Industrial & commercial security applications
Located in Milpitas, California, Jang Su Jang restaurant offers high quality, authentic Korean cuisine offering an extensive menu to satisfy even the pickiest taste buds. Their main goal is to provide delicious meals served with great service in a clean, modern and upscale environment. Jang Su Jang prides themselves by only using the freshest produce for their side dishes and quality meats for their BBQ, providing an excellence to the Jang Su Jang brand. Highly committed to creating an ex...
Dahua Technology, manufacturer and supplier of video surveillance products provides its patented HDCVI solution to secure Lulu Hypermarket in Muscat, Oman. Lulu Hypermarket is a hypermarket chain and retail venture started by Lulu Group International in 2000. It has over 30,000 employees of various nationalities. Lulu Hypermarket is one of the largest retail chains in Asia and is the biggest in the Middle East, with 115 outlets in the Gulf Cooperation Council (GCC) countries and one in Kochi,...
Intrusion can be very invasive, damaging and expensive for any industrial or commercial business. The damage of machinery or the theft of goods can be potentially devastating. Not only that, but each commercial and industrial property can vary dramatically in terms of the level of security required, along with the conditions of the installation. Aisles, machinery and varying environmental conditions are all considerations, as is the required function of the security system and the ability to mo...
GRW is one of South Africa’s leading providers of sophisticated road transport trailers; designing, manufacturing and servicing a wide range of bespoke vehicles, each configured to provide a solution to the unique transportation needs of an individual client. GRW has now invested in a state-of-the-art IP CCTV system to protect its premises against unauthorised access and monitor the large, modern production facilities, and is already reaping the benefits from the integration of analytics w...
Exceeding traditional intercom, Android intercom solution generates unprecedented user experience by not only offering friendlier UI, easier understanding and superior operation, but also serving as a smarter platform for integrating various applications. The Akuvox all-Android intercom solution has built a comfortable and smart living environment beyond intercom for home owners in its recent residential project. The project involved 1,200 luxury apartments in Europe. Integration and mobility w...
VIVOTEK has extended its IP surveillance services by improving the efficiency of daily operations at soft drinks franchise Varun Beverages Ltd. Prior to this, Varun Beverages had experienced a number of different issues, despite being under analogue surveillance. These issues included everything from theft to the operational inefficiency of workers. By helping Varun Beverages to realise the shortcomings of analogue surveillance, VIVOTEK brought the plant on par with the evolving security landsc...
Physical security technologies operate successfully in many different markets, but in which markets do they fall short? Physical security is a difficult challenge that can sometime defy the best efforts of manufacturers, integrators and end users. This is especially the case in some of the more problematic markets and applications where even the best technology has to offer may not be good enough, or could it be that the best technology has not been adequately applied? We asked this week’s Expert Panel Roundtable to reflect on instances when the industry may fall short: Which segments of the physical security industry are most under-served and why?
