enable preventative action through immediate response time Improve operations and services Save storage and money Automatically decrease storage demands from all of the user’s recordings Reduce bandwidth consumption on critical links with AI-based optimisation Support both on-premises and cloud within a single deployment Up to 200 cameras per Ava vserver appliance - small footprint support for larger facilities Simplicity and compliance One-click Ava vcam configuration Encrypted media at rest and in transit Automatic firmware updates Digital watermarking to prevent tampering Simple subscription model without hidden costs or analytics add-ons Simple and flexible licencing With a simple licencing model, Ava always includes services and software upgrades. The users no longer have to worry about integration charges, operator charges, API fees, or the complexity between small, medium, large, and enterprise services.
Places of leisure, where one spends one’s downtime, are public by design. Unlike a bank vault or power plant, they actively invite visitors. One can’t just lock them down and hope no one turns up. Equally, to ensure user and property safety, access must not be a free for all. Managing risk - separating authorised from unauthorised people and locations - is part of every site manager’s daily routine. Intelligent locking makes this workload a whole lot easier. Intelligent keys combine the powerful features of electronic access control with the convenience and familiarity of mechanical keys. In hugely diverse leisure settings across Europe, they already help managers do more with less. Everyone treasures their leisure. The right access solution can help one do it safely without putting a burden on those responsible for one’s security. We treasure our leisure. The right access solution can help us do it safely without putting a burden on those responsible for our security. Controlling access to outdoor sites and visitor attractions Obviously, for many leisure attractions, wired electronic security is not an option. Locations may be remote - far beyond the reach of mains electricity. Assets themselves may be outside. Thankfully, cabling is not essential for effective intelligent access control. Robust, battery-powered locking, backed by intuitive admin software one can access from anywhere, matches or exceeds the functionality of traditional wired access control. Padlocks built to withstand climate extremes integrate within one’s system exactly like standard interior locks. Intelligent electronic key systems are also budget friendly. Making the switch from mechanical security is not an all-or-nothing decision. The best intelligent key systems let one roll out gradually, as needs evolve and budgets allow. For example, the Llyn Brenig Reservoir and Visitor Centre in Wales attracts tens of thousands of tourists every year. Both mechanical and electromechanical locking protect a site which houses critical infrastructure and watersports facilities - with disparate security needs. Here electromechanical locking brings long-term cost savings to site owners Welsh Water, because locks no longer need to be changed when keys are lost. Permissions are simply deleted from the system software. In 2015, Twycross Zoo launched a £55 million, two-decade development plan. High on the agenda was a new intelligent key solution to replace a mechanical master-key system which was labour-intensive to administer. The new system’s flexibility has put zoo security managers in full control of their site. Only staff with the necessary authority and training can access animal enclosures. Carrying one programmable key able to open doors, windows and padlocks makes the security team’s rounds easier It’s simple for system administrators to issue time-defined user keys. These can permit vets or zookeepers access to enclosures for a specific time period outside regular hours - for example, in an emergency. When the period expires, the key no longer works and site integrity is automatically restored. Access control in the museum sector When Edvard Munch’s painting “The Scream” was stolen from an Oslo museum in 1994, thieves left a note which read: “Thanks for the poor security”. Securing museums - open spaces with priceless contents - presents one of security’s biggest challenges. Around 50,000 artworks are stolen every year, according to some estimates. Adding further complexity, many museums are located within historic properties. The building itself may be integral to the attraction - and come with strict heritage protections. Any new locking installation must make minimal mess. For this reason, wireless is increasingly the preferred choice. Wireless access systems based on robust, key-operated locking, rather than cards and other keyless credentials, combine a familiar technology (the metal key) with the intelligence to keep staff and collections safe. Carrying one programmable key able to open doors, cabinets, windows and padlocks makes the security team’s rounds easier. It also minimises the number of keys in circulation - with obvious security benefits. Companion software makes key tracking straightforward: one always knows who exactly is carrying credentials, can refine or amend those permissions quickly and order a full audit trail on demand. And these locks are discreet enough to maintain the property’s appearance. Museum access control in action London’s Design Museum needed access control designed to protect high-value assets and exhibits. Devices here protect a contemporary site with three galleries, a restaurant/café and an events space, with 100 permanent staff and hundreds (sometimes thousands) of daily visitors. The building has multiple door sizes and must meet British Standards compliance. Installation was easy and wire-free, because encrypted electronics inside CLIQ locks are powered by the standard batteries Electromechanical locks now control access through 56 