Industrial & commercial security applications
Located in Milpitas, California, Jang Su Jang restaurant offers high quality, authentic Korean cuisine offering an extensive menu to satisfy even the pickiest taste buds. Their main goal is to provide delicious meals served with great service in a clean, modern and upscale environment. Jang Su Jang prides themselves by only using the freshest produce for their side dishes and quality meats for their BBQ, providing an excellence to the Jang Su Jang brand. Highly committed to creating an ex...
Dahua Technology, manufacturer and supplier of video surveillance products provides its patented HDCVI solution to secure Lulu Hypermarket in Muscat, Oman. Lulu Hypermarket is a hypermarket chain and retail venture started by Lulu Group International in 2000. It has over 30,000 employees of various nationalities. Lulu Hypermarket is one of the largest retail chains in Asia and is the biggest in the Middle East, with 115 outlets in the Gulf Cooperation Council (GCC) countries and one in Kochi,...
Intrusion can be very invasive, damaging and expensive for any industrial or commercial business. The damage of machinery or the theft of goods can be potentially devastating. Not only that, but each commercial and industrial property can vary dramatically in terms of the level of security required, along with the conditions of the installation. Aisles, machinery and varying environmental conditions are all considerations, as is the required function of the security system and the ability to mo...
GRW is one of South Africa’s leading providers of sophisticated road transport trailers; designing, manufacturing and servicing a wide range of bespoke vehicles, each configured to provide a solution to the unique transportation needs of an individual client. GRW has now invested in a state-of-the-art IP CCTV system to protect its premises against unauthorised access and monitor the large, modern production facilities, and is already reaping the benefits from the integration of analytics w...
Exceeding traditional intercom, Android intercom solution generates unprecedented user experience by not only offering friendlier UI, easier understanding and superior operation, but also serving as a smarter platform for integrating various applications. The Akuvox all-Android intercom solution has built a comfortable and smart living environment beyond intercom for home owners in its recent residential project. The project involved 1,200 luxury apartments in Europe. Integration and mobility w...
VIVOTEK has extended its IP surveillance services by improving the efficiency of daily operations at soft drinks franchise Varun Beverages Ltd. Prior to this, Varun Beverages had experienced a number of different issues, despite being under analogue surveillance. These issues included everything from theft to the operational inefficiency of workers. By helping Varun Beverages to realise the shortcomings of analogue surveillance, VIVOTEK brought the plant on par with the evolving security landsc...
I have been thinking a lot about the U.S. government’s ban on video surveillance technologies by Hikvision and Dahua. In general, I question the wisdom and logic of the ban and am frankly puzzled as to how it came to be. Allow me to elaborate. Chinese camera manufacturers Reality check: the government ban is based on concerns about the potential misuse of cameras, not actual misuse. Before the government ban, you occasionally heard about some government entities deciding not to use cameras manufactured by Chinese companies, although the reasons were mostly “in an abundance of caution.” Even so, I find the targeting of two Chinese companies – three if you count Hytera Communications, a mobile radio manufacturer – in a huge government military spending bill to be a little puzzling. I can’t quite picture how these specific companies got on Congress’s radar. The government ban is based on concerns about the potential misuse of cameras, not actual misuse What level of lobbying or backroom dealing was involved in getting the ban introduced (by a Missouri congresswoman) into the House version of the bill? And after the ban was left out of the Senate version, was there a new wave of discussions to ensure it was included in the joint House-Senate version (with some minor changes, and who negotiated those?). It all seems a little random. Concerns for the U.S. Furthermore, the U.S. ban solves neither of the two main concerns that are generally used as its justification: Concern: Cybersecurity. The U.S. ban “solves” the issue of cybersecurity only if both of the following statements are true. No security system that uses a Hikvision or Dahua camera or other component is cybersecure. Any system that does not use a Hikvision or Dahua camera or other component is cybersecure. What level of lobbying or backroom dealing was involved in getting the ban introduced into the House version of the bill? The ban ignores the breadth and complexity of cybersecurity and instead offers up two companies as scapegoats. Our industry has sought to address cybersecurity, and the one principle that has guided that effort is that cybersecurity is an issue that must be addressed by manufacturers, consultants, integrators and end users – in effect, everyone in the industry. Cybersecurity does not begin and end with the manufacturer and banning any manufacturers from the market does not ensure better cybersecurity. Concern: “Untrustworthy” Chinese companies. Hikvision and Dahua are only two Chinese companies. Any response to concerns about whether Chinese companies are trustworthy would need to cover many more companies that manufacture their products in China. Australian TV recently claimed that “all Chinese companies pose a risk. Because of Chinese laws, there is a requirement for companies to be engaged in espionage on behalf of the state.” Even if one embraces that extreme view, the logic fails when only two companies are targeted. One source told me that 60 to 65 percent of the global supply of commercial video cameras are manufactured in China, so it’s a much bigger issue than two companies.The Chinese government has much more effective ways of conducting espionage than exploiting security cameras And is U.S. security at risk unless or until it is cut off from more than half of the world’s supply of video cameras? Even Western camera companies manufacture some of their cameras and/or components in China. Why name only two (or three) companies, only one of which has ties to the Chinese government? If the goal of the U.S. ban was to address the possibility of cybersecurity and/or espionage by the Chinese government, shouldn’t there be other companies and product categories included? Clearly, video surveillance is not the only category that has the potential for abuse. The Chinese government has much more effective ways of conducting espionage than exploiting security cameras. Global response to U.S. ban And now that the U.S. ban has been passed, how is the ban being misused to justify a new level of alarm about Chinese companies? Australian television effortlessly made the leap from “software backdoors” to a concerted and organised effort by the Chinese government to use cameras to be the “number one country for espionage.” And it’s not just about government facilities: “Even on the street, [cameras] have the potential to inadvertently contribute toward Chinese espionage activity by providing real-time