There’s only so much a corporation can do to counteract the threat of a major incident. You can ask everyone to be vigilant and to report anything suspicious, but you cannot stop someone intent on deliberately starting a fire, threatening a work colleague with a knife or something much worse. And of course, most businesses recognise that even routine events – such as burst pipes, IT system failures, extreme weather event or power outages – can have significant consequences unless they are quickly brought under control. Training security officers Governments and organisations across the world are increasingly encouraging businesses to re-assess risks and to plan for and conduct drills for major emergencies. This is driving different agencies and companies to invest in new skills, resources and systems, and encouraging businesses to routinely re-evaluate their emergency response strategies. UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents For example: UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents, as part of the UK government’s Action Counter Terrorism programme. And organisations including the Association of University Chief Security Officers (AUCSO) and Higher Education Business Continuity Network (HEBCoN) are developing customised training for their members to improve their own response and business continuity plans. Mass notifications systems Whether an organisation is facing a terrorist attack or a severe weather event, follow up reports consistently identify that the same types of challenges are common to all crisis situations, with similar errors often occurring again and again. Typically, these are centred on three key areas: poor communications, fractured command and control structures, and delayed deployment of resources. Communications skills and technologies clearly play a pivotal role in how effective an organisation is in responding to major incidents, particularly when it comes to assessing the situation and its implications, moving people towards safety and providing updates as an incident unfolds. However, when an organisation is considering its technology options, emergency response and mass notification systems (MNS) are often touted as the ideal platform to deliver all the required critical communications and ongoing updates. UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents Emergency notification system All the incident reporting, command and control, and communications functions have been brought together on a single platform But, if an organisation does not know exactly where all its staff or students are, and it cannot see the location and availability of its first responders and other emergency coordinators relative to them and the incident, then how useful is it to send a top-down alert to everyone? And what about fast moving or multi-centre incidents, where previously agreed evacuation procedures, recommended actions or mustering points may need to change if an incident takes an unexpected turn? Many organisations may have been lulled into believing that an emergency notification system will allow them to confidently handle all the communications aspects of virtually any crisis. In reality, too many businesses are still unaware that there are now much more sophisticated and proven technologies where all the incident reporting, command and control, and communications functions have been brought together on a single platform. Using live map tracking The benefit of using these advanced and more integrated approaches – often categorised as mobile distributed command and control systems – is that they enable faster and better decision making in a crisis using real-time feedback and two-way dialogue with those closest to the emergency. And they avoid the risks of any potential delays, miscommunications or mistakes that can happen when an organisation is under pressure to respond and often switching between multiple systems. Leading universities and multi-national corporations are already using new mobile/web-enabled platforms to improve their incident response These next generation emergency management platforms have been specifically designed to enable real-time mapping of an organisation’s security assets and its users on a single screen and to fully integrate it with a highly targeted geo-fenced notification capability. The mass notification aspect of the system can then be used to advise specific groups on the best actions to take at their location as an incident develops. The use of live map tracking enables real time mapping of an organisation's security assets Segmented messaging Many leading universities and multi-national corporations are already using these new mobile/web-enabled platforms to plan, manage and improve their incident response, leading to 50% faster reactions and more positive outcomes.During a crisis, users can receive push notifications so the security centre can immediately see their exact location and advise them accordingly The systems have been widely adopted within the higher-education sector, but they are equally applicable to any large company with multiple international sites or those situated in research or corporate campuses where the bulk of assets and people are based in one or more key locations. Typically, systems provide users with a smartphone app that they can use to call for immediate emergency or first aid support when at work, or to report something suspicious which could prevent an apparently minor incident from escalating into a full-scale emergency. During a crisis, users can receive push notifications, SMS and E-mails asking them to open the app if they are not already logged in, so the security centre can immediately see their exact location and advise them accordingly. Supporting dispersed mustering Now that communications can be more nimble, responsive and flexible this can support this the supports the increasing numbers of planners are recognising the advantages of dispersed mustering. This is a strategy that has been developed to reduce the risk of secondary attacks on unprotected people complying with instructions to evacuate from premises and gather in what are, effectively, exposed locations. It is now acknowledged that evacuees waiting outside for any length of time are more vulnerable to targeted attacks or to injury, from flying glass for example. With dispersed mustering – a strategy made more effective by these new mobile distributed command and control systems - a building’s occupants can be advised not to go outside, but to move to known safe internal locations. People in each specific area can then be kept regularly updated. Many corporations are now using new mobile/web-enabled platforms to improve their incident response Coordination between response agencies The software platforms can be integrated with an organisation’s fixed security infrastructure to take real-time sharing of information First responders are permanently logged in, so the emergency operations centre can see their exact locations in real-time and can advise what actions to take in mustering people or in setting up and protecting security cordons. Bringing everything together on one platform, with real-time feedback and in a fully integrated system also removes what is often seen as the weakest communication link in managing any major incident: the need to rely on conventional two-way radio as the sole means of communication between the command and control centre and its first responders and other team members on the ground. The software platforms can be integrated with an organisation’s fixed security infrastructure to take real-time sharing of information to a new level for improved collaboration, coordination and communications between users, the incident management team and external agencies. Improving emergency response strategies One of the most powerful features of some of these new systems is the ability to record and view all alerts, responses and the detailed conversations between first responders, emergency coordinators and other parties. This allows the systems to be used to simulate major incidents involving inputs from the emergency services and other key agencies and to ensure the organisation’s crisis management plans have been fully tested against a range of possible incident scenarios.