doors, forming part of a security ecosystem which incorporates traditional mechanical locks, too. Using intuitive management software, security managers ensure every staff member accesses only the right areas. Contractors are issued with temporary programmable keys, which saves time formerly wasted escorting them around the building. The system the Design Museum chose - CLIQ® from ASSA ABLOY - also enables integration with third-party cloud-based solutions, for control via a single, central management interface. The delicate balance between protecting a precious building and guarding its contents sets a major challenge. Security and access control must be “subtle, but ever present,” according to one former moderator of the Museum Security Network. Invasive installation, showy or inappropriately designed devices and components cannot be considered. This was the checklist facing France’s Musée Maurice Denis: the museum is inside a listed 17th-century monument, so they turned to CLIQ access control technology for a solution. Drawing on extensive experience in the heritage sector, ASSA ABLOY delivered security without disrupting the building aesthetic. Installation was easy and wire-free, because encrypted electronics inside CLIQ locks are powered by the standard batteries inside every programmable key. No further power supply is needed at the door. Around 70 robust, hard-wearing cylinders and padlocks now secure doors and windows inside and outside the main building; waterproof padlocks protect CCTV camera housing on the exterior. Every employee receives access to relevant areas via a single CLIQ key, which administrators program with only the appropriate permissions. Insurance compliance is another major concern in the heritage sector. Indeed, insurers for 17th-century warship Vasa demand Sweden’s highest level of locking: Class 3. Yet the Vasamuseet’s access system must also allow 1.2 million annual visitors to move around freely, while keeping exhibits safe. To upgrade an existing mechanical system, around 700 interior door cylinders were equipped with CLIQ Remote electromechanical technology. Museum staff used to carry heavy chains with ten or more keys. Now facility managers can amend the access rights of everyone’s single CLIQ key at any time, even remotely, using the CLIQ Web Manager. It’s easy to issue contractors such as carpenters with access rights scheduled to end automatically as soon as their work is complete. Security for shopping and indoor leisure sites The electronics inside CLIQ locks are powered by the standard battery inside every key, not mains electricity According to one study completed two decades ago, one spends 87% of one’s time indoors. The number is probably higher now - and includes a huge chunk of one’s leisure time. Large retail multiplexes like Festival Place in the UK are a popular destination. Here over 170 shops, a cinema, sports centre and restaurants have an ever-changing roster of permanent staff, cleaners and out-of-hours contractors. Every person requires secure entry on demand. The public also needs open access for 18 hours every day. Yet a single lost mechanical key could become a security problem for all users and tenants. Installing 100 CLIQ electromechanical cylinders drastically cut the burden of mechanical key management. Now, cleaners and maintenance workers carry an intelligent key which unlocks specific doors for a pre-defined time period. Using simple online admin software, site managers can immediately de-authorise and reissue a lost key or amend any key’s permissions. Generating a comprehensive audit trail - who accessed which lock, and when - takes a couple of mouse clicks. CLIQ also cuts Festival Place operational costs. The electronics inside CLIQ locks are powered by the standard battery inside every key, not mains electricity. Installation was wireless, a huge saving on potentially expensive electrical work. At Festival Place and wherever one gathers to enjoy leisure - indoors or outside - CLIQ enables easy access control for all openings with just a simple, single, programmable key. To learn how you can put CLIQ® intelligent key technology to work in agile, flexible, secure public services, download a free introductory guide at https://campaigns.assaabloyopeningsolutions.eu/eCLIQ
Round table discussion
A new generation of security professional is waiting in the wings. They will be faced with unprecedented challenges, as they seek to transform the security marketplace to the ‘next level’. Technology changes ensure the market will be very different 10 years from now and the fresh labour pool will need to be able to meet the host of new challenges. We asked our Expert Panel Roundtable: What exciting career opportunities in the security industry await the next generation?
Assembling security solutions has long been considered the role of the integrator, whose role is to pick and choose the best technology tools and then to assemble the complete system. However, more manufacturers are offering pre-integrated end-to-end solutions that include multiple elements from the same manufacturer, designed to work seamlessly together. At the end of the day, end users want to know: Whose role is it to provide security ‘solutions’ – the manufacturer or the integrator? We asked our Expert Panel Roundtable.
Facial recognition is a mature technology that continues to change and evolve. New innovations such as artificial intelligence (AI) are expanding facial recognition capabilities, even as privacy concerns, though often misguided, undermine wider acceptance in the market. We asked this week’s Expert Panel Roundtable: What are the new developments in facial recognition?
Protecting dormitory residents and assetsDownload
Protecting Critical Infrastructure through facial recognitionDownload
12 questions to ask your access control providerDownload
Providing frictionless cloud Video Storage as a Service (VSaaS)Download