information about the situation on the ground,” says the Australian TV report. If all Chinese companies pose a risk, why is the U.S. government targeting specific companies rather than all Chinese companies? If all Chinese companies pose a risk, why is the U.S. government targeting specific companies rather than all Chinese companies, or at least those with electronics or computer products that could be used for espionage? What about the espionage potential of the 70% of mobile phones that are made in China? What about other consumer electronics such as PCs or smart TVs? How many government facilities that are eliminating Dahua and Hikvision cameras have employees who use iPhones or use other electronic equipment from China? Artificial intelligence & IP-over-coax Also, consider the impact of the ban on business. Hikvision and Dahua have had many successes in the video surveillance market, including in the U.S. market. They have added value to many integrators and end user customers. They have been on the forefront of important trends such as artificial intelligence and IP-over-coax. And, yes, they have made technologies available at lower prices.Cybersecurity issues have plagued several companies in the industry, not just Hikvision and Dahua Cybersecurity issues have plagued several companies in the industry, not just these two, and both Hikvision and Dahua have worked to fix past problems, and to raise awareness of cybersecurity concerns in general. Is a U.S. ban on two companies an appropriate response to a series of geo-political concerns that are much bigger than those two companies (and bigger than our entire market)? Should two companies take the brunt of the anti-Chinese backlash? Video surveillance cameras Is the video surveillance market as a whole better or worse for the presence of Hikvision and Dahua? Is it up to the U.S. government to make that call? In some ways, thoughts of Chinese espionage are a sign of these uncertain political times. Fear of video surveillance is perfectly congruent with long-standing anxieties about “Big Brother;” suspicion about China taking over our video cameras just rings true at a time when Russia is (supposedly) controlling our elections. But should two companies be targeted while broader concerns are shrugged off?
Governments and corporations face crisis events every day. An active shooter terrorises a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective response plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyse. Assessing threats for prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualise all this intelligence data within the context of an organisation’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social media monitoring Free tools like Google Maps or satellite imagery from organisations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis.Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organisations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating a threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualised on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organisations or communities they are protecting Acting and automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organisations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon security guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralised within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis of a threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate emergency response Virtually every organisation has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyse. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimise the impact by improving visibility, collaboration and response.
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organisations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?
In 1973, a brilliant economist named E.F. Schumacher wrote a seminal book titled ‘Small Is Beautiful:’ taking an opposing stance to the emergence of globalisation and “bigger is better” industrialism. He described the advantages of smaller companies and smaller scales of production, highlighting the benefits of building our economies around the needs of communities, not corporations. In almost every industry or market that exists in the world today, you're likely to find a difference in size between companies. Whether it’s a global retail chain versus a small family-owned store, a corporate restaurant chain versus a mom-and-pop diner or a small bed and breakfast versus a large hotel chain — each side of the coin presents unique characteristics and advantages in a number of areas. Disparity in physical security industry Customers are drawn to products and services from large enterprises as the big names typically imply stability This disparity very clearly exists in the physical security industry, and differences in the sizes of product manufacturers and service providers could have important implications for the quality and type of the products and services offered. All too often, customers are drawn to products and services from large enterprises, as the big names typically imply stability, extensive product offerings and global reach. And that's not to say that these considerations are unwarranted; one could argue that larger companies have more resources for product development and likely possess the combined expertise and experience to provide a wide range of products and services. But the value that a company’s products and services can bring isn’t necessarily directly related to or dependent on its size. In an age where the common wisdom is to scale up to be more efficient and profitable, it’s interesting to pause and think about some of the possible advantages of small- and medium-sized businesses (SMBs). Typically, “small” companies are defined as those with less than 100 employees and “medium” with less than 500. Providing social mobility Schumacher argued that smaller companies are important engines of economic growth. Indeed, according to the Organisation for Economic Cooperation and Development (OECD), a group of 36 member countries that promotes policies for economic and social well-being, SMBs account for 60 to 70 percent of jobs in most OECD countries. Importantly, SMBs provide resilience in that there are often large economic and social impacts when big companies fail. Smaller companies are better for regional economies in general, as earnings stay more local compared to big businesses, which in turn generates additional economic activity. SMBs are also better at providing social mobility for disadvantaged groups by giving them opportunities and enabling them to realise their potential. Smaller companies are often more innovative, bringing to the market novel technologies and solutions such as Cloud, analytics, AI, and IoT New companies introduce new technologies There's no denying the role of start-ups when it comes to innovation. In the security industry, many new technologies (e.g. Cloud, analytics, AI, IoT) are first brought to the market by newer companies. In general, smaller companies’ products and services often have to be as good or better than others to be competitive in the marketplace. They are therefore often more innovative, bringing to the market novel technologies and solutions. And these companies are also more willing to try out other new B2B solutions, while larger companies tend to be more risk-averse. Customer service Aside from the quality of products and