From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A brief history of 3D technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to augment Google Maps and Google Earth; documenting some of the most remote places on earth using a mix of sensors (Lidar/GSP/Radar/Imagery). The mission to map the world moved indoors May 2011 with Google Business Photos mapping indoor spaces with low cost 360° cameras under the Trusted Photographer program. In the earlier days, 3D scanning required a high level of specialisation, expensive hardware and unavailable computing power With the growth of 3D laser scanning from 2007 onwards, the professional world embraced scanning as effective method to create digitised building information modelling (BIM), growing fast since 2007. BIM from scanning brought tremendous control, time and cost savings through the design and construction process, where As-Built documentation offered an incredible way to manage large existing facilities while reducing costly site visits. In the earlier days, 3D scanning required a high level of specialisation, expensive hardware, unavailable computing power and knowledge of architectural software. Innovation during the past 8 year, have driven ease of use and lower pricing to encourage market adoption. Major investments in UAVs in 2014 and the commercial emergence of 360° photography began a new wave of adoption. While 3D scanners still range from $20K – $100K USD, UAVs can be purchased for under $1K USD and 360° cameras for as low as $100. UAVs and 360° cameras also offer a way to document large spaces in a fraction of the time of terrestrial laser scanners with very little technical knowledge. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors The result over the past 10+ years of technology advancement has been a faster, lower cost, more accessible way to create virtual spaces. However, the technology advances carry a major risk of misuse by bad actors at the same time. What was once reserved to military personal is now available publicly. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors. Al Qaeda terror threats using Google Maps, 2007 UK troops hit by terrorists in Basra, 2008 Mumbai India attacks, 2016 Pakistan Pathankot airbase attacks, ISIS attacks in Syria using UAVs, well-planned US school shootings and high casualty attacks show evidence that bad actors frequently leverage these mapping technologies to plan their attacks. The weaponization of UAVs is of particular concern to the Department of Homeland Security: "We continue to face one of the most challenging threat environments since 9/11, as foreign terrorist organisations exploit the internet to inspire, enable or direct individuals already here in the homeland to commit terrorist acts." Example comparison of reality capture on the left of BIM on the right. A $250 USD 360° camera was used for the capture in VisualPlan.net software What does this mean for the security or facility manager today? An often overlooked, but critical vulnerability to security and facility managers is relying on inaccurate drawing. Most facilities managers today work with outdated 2D plan diagrams or old blueprints which are difficult to update and share.Critical vulnerability to security and facility managers is relying on inaccurate drawing Renovations, design changes and office layout changes leave facility managers with the wrong information, and even worse is that the wrong information is shared with outside consultants who plan major projects around outdated or wrong plans. This leads to costly mistakes and increased timelines on facility projects. Example benefits of BIM There could be evidence of a suspect water value leak which using BIM could be located and then identified in the model without physical inspection; listing a part number, model, size and manufacture. Identification of vulnerabilities can dramatically help during a building emergency. First Responders rely on facilities managers to keep them updated on building plans and they must have immediate access to important building information in the event of a critical incident. Exits and entrances, suppression equipment, access control, ventilation systems, gas and explosives, hazmat, water systems, survival equipment and many other details must be at their fingertips. In an emergency situation this can be a matter of life or death. Example benefit of reality capture First Responders rely on facilities managers to keep them updated on building plans A simple 360° walk-through can help first responders with incident preparedness if shared by the facility manager. Police, fire and EMS can visually walk the building, locating all critical features they will need knowledge of in an emergency without ever visiting the building. You don’t require construction accuracy for this type of visual sharing. This is a solution and service we offer as a company today. Reality capture is rapidly becoming the benchmark for facility documentation and the basis from which a security plan can be built. Given the appropriate software, plans can be easily updated and shared. They can be used for design and implementation of equipment, training of personnel and virtual audits of systems or security assessments by outside professionals. Our brains process visual information thousands of times faster than text. Not only that, we are much more likely to remember it once we do see it. Reality capture can help reduce the need for physical inspections, walk-throughs and vendor site-visits but more importantly, it provides a way to visually communicate far more effectively and accurately than before. But be careful with this information. You must prevent critical information falling into the hands of bad actors. You must watch out for bad actors attempting to use reality capture as a threat, especially photo/video/drones or digital information and plans that are posted publicly. Have a security protocol to prevent and confront individuals taking photos or video on property or flying suspect drones near your facility and report to the authorities. Require authorisation before capturing building information and understand what the information will be used for and by who.There are a number of technologies to combat nefarious use of UAVs today Nefarious use of UAVs There are a number of technologies to combat nefarious use of UAVs today, such as radio frequency blockers and jammers, drone guns to down UAVs, detection or monitoring systems. Other biometrics technologies like facial recognition are being employed to counter the risk from UAVs by targeting the potential operators. UAVs are being used to spy and monitor for corporate espionage and stealing intellectual property. They are also used for monitoring security patrols for the purpose of burglary. UAVs have been used for transport and delivery of dangerous goods, delivering weapons and contraband and have the ability to be weaponised to carry a payload.Investigating reality capture to help with accurate planning and visualisation of facilities is well worth the time The Federal Aviation Administration has prevented UAV flights over large event stadiums, prisons and coast guard bases based on the risks they could potentially pose, but waivers do exist. Be aware that it is illegal today to use most of these technologies and downing a UAV, if you are not Department of Justice or Homeland Security, could carry hefty penalties. Facility managers must have a way to survey and monitor their buildings for threats and report suspicious UAV behaviours immediately to authorities. At the same time, it’s critical to identify various potential risks to your wider team to ensure awareness and reporting is handled effectively. Having a procedure on how identify and report is important. Investigating reality capture to help with accurate planning and visualisation of facilities is well worth the time. It can help better secure your facilities while increasing efficiencies of building operations. Reality capture can also help collaboration with first responders and outside professionals without ever having to step a foot in the door. But secure your data and have a plan for bad actors who will try to use the same technologies for nefarious goals.
They say that every choice has a cost. It's a basic principle that, economically speaking, nothing is free. If it doesn't cost actual money, it may be expensive in terms of time, attention and/or effort. These are interesting observations to keep in mind as one peruses the various "free" video management system (VMS) offerings available on the market. Some are provided by camera companies to unify their products into a "system", even if it's a small one. Other free VMS offerings are entry-level versions offered by software companies with the intent of the customer upgrading later to a paid version. For more insights, we asked this week's Expert Panel Roundtable: What is the value of “free” video management systems (VMSs) and how can a customer decide whether “free” is the right price for them?