services, arguably one of the most important components of a security company’s success is its ability to interact with and provide customers the support that they deserve. Smaller companies are able to excel and stand out to their customers in a number of ways: Customer service. Customers’ perceptions of a product’s quality are influenced by the quality of support, and smaller manufacturers often possess a strong, motivated customer service team that can be relatively more responsive to customers of all sizes, not just the large ones. A superior level of support generally translates into high marks on customer satisfaction, since customers’ issues with products can be resolved promptly. Flexibility. SMBs have a greater capacity to detect and satisfy small market niches. While large companies generally create products and services for large markets, smaller companies deal more directly with their customers, enabling them to meet their needs and offer customised products and services. And this translates to adaptability, as SMBs become responsive to new market trends. By having a pulse on the market, smaller companies have much more flexibility in their supply chain and can adjust much faster in response to changing demand. Decision-making. Smaller companies are much more agile in decision-making, while larger enterprises often suffer from complex, tedious and lengthy decision-making processes. Communication is easier throughout SMBs, as smaller teams enable new ideas to flow and can solve problems faster. Job satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction Employees working for SMBs connect more directly with the company's goals and objectives, which in turn increases motivation and job satisfaction. SMBs are also generally more connected to local communities and participation in community activities leads to a greater sense of purpose. Additionally, SMBs have a much smaller impact on the environment, which is increasingly becoming an important consideration for today’s employees and customers. Though Schumacher's book takes a much deeper dive into the large global effects of scale on people and profitability, the general impact of a company’s size on its products and services is clear. It’s important for all players in the security industry to remember that the commitment and dedication to product quality can be found in businesses of all sizes. Ensuring safety of people, property and assets Large manufacturers may catch your eye, but small business shouldn’t be forgotten, as they can offer end users a robust set of attributes and benefits. While all security companies are aiming to achieve a common goal of providing safety for people, property and assets, smaller businesses can provide extensive value when it comes to driving the economy, innovating in the industry, providing quality employment and offering superior customer service.
Repercussions are rippling through the physical security industry since President Trump signed into law the ban on government uses of surveillance equipment by Chinese manufacturers Hikvision and Dahua. In addition to the direct and indirect consequences of the new law, there have also been other developments likely to impact the future of Chinese companies in the video surveillance market. The ban has raised awareness of Chinese companies’ role in video surveillance, and other developments are related to tariffs and possible sanctions, all playing out amid the backdrop of an escalating trade war. One Chinese manufacturer previously dismissed security concerns about its role in video surveillance as “Cold War rhetoric.” There has been an almost nostalgic tone recently to the escalating concerns about video cameras being used for spying. Hikvision and Dahua have both stated emphatically that they have not conducted any espionage-related activities. Even so, the U.S. government ban has emboldened the concerns. However, to be clear: No one has alleged that technologies from either of the companies have been used for espionage. Rather, the concerns are about the potential for misuse, not actual misuse. Also aggravating the situation are Chinese companies’ previous, actual problems with cybersecurity, which the companies say they have addressed. Here are some recent developments related to the U.S. government ban and Chinese manufacturers in general: Tariffs and trade concerns Additional rounds of U.S. tariffs have targeted an expanding array of Chinese goods, including data storage and processing components such as printed circuit boards, as well as video camera lenses. The escalating trade war has kept generalised concerns about China and its trade practices in the public eye and fomented a level of uncertainty in many markets, including physical security. Additional rounds of U.S. tariffs have targeted an expanding array of Chinese goods Involvement of surveillance in Chinese human rights violations Concerns have surfaced in a Congressional hearing recently about the Chinese government’s surveillance activities targeting the Uyghurs and other Muslim ethnic minorities in the Zinjiang Urghur Autonomous Region (XUAR). Specific attention is being directed at the region’s surveillance system including “thousands of surveillance cameras, including in mosques,” and Hikvision and Dahua were mentioned in the Congressional hearing as profiting from security spending in the area. Increased global media attention The ban has not been widely publicised in the U.S. mainstream media, but the topic has attracted global attention. For example, the Australian Broadcasting Corporation broadcast a 10-minute expose on the use of Chinese-made cameras in Australian government facilities, including “sensitive military facilities.” The report, which mentioned the U.S. ban, noted that “Both [Hikvision and Dahua] have had security flaws be exposed leading to fears that some of the flaws were placed there to help the Chinese government spy.” The report continues: “China is trying to set itself up as the number-one country for cyber-espionage, and this is part of that platform.” How broadly should one interpret the inclusion of "critical infrastructure" mentioned in the bill? Broader interpretation of the bill beyond the federal government The language in the bill leaves a level of ambiguity in terms of the scope of its application, and the security marketplace as a whole has been struggling to understand its full impact. Does the ban only restrict an integrator’s use of Chinese technology on a specific government job, or does it eliminate an integrator who installs the technology (even in non-government projects) from consideration for government jobs? How broadly should one interpret the inclusion of “critical infrastructure” mentioned in the bill, for example, non-governmental facilities? Will other governments and private entities assume they should ban Hikvision and Dahua in order to be compliant? For example, Suffolk, Virginia, has announced it will not to use Dahua or Hikvision cameras because the federal ban applies to “U.S. government-funded contracts and for critical infrastructure and national security usage.” The result of these developments is a kind of snowball effect, simultaneously drawing attention to the issues and adding new elements to an overall narrative. Taken together, these developments suggest the U.S. ban has set off a level of concern about Chinese companies that will have an industry-transforming impact in the months to come.