Market dynamics are changing the U.S. residential security market, creating new business models that better appeal to the approximately 70% of households without a security system. Smart home adjacencies have helped revitalise the traditional security industry, and alternative approaches to systems and monitoring for the security industry are emerging, including a new batch of DIY systems. Growth in the residential security market and its position as the channel for smart home solutions have attracted numerous new entrants. Telecoms, cable operators, and CE (consumer electronics) manufacturers are joining traditional security players as they compete to fulfill consumer demand for safety and security. Connected products also provide a layer of competition as consumers must decide whether having category devices such as doorbell video cameras, networked cameras, and other products suffice for their security. Increasingly competitive landscape Smart home services can provide additional revenue streams for the security industry For instance, IP cameras are a highly popular smart home device rooted in security, and Parks Associates estimates 7.7 million standalone and all-in-one networked/IP cameras will be sold in the U.S. in 2018, with $889M in revenues. Product owners may feel their security needs are fulfilled with this single purchase, as such dealers and service providers are under increasing pressure to communicate their value proposition to consumers. Categorically, each type of player is facing competition uniquely—national, regional, and local dealers all have a different strategy for overcoming the increasingly competitive landscape. Smart home services can provide additional revenue streams for the security industry. In Parks Associates’ 2017 survey of U.S. security dealers, 58% report that smart home service capabilities enable extra monthly revenue. Almost half of dealers also note they have to offer smart home devices and services in order to keep up with their competition. While white-label devices are acceptable in some instances, dealers need to integrate with hero products whenever possible when those exist for a category. For dealers who have added smart home devices and services are all potential benefits and good for business Improved customer engagement That 2017 survey also revealed 36% of security dealers that offer interactive services report security system sales with a networked camera and 16% report sales with a smart thermostat. For dealers who have added smart home devices and services, enhanced system utility, increased daily value, and improved customer engagement with the system are all potential benefits and good for business. Security has served as the most productive channel for smart home solutions, mainly because the products create natural extensions of a security system’s functions and benefits, but as smart home devices, subsystems, and controllers expand their functionality, availability, and DIY capabilities, many standalone devices constitute competition to classical security. Particularly viable substitute devices include IP cameras, smart door locks, smart garage doors, or a combination of these devices. Products that are self-installed offer both convenience and cost savings, and these drivers are significant among DIY consumers—among the 6% of broadband households that installed a security system themselves, 39% did it to save money. Enhance traditional security Self-installable smart home devices may resonate with a segment of the market who want security While many security dealers believe substitute offerings are a threat, some dealers do not find such devices an existential threat but instead view them as another path to consumer awareness. They argue that the difference between smart product substitutes and traditional security is that of a solution that provides knowledge versus a system that gives one the ability to act on that knowledge. A common theme among professional monitoring providers is that a homeowner who is aware of events happening in the home does not necessarily have a secure and protected household. For example, a Nest camera, a DIY product, notifies a consumer via smartphone about events in the home when it detects motion, but only when the notification is opened and identified will a consumer be able to act on the related event. Self-installable smart home devices may resonate with a segment of the market who want security but are unwilling to adopt professional monitoring; however, providers can leverage these devices to enhance traditional security features and communicate the value of professional monitoring. Smart home devices and features, while posing a threat to some security companies, are a potential way forward to increased market growth Increased market growth A key counterstrategy for security dealers and companies is to leverage their current, powerful role as the prime channel for smart home devices. Many security dealers now include smart home devices with their security systems to complement their offerings and increase system engagement. For example, as of Q4 2017, nearly 70% of U.S. broadband households that were very likely to purchase a security system in the next 12 months reported that they want a camera to be included as part of their security system purchase. In response, many security system providers now offer IP cameras as optional enhancements for their systems. Smart home devices and features, while posing a threat to some security companies, are a potential way forward to increased market growth. Security dealers have an opportunity to become more than a security provider but a smart home solutions provider rooted in safety. Provide status updates Comcast has entered both the professionally monitored security market and the market for smart home services The alternative is to position as a provider of basic security with low price as the key differentiator. Comcast has entered both the professionally monitored security market and the market for smart home services independent of security. It has discovered that monetising smart home value propositions through recurring revenue becomes increasingly challenging as the value extends further away from life safety. Since the security industry remains the main channel for smart home services, security dealers are in a unique position to leverage that strength. Value propositions must shift from the traditional arming and disarming of a system to peace-of-mind experiences that builds off the benefits of smart devices in the home to provide status updates (e.g., if the kids arrived home safely) and monitoring at will (e.g., checking home status at any time to see a pet or monitor a package delivery). These types of clear value propositions and compelling use cases, which resonate with consumer and motivate them to expand beyond standalone products, will help expand the home security market.
Last week, the Schedule 84 Suppliers Research Panel participated in reviewing the 2018 contracting year with the GSA Schedule 84 leadership team. Our panel group consists of experienced contractors and consultants meeting for a monthly conference call. Schedule 84 is the GSA Schedules Contract for Total Solutions for Law Enforcement, Security, Facilities Management, Fire and Rescue. Our opinions are part of a research programme to provide valuable feedback to the GSA Schedule 84 programme and on to the GSA central office. The director of GSA Region 7 Schedules Program, the Schedule 84 Branch Chief and the Category Manager Subject Matter Expert who manages our suppliers' panel gave us their full attention as we discussed the successes of the programme, hot topics, problems and the future. We determined 2018 under the Schedule 84 team to be a year of innovative thoughts, cooperative effort and renewed enthusiasm Innovative review team We determined 2018 under the Schedule 84 team to be a year of innovative thoughts, cooperative effort, renewed enthusiasm and productive changes building upon the successes of 2017. There was high praise for the accessibility to the Schedule 84 staff. Their consistent quick response to questions and concerns, thinking outside the box and supporting the programme by partnering with their contractors was much appreciated. There has been a renewed spirit of partnering to cooperatively bring the best to agency customers. It seems to be working as per the Centre Director sales are growing for GSA Schedule 84. Advocating for the security industry In my experience, business development starts with the Administrator from Region 7 in Ft. Worth, TX. As the annual Schedule 84 Industry Day at the SSAC begins he is shaking every hand and passing out his cards looking folks right in the eye asking, “how can I help you?” They have the best practices and most organised paperwork. The SSAC director has chosen well in her staff and is hands-on in every endeavour to direct things along when challenges occur or to improve the programme. The new 84 Branch Chief is knowledgeable, innovative, tireless and has been heavily involved in advocating for the security industry It continues with the centre’s CASE Manager encouraging the contractors at events, visiting agency customers and promoting the GSA Schedules Program by helping coordinate the partnering. The new 84 Branch Chief is knowledgeable, innovative, tireless and has been heavily involved in advocating for the security industry for adding new technology, meeting with industry associations, understanding the complexity and challenges of Homeland Security Presidential Directive 12 (HSPD12) and advocating for the purchasing Physical Access Control Systems (PACS) utilising the appropriate standards and the GSA Program among other innovations. As far as the supplier panel, we gave our GSA Schedule 84 team and leaders high praise for 2018. GSA also added new categories or SINs for clearly identifying Physical Access Control Products that appear on GSA’s Approved Product List Changes in the GSA programme Some changes this year in certain GSA programmes included the creation of a new category of products/services Special Item Number (SIN) for Order Level Materials (OLM) developed to assist with solution procurements. This new SIN was added to Schedules 03FAC, 56, 70, 71, 00Corp, 738X and 84. Under Schedule 84 it is SIN 84-500. GSA Schedule 84 consolidated many Special Items Numbers (SINs) to make finding products and services less complex Essentially this SIN allows agencies procuring under the aforementioned GSA Schedules’ programmes to purchase and the contractor to add items and services not known prior to the task as a Contract Line Item Number (CLIN) not to exceed 33% of the order. For more information and FAQs on OLMs go to www.gsa.gov/olm. This is not to take the place of “Open Market” items for adding products only that are not listed on a company’s GSA Contract. Physical access control products Previously, GSA Schedule 84 consolidated many Special Items Numbers (SINs) to make finding products and services less complex for the agencies. GSA also added new categories or SINs for clearly identifying Physical Access Control Products that appear on GSA’s Approved Product List according to the standards created under FIPS201. These products appear under SIN 246 35-7 after being tested and approved by GSA. To be qualified to install these products under the GSA Program at least one individual from the GSA Contractor company must complete the class and be CSEIP certified before applying for labour SIN 246 60-5. Additionally, the company must demonstrate certain qualifications and have past performance for this type of work. The Security Technology Alliance offers the training class and certification. Certified individuals and approved products are listed at www.idmanagement.gov. Companies listed with SIN 246-35 7 and SIN 246-60 5 may be found by searching at www.gsaelibrary.gsa.gov. Updates to guidance for procurement Updates to guidance for procurement of PACS will continue to be posted to the GSA PACS Ordering Guide Updates to guidance for procurement of PACS will continue to be posted to the GSA PACS Ordering Guide. The ordering guide posted at www.gsa.gov/firesecurity is a valuable support tool created to assist agencies with understanding the requirements of FIPS201 and procuring a PACS. The guide includes relevant regulations, FAQs, sample systems designs, sample