Newly modernised halls with lots of daylight will house hundreds of exhibitions and conference events at the upcoming Security Essen 2018 at Messe Essen, Germany. A new layout and hall numbering system will be unfamiliar to past attendees but promises to simplify the experience as it brings together attendees and exhibitors. European physical security market Security Essen is an international trade fair, but the emphasis is more on German, Austrian and Swiss companies. In all, Security Essen will feature 1,000 exhibitors from 40 nations. The trade fair has more of a continental European “flavour” compared to IFSEC, which focuses more on the U.K market. At the last Security Essen in 2016, organisers reported about 40,000 visitors including conference participants, VIP guests, members of various delegations and journalists. Security Essen 2018 has more of a continental European “flavour” compared to IFSEC, which focuses more on the U.K market “This year, we have sharpened the profile of Security Essen,” says Oliver P. Kuhrt, CEO of Messe Essen, a trade fair, congress and event organiser with its own exhibition grounds. “The trade fair has become considerably more digital, more modern and more interactive. Due to the optimised hall layout, we are offering our exhibitors and visitors the best possible experience with short paths and direct communication.” Newly modernised Messe Essen The newly modernised site of Security Essen will encompass eight halls, newly renumbered and with the subject areas reorganised, too. Visitors will find Services in Hall 1; Access, Mechanatronics, Mechanics and Systems in Halls 2 and 3 and the Galeria; Perimeter Protection in Hall 3; Video in Halls 5 and 7; and Fire, Intrusion and Systems in Halls 6 and 7. A helpful smart phone app, downloadable free from the Google Play Store (Android) or the Apple App Store (iOS), will be available two weeks before the event and include a show floor plan; the exhibitor list with booth numbers and contact information; and an overview of the supporting programme. A separate hall – Hall 8 – will house new Cyber Security and Economic Security categories. Cyber Security Conference At the new Cyber Security Conference, located prominently at the new East Entrance, experts will share their knowledge about the more pressing challenges and potential of cybersecurity. The programme opens and closes on 25 and 28 September with the main topic “Opportunities and Risks of Cyber Security”. On 26 September, discussions and lectures will centre on “Entry, Admission, Access: Identification Options”.A helpful smart phone app, downloadable free will be available two weeks before the event and include a show floor plan On 27 September, the topic will be smart homes and focus on “Connected Building, Security in the Buildings of the Future”. Speakers will include the president of Germany’s Federal Office for Information Security, who will address cybersecurity as a challenge for politics, business and society. The fair organises the conference in cooperation with the BHE Federal Association of Security Technology and the technical support of the Federal Office for Information Security. In Hall 8, a new Public Security Forum will enable visitors to experience digital security technologies for public spaces from the areas of sensors/IoT, cyber security and surveillance. The products and solutions will be installed in four different building scenarios (town hall, school, hospital and library) and it will be possible to test them extensively. The forum, including lectures and discussions, will target municipal decision makers and planners of public spaces. Comprehensive programme A Security Expert Forum in Hall 2 will present a continuous programme with more than 90 presentations during the period of the fair. Visitors will obtain information and solution ideas about all six subject areas covered at the fair, and the programme will begin with a keynote lecture each morning and finish with a live demonstration in the evening. On the first day of the fair (25 September), Security Essen’s Career Forum will introduce retrainees, students, trainees and graduates to companies from the security industry. Targeted and professional communication will be established between companies and job applicants to facilitate making contacts, developing networks, and filling actual vacancies. Thursday (27 September) will be observed as Fire Prevention Day, and a Drone Course will be provided each day in Hall 7. One day admission to Security Essen is €41; a four-day ticket is €105. Advance sale tickets are discounted.
BASF is one of the world’s leading chemical companies. Its portfolio ranges from chemicals, plastics, performance products and crop protection products to oil and gas. The company has been a committed partner to Greater China since 1885 and currently is one of the largest foreign investors in the Chinese chemical industry with major investments in Nanjing, Shanghai and Chongqing. Need for protection According to BASF’s Greater China Report published in 2012, local production enables more intensive collaboration with customers based in Greater China, and improves resource efficiency. BASF posted sales of over $6.8 billion in 2012 and employed 7,305 people. Protecting BASF’s chemical facilities demands high levels of security because of the nature of the operations and their potential for being the target of threats and/or criminal activities. To help safeguard people, property and assets, BASF’s security management has implemented a layered security approach that starts with perimeter protection. Fences and intrusion detection systems only provide limited protection, and false alerts create additional security issues. To provide more comprehensive and actionable coverage, BASF China needed real-time, visual monitoring of the perimeter on a 24/7 basis, without adding any additional lighting.To help safeguard people, property and assets, BASF’s security management has implemented a layered security approach Megapixel solution Working in collaboration with Tyco Fire and Security China, the BASF security team selected Arecont Vision’s 3-megapixel (MP) AV3135 colour cameras to meet their video security needs. The dual sensor AV3135 also has a 1.3MP true monochrome sensor that provides low-light performance. As the ambient light diminishes, the AV3135 switches to the monochrome sensor to deliver clear, high resolution surveillance images for identification and recording purposes. The Arecont Vision AV3135 megapixel cameras also provide an increased coverage area for better situational awareness compared to analogue or IP VGA cameras; and improved functionality including the ability to digitally zoom into live scenes and recorded video while maintaining high resolution. And because of the cameras’ superior day/night capability, no expenses were incurred to install additional lighting. No local power sources needed Another cost saving benefit of the Arecont Vision AV3135 megapixel cameras is that they are Powered over Ethernet (PoE) which eliminates the need to install local power sources. The AV3135 megapixel cameras are part of Arecont Vision’s H.264 MegaVideo® line of cameras that offer bandwidth and storage efficiency of 10x greater on average over traditional megapixel counterparts. The proven results laid to rest management’s concerns about storage space. BASF’s corporate security team was highly impressed with the quality and coverage of the Arecont Vision megapixel cameras when images were compared to analogue cameras. “Arecont Vision megapixel cameras provide the extremely clear images that are needed for security monitoring of the facility perimeter," said Raylene Xie, Global Account Manager, Tyco Fire and Security China. "Even BASF corporate was excited about the difference in quality between the megapixel and analogue images." The increased image quality of megapixel video played the largest role in providing superior perimeter security for the BASF facility. Expanded coverage areas and day/night capability of the Arecont Vision AV3135 cameras also contributed to a successful and effective new system.
The average German consumer generates nearly 213 kilos of packaging waste every year. ZAK–Zentrale Abfallwirtschaft Kaiserslautern—the municipal waste management company of Kaiserslautern, treats, recycles and disposes of this and other types of waste for the more than 250,000 residents of the city and district of Kaiserslautern, Germany. ZAK relies on MOBOTIX video systems to ensure that operations run smoothly and that the 88-hectare premises of the modern waste management facility remain safe. Modern waste treatment The landfill was closed in 1999 due to changes in the law. Since then, the waste from the city and district of Kaiserslautern has undergone mechanical biological treatment and been disposed of externally, or it has been thermally treated by an external company. For this reason, the waste collection and treatment facilities are therefore a priority, as well. All facilities are subjected to continuous improvement processes to remain state-of-the-art. The same applies to MOBOTIX camera solutions. “Initially we were using analogue video systems to keep an eye on the gate and facilities. Now there are 65 modern MOBOTIX video IP solutions ensuring smooth operations on the premises,” explains Michael Hentz, IT and telecommunications manager at ZAK. Camera for fire prevention and detection There are two M15D thermal cameras in use to monitor the temperature of the timber shelter in general and more specifically, the temperature of the fuel. The video systems can automatically detect events within a range from -40 to 550 °C (-40 to 1022 °F), thanks to a thermal sensor technology and thermal radiometry. For this reason, the technology is well suited to operate as an automatic alarm when paired with temperature thresholds or ranges.One of the thermal cameras has been suspended in the timber shelter where it monitors the entire area for high temperatures One of the thermal cameras has been suspended in the timber shelter where it monitors the entire area for high temperatures. A fire can break out quickly during the fermentation process. This way, materials with excessive temperatures being added to the facilities when brought by truck can be detected. The second video solution has been installed in a location where the material is transported by crane so it can be fed into the incineration process. Mr. Hentz explains: “We can know exactly how high the temperature is in the timber shelter and can take countermeasures, if necessary.” Video solution replaces rearview camera In addition to the thermal cameras, 90 % of the cameras that ZAK uses are M25 video systems, which are distributed over the premises, especially in areas where people are not present. The M25 camera is a compact, affordable and powerful all-round system that uses 6MP Moonlight technology. “These cameras are particularly excellent because they are robust, low-maintenance and weatherproof,” adds Mr. Hentz. “These features play a very critical role because dirt is omnipresent at the waste management facility. And of course, this dirt collects on the cameras, as well. But the MOBOTIX models continue to perform well. They’ve really proven themselves.” A thermal camera has been suspended in the timber shelter where it monitors the entire area for high temperatures Video systems have also been installed on buildings where there is little leeway. Drivers of the two trucks, which are constantly moving back and forth on the premises, use a tablet computer to view the images provided by these cameras. It gives the drivers a good vantage point of things when they are manoeuvring their vehicles, and it prevents accidents. “Rearview cameras are of little use, as they become dirty quickly,” concedes Mr. Hentz, “which is what gave us the idea to provide tablets to our drivers, so they can use the images generated by the cameras.” Two T25 IP Video Door Stations have been installed on the exterior and interior area near the main gate. They are used for door communication and access control. Additionally, they make it possible to use RFID and keypad solutions to time-control and log access to the premises as well as create photo-documentation. Employees work around the clock at the biomass power plant, which means that chances are, there will be someone on the premises who needs to leave after ZAK closes for the day. In this event, the person can ring a bell and an employee will then open the gate. Quality stands out Mr. Hentz is very pleased with the MOBOTIX solutions. “I’ve been working for a long time with these video systems. They are both exceptionally robust and maintenance-free. What’s more, it is also easy to manage the network cameras. They score points because data can be stored directly in the camera. "I am also convinced because over the years, you can tell that the features are continually being tweaked. Yet, all cameras work on the same basic principle, which is a tremendous advantage when it comes to using them. The range of possible applications is still very diverse, thanks to the high image quality and the option to use various lenses.”
The Enforcer 32WE APP is a professional high-security wireless solution, that delivers maximum security, flexibility, potential and opportunities for installers and users alike. Profitable business solution With remote programming and diagnosis of the system using InSite UDL software via the PyronixCloud, the Enforcer 32WE APP system can be checked and even amended without having to send an engineer to site. This means there are fewer call-outs for the installer, or, should an engineer still be required to go to site, any issue can be pinpointed before arriving, which means much greater efficiency. This makes the system a much more profitable solution for their business. The initial installation is also much more efficient and flexible utilising the PyronixCloud and two-way wireless technology. Setting up an account on the PyronixCloud avoids the difficulty of having to set up static IP, while the sheer volume of Pyronix two-way wireless peripherals with features like one-push-to-learn and signal strength indicators (SSI), alongside wired expanders, allow the installer to tailor any installation to perfectly protect any property. Superior real-time remote control Users can rest assured knowing that the Enforcer 32WE APP is a superior security solution that can meet their property needs, with simple and non-invasive fitting and expandability. Another key benefit for the user is the HomeControl+ App, which gives them complete real-time control of their system from anywhere in the world. So, the system not only protects the property but provides the user complete functionality, with remote arming and disarming, as well as control of any wired automation outputs. They can even check the status of every device on the system in real-time and much more.
Security and surveillance systems are becoming critical to manufacturing plants and factories by helping to address the theft of raw materials, the theft of IP, and the tampering of equipment, machinery and cargo. They can also serve as an effective monitoring tool for overseeing assembly line production and worker safety. A Micron/Repon case study Repon, a manufacturer of high-quality ball bearing slides used in various industries including server- and rack-mount systems, office/home furniture, white appliances, tool boxes and medical carts, recently deployed an advanced security and surveillance system—an edge storage solution—at their newly built manufacturing plant in the south of Taiwan. Their system architect, Apogear, integrated Micron’s industrial microSD cards into this solution. In the case of Repon’s deployment, 24x7 operational requirements needed to be met while minimising the risk of data lossIn this case study, we discuss why Repon implemented an edge storage solution and how they will benefit—from a total cost of ownership (TCO) perspective—with Micron’s industrial microSD cards. Why edge storage? The simple answer: to enhance overall system reliability. In the case of Repon’s deployment, 24x7 operational requirements needed to be met while minimising the risk of data loss. Edge storage—the recording of video and storing it at the camera—provides recording redundancy, helping to reduce the risk of data loss. By storing a second copy of recorded video in a microSD card, edge storage provides backup in case there are any issues with the primary network storage (including network reliability issues). In the event the primary network storage goes offline, video continues recording in the microSD card. The recorded video can then be synchronised to network video recorders (NVRs) or video management systems (VMS) after the primary system is restored. Selecting the right industrial microSD Card Historically, memory manufacturers sell the lowest quality NAND flash (media grade) memory to the memory card market. While this quality of NAND can be sufficient for storing pictures and video (where data is written to once and stored), using it in microSD cards for edge storage (where data can be written and rewritten to often) is not recommended. Figure 1: Edge Storage for Recording Redundancy Edge recording with memory specifically designed to support 24x7 recording over a long period of time requires a new understanding of how that memory is made— from silicon selection, to manufacturing flow, to product design, to qualification testing. Many microSD cards available in the market today are intended for consumer use in digital still cameras (DSCs), car dash cams, or home cameras; they are not designed for commercial and industrial edge storage in IP video surveillance cameras. As such, edge storage can often be viewed as ‘unreliable’ by system integrators and installers.Users may not understand that the lifetime and quality of a microSD card can vary significantly depending on the quality of the card Users may not understand that the lifetime and quality of a microSD card can vary significantly depending on the quality of the card. Selecting the wrong quality of microSD card can result in costly field failures, often occurring within months after deployment. The importance of selecting the right memory card in an edge storage solution is illustrated in Apogear’s analysis of Repon’s edge storage solution. The analysis also shows the cost savings Repon anticipates from using Micron’s Industrial microSD cards in their solution. Project cost analysis and assumptions Apogear’s total cost of ownership (TCO) analysis (below) is reflected in relative percentages, and not on actual dollars and cents given regional and vendor differences. To create an understanding of the project scale, the TCO was estimated at approximately $850,000 USD over a three-year contract term in regards to deploying a 600-camera system at Repon’s manufacturing facility using Micron Industrial microSD cards. Figure 2: Cost Distribution Data, as provided by Apogear Figure 2 provides the percentage of costs during the estimated lifecycle of the edge storage system. The cost per system phase amounts to: Equipment cost (68%) - the cost of an IP camera, networking equipment (switch, cables, etc.), accessories, NVR and central monitoring system (CMS), and storage (HDD and microSD card). Deployment cost (20%) - the cost of installation, configuration and integration. Design cost (2%) - the cost of consulting and system architecture design. Maintenance cost (8%) - the cost of planned, regular and additional maintenance services. Decommission cost (2%) – the cost of dismounting and recycling equipment at the end of its lifetime Why Micron’s industrial microSD card? Micron’s solution is backed with a 3-year product warranty under professional surveillance use casesThe importance of product reliability is often underestimated when considering the cost of maintenance and field service. When a retail-grade microSD card fails, the card must be replaced. Not only are there direct costs of sending a crew to service and replace the card, but there are also outage times that can result in significantly more costs. By implementing Micron’s industrial microSD card, which is designed for 24/7 video surveillance edge storage usage, it is estimated that Repon will see an approximate $141,000, or about 16%, improvement in TCO compared to using an off-the-shelf retail microSD card1. High reliability and quality, lower maintenance and replacement costs Micron’s industrial microSD card supports 3 years of high-quality continuous 24/7 video recording with a quality specification of 2 million hours mean time to failure (MTTF) and 0.44% annualized failure rate (AFR) —2X better than a typical HDD today. Additionally, Micron’s solution is backed with a 3-year product warranty under professional surveillance use cases, helping to keep maintenance and replacement costs to a minimum. Figure 3: Maintenance and Replacement Cost Comparison, as provided by Apogear Advanced features minimise risk of data loss Micron’s industrial microSD card contains firmware optimised to provide stable performance for 24x7 high quality video recording with minimal frame drops.Micron understands the unique needs of this market and has developed deep application-level expertise In addition, Micron’s industrial microSD card offers a health monitoring feature for IP camera integration that reports card usage and lifetime remaining. Systems can integrate this feature into their software to alert predictive maintenance service. Micron’s industrial microSD card comes with password protected lock/unlock features to keep the device secure. Conclusion The move to edge recording and high endurance storage is happening across the Industrial IoT landscape. Targeted solid state storage solutions are emerging, and with it, new entrants into the security and surveillance ecosystem. As a leader in automotive and industrial memory solutions, Micron’s new product line of industrial microSD cards are built to meet the requirements of this industry. As a trusted advisor to its embedded customers for more than 25 years, Micron understands the unique needs of this market and has developed deep application-level expertise and a portfolio designed with that in mind. Most importantly, it brings to the market a mindset to deliver sustainable value to its customers.
At one of Spain’s newest co-working spaces, the founders’ vision incorporated using the latest in security, accessibility and design to create a 21st-century business centre. Flexible and wire-free, SMARTair™ from TESA delivers real-time access control that can accommodate both regular daily traffic and busy one-off events at ULab’s dedicated events area. SMARTair Wireless Online management SMARTair™ Wireless Online management now enables access to the building and individual offices to be controlled in real time. ULab’s SMARTair™ system securely manages regular daily traffic of approximately 100 people, and has the flexibility to accommodate many more temporary visitors when their event space is full. “In addition to regular daily traffic, weekly traffic can almost multiply by 10 if an event is held,” says Enrique Burgos. “We needed an access control system as flexible and convenient as SMARTair™.” Also — and critically for ULab — SMARTair™ escutcheons and wall readers complement the ultra-modern design aesthetic of this new workspace. With SMARTair™ Wireless Online, ULab’s facility manager can monitor the building’s security status from a single control point and in real time, controlling who enters and when. The installation permits remote opening of any door at ULab, enabling easy access in cases where users have lost or forgotten their credential. Remote access can be granted from the SMARTair™ Web Manager software, which works on any device inside a standard browser without software installation, or from the SMARTair™ admin app for Apple and Android mobile devices. Individual access rights for user profiles It’s also easy to schedule individual access rights for different user profiles — allowing, for example, site managers to access all doors, but offering occasional users more limited entry to common areas. Changes in status can be made instantly from the Web Manager. And because SMARTair™ locks are operated with RFID smartcards, there’s no security problem if an employee loses their credential. With the SMARTair™ admin software, a simple click cancels the credential’s access rights — a much quicker and cheaper process than replacing a mechanical lock. With contemporary, low-profile design, user-friendly operation and flexible, real-time security functionality, SMARTair™ wireless access control has captured the spirit of ULab. About ULab ULab is a new co-working space in Alicante’s financial district. It has 56 co-working stations, 12 offices and an area reserved for events. For more information, see www.ulab.es. For more information visit www.tesa.es/discoverwireless
The Dahl Auto Plaza in Winona, Minnesota is part of an auto dynasty that first began in 1911, when Andrew H. Dahl began selling Ford Model T’s out of his general store in Westby, Wisconsin. The company is in its fifth generation of Dahl family ownership with over a century of growth behind it. Today Dahl operates three dealership campuses throughout the Midwestern United States that are home to Subaru, Hyundai, Mazda, Toyota, Chevrolet, Buick, GMC, Ford, and Lincoln automobile franchises. During construction of the new Dahl Auto Plaza in Winona, the installation of a video surveillance system was a required part of the planning. Arecont Vision became the go-to manufacturer for all the dealership’s surveillance cameras. Video surveillance system challenge Winona’s Dahl is home to three different dealerships on a single campus — Chevy, Toyota, and the Dahl Used Car Express Service Centre. The company needed a comprehensive video surveillance system to monitor its parking lots and service bays for traffic, customer flow, vehicle flow, vandalism, and theft. With a desired 15-16 camera limit to cover such a large amount of space, cameras with high image quality and flexibility were essential to the new surveillance system’s success. No other camera manufacturer could compete with the price and performance of the Arecont Vision Omni series Arecont Vision Try-and-Buy programme The implementation of Arecont Vision megapixel cameras at Dahl Winona began with the use of Arecont Vision’s Try-and-Buy programme at the recommendation of Russ Neitzke, President and Founder of systems integrator Digicom, Inc. Cameras selected for a Try-and-Buy trial can be returned by the systems integrator for a full refund of the purchase price if the customer is unsatisfied. SurroundVideo Omni unique design The only cameras considered for the Dahl video surveillance system were Arecont Vision SurroundVideo Omni models after they were tested. “No other camera manufacturer could compete with the price and performance of the Arecont Vision Omni series,” Mr. Neitzke said. “As a result, no other surveillance camera manufacturers were recommended by Digicom, Inc. or would be able to so effectively cover the 15 acres of new and used vehicle display, public access, and vehicle service areas at the new Dahl Auto Plaza.” The SurroundVideo Omni series features a unique, patented 360o track design. Each camera includes four individual megapixel (MP) sensors mounted in multi-axis gimbals that can be independently placed and aimed in nearly any configuration, allowing coverage to be highly customised to specific project requirements. With features like remote focus in the SurroundVideo Omni G2, interchangeable lenses and high-resolution capabilities (12 and 20MP) in both G1 and G2 series models, the versatility of this camera family is unmatched. For large open spaces such as those found at the new Dahl campus, the SurroundVideo Omni series provides high resolution, omni-directional video in a rugged, low profile enclosure suitable for both indoor and outdoor use. The cameras are IK-10 impact resistant and IP66 environmental rated against dust and water, making them ideal for Dahl’s requirements. Reduced need for multiple cameras Most critical for Dahl were the SurroundVideo Omni series benefits of low maintenance, high video resolution, and the ability to reduce the number of cameras required for full situational awareness throughout the campus. The SurroundVideo Omni 12MP models selected include Wide Dynamic Range (WDR) technology, which aids in producing high quality, clear images even in challenging light situations. The SurroundVideo Omni reduces the need for multiple cameras to cover open spaces, saving the customer money The SurroundVideo Omni reduces the need for multiple cameras to cover open spaces, saving the customer money on both camera cost and installation requirements. Without the need for the constantly moving parts of a legacy Pan-Tilt-Zoom (PTZ) camera, there are no parts, gears, belts, or motors to wear out and to require maintenance in the SurroundVideo Omni series. This reduces ongoing operational costs. With Digicom Inc. designing the surveillance and installation plans, Dahl was in good hands. Dahl selected the SurroundVideo Omni series, reaping the significant benefit of reduced installation time. Each sensor gimbal in a SurroundVideo Omni is magnetically set in place around the 70+ placement-point omnidirectional track and then quickly locked down during installation. This makes it easy for the installer to arrange an ideal coverage layout. Another significant selling point for Dahl was that each SurroundVideo Omni camera requires only a single IP category 5 PoE (Power over Ethernet) cable, which reduces both complexity and installation cost. ExacqVision VMS Dahl can monitor the surveillance system locally, corporate-wide, and on various smartphones and tablets. Arecont Vision Technology Partner Program member ExacqVision is utilised for the video management system (VMS). A single ExacqVision VMS licence is required for each SurroundVideo Omni camera, while providing four high-definition video views. Arecont Vision cameras are certified with ExacqVision and the VMS is installed in the Arecont Vision MegaLab™ to enable ongoing collaboration between the two companies and to ensure the best possible integration and support for customers. Dahl can monitor the surveillance system locally, corporate-wide, and on various smartphones and tablets Arecont success at Dahl The Arecont Vision SurroundVideo Omni cameras at Dahl have been a great success, with high customer satisfaction. “Basically,” Mr. Neitzke stated, “The coverage that you get with the SurroundVideo Omni is really like buying four cameras in one.” Being able to effectively cover Dahl’s range of campus requirements with fewer cameras and lower purchase, installation, and operational costs meant that Arecont Vision has hit all the required marks for this project, according to Mr. Neitzke. The system has performed incredibly well, with few issues from the end-user. On the rare occasion when an issue has popped up, the Arecont Vision team has been responsive to the customer’s needs, providing technical support, advanced replacements, or any other kind of assistance Dahl has needed for the surveillance system. Future projects Arecont Vision and Dahl are now planning a second, even larger project at Dahl’s campus in downtown La Crosse, Wisconsin. Dahl plans on upgrading this campus with a new surveillance system for indoor and outdoor spaces with Arecont Vision cameras. Digicom, Inc. and the Arecont Vision Field Application Engineering groups are developing a campus-wide plan for this next project. SurroundVideo Omni will be ready to be deployed yet again whenever Dahl needs it.