statements of work, a list of key points of contract for additional help and questions. In partnership with GSA and guided by the GSA Ombudsman group, the Security Industry Association and the Security Technology Alliance members and their contractor companies participated in a GSA Reverse Industry PACS Training Day on September 17, 2018. We presented from an industry perspective important fact on PACS system requirements, procurement planning, providing information on resources and further educating with panel discussions, individual presentations and amusing skits to over 300 Government agency staff and acquisition specialists. You can find some of the unedited recording of the PACS Reverse Industry Day Training on YouTube. Some changes included the creation of a new category of products/services Special Item Number (SIN) for Order Level Materials (OLM) GSA Schedules Program A hot topic about the GSA programme for 2018 was also an issue for the prior year. The GSA Schedules Program is a streamlined contracting vehicle incorporating specific Federal Acquisition Regulations for more efficiently purchasing commercial items. Companies may apply per a continuous open season for a 5-year contract with three 5-year options to renew. Contractors are vetted for past performance, corporate experience and financial capability. Products and services are considered for offering to Federal, State and Local customers (for Schedule 84) with pricing that is determined to be fair and reasonable through negotiations with GSA. To make the determination for fair and reasonable pricing GSA carefully reviews the commercial practices of the contractor To make the determination for fair and reasonable pricing GSA carefully reviews the commercial practices of the contractor as well as the competition of identical or similar item pricing. The most vocal complaint of concern from the contractors was regarding the consideration of competitor contractors offering identical items with out-of-date pricing or holding a Letter of Supply not authorised by the manufacturer. GSA pricing tool Since the GSA utilises a pricing tool to determine if the pricing offered is competitive, a rogue competitor can cause a pricing action to possibly be rejected due to out of date information even as the manufacturer offers an update of the product. This is an issue on all GSA Contracts that the supplier panel hopes will be reconsidered by GSA policymakers at the central office. Most of us believe the Letters of Supply should only be issued by the manufacturer or with documented specific permission of the manufacturer to a reseller. Manufacturers may want to have a better understanding of the Letter of Supply, how it is considered by GSA and more carefully choose their Government partners for experience and compliance. Another challenge for the security community is regarding the lack of accessibility of participating dealers to GSA eBuy Overcoming challenges for the security community Contractors may only see RFQs which are posted under the Special items Number(s) that were awarded to their GSA Contract Another challenge for the security community is regarding the lack of accessibility of participating dealers to GSA eBuy. GSA eBuy is an online Request for Quotation (RFQ) programme that is for GSA Contract holders only. Agencies will post their requirements by Special Item Number for at a minimum 48 hours. Contractors may only see RFQs which are posted under the Special items Number(s) that were awarded to their GSA Contract. GSA Participating Dealers may take orders on behalf of a manufacturer if they are authorised under the manufacturer’s GSA Contract. They may also have an online PO Portal to receive orders. But they have no access to GSA eBuy to response to RFQs. Usually, under these arrangements, the manufacturers do not respond directly, so there is a problem using GSA eBuy for opportunities as their GSA Participating Dealers have no access to respond. GSA Schedule 84 leadership In some instances, a contracting officer may allow an emailed quotation. However, with the use of the electronic ordering system, this has become a common problem we hope to bring to the attention of policymakers. Some changes to the programmes may make the presentation of documentation more effective going forwardThe GSA Schedule 84 leadership has been helpful to explain the challenges to the agencies to try and resolve such issues. So, what’s up for 2019? GSA modernisation is coming. There will be improvements to their tools and more consolidations of SINs and more. There have been discussions of a revival of the GSA Expo. The Expo offered training for contracting staff both Government and private industry. Valuable tools for vendor training Equally important is the networking, meetings and the exhibits of the contractors. Expos have been discontinued since 2012 but smaller events have been growing as well as online webinar training. Webinars are valuable tools for GSA and vendor training, but they do not take the place of being able to meet your customers face-to-face. GSA online eOffer and eMod programme have made processing actions more efficient. Some changes to the programmes may make the presentation of documentation more effective going forward. The GSA online website for viewing the items on the GSA Contract and for purchasing items, GSA Advantage could definitely use an update as it has been basically the same for 20 years. Keep an eye on GSA Interact for the latest happenings with GSA.
BASF is one of the world’s leading chemical companies. Its portfolio ranges from chemicals, plastics, performance products and crop protection products to oil and gas. The company has been a committed partner to Greater China since 1885 and currently is one of the largest foreign investors in the Chinese chemical industry with major investments in Nanjing, Shanghai and Chongqing. Need for protection According to BASF’s Greater China Report published in 2012, local production enables more intensive collaboration with customers based in Greater China, and improves resource efficiency. BASF posted sales of over $6.8 billion in 2012 and employed 7,305 people. Protecting BASF’s chemical facilities demands high levels of security because of the nature of the operations and their potential for being the target of threats and/or criminal activities. To help safeguard people, property and assets, BASF’s security management has implemented a layered security approach that starts with perimeter protection. Fences and intrusion detection systems only provide limited protection, and false alerts create additional security issues. To provide more comprehensive and actionable coverage, BASF China needed real-time, visual monitoring of the perimeter on a 24/7 basis, without adding any additional lighting.To help safeguard people, property and assets, BASF’s security management has implemented a layered security approach Megapixel solution Working in collaboration with Tyco Fire and Security China, the BASF security team selected Arecont Vision’s 3-megapixel (MP) AV3135 colour cameras to meet their video security needs. The dual sensor AV3135 also has a 1.3MP true monochrome sensor that provides low-light performance. As the ambient light diminishes, the AV3135 switches to the monochrome sensor to deliver clear, high resolution surveillance images for identification and recording purposes. The Arecont Vision AV3135 megapixel cameras also provide an increased coverage area for better situational awareness compared to analogue or IP VGA cameras; and improved functionality including the ability to digitally zoom into live scenes and recorded video while maintaining high resolution. And because of the cameras’ superior day/night capability, no expenses were incurred to install additional lighting. No local power sources needed Another cost saving benefit of the Arecont Vision AV3135 megapixel cameras is that they are Powered over Ethernet (PoE) which eliminates the need to install local power sources. The AV3135 megapixel cameras are part of Arecont Vision’s H.264 MegaVideo® line of cameras that offer bandwidth and storage efficiency of 10x greater on average over traditional megapixel counterparts. The proven results laid to rest management’s concerns about storage space. BASF’s corporate security team was highly impressed with the quality and coverage of the Arecont Vision megapixel cameras when images were compared to analogue cameras. “Arecont Vision megapixel cameras provide the extremely clear images that are needed for security monitoring of the facility perimeter," said Raylene Xie, Global Account Manager, Tyco Fire and Security China. "Even BASF corporate was excited about the difference in quality between the megapixel and analogue images." The increased image quality of megapixel video played the largest role in providing superior perimeter security for the BASF facility. Expanded coverage areas and day/night capability of the Arecont Vision AV3135 cameras also contributed to a successful and effective new system.
The average German consumer generates nearly 213 kilos of packaging waste every year. ZAK–Zentrale Abfallwirtschaft Kaiserslautern—the municipal waste management company of Kaiserslautern, treats, recycles and disposes of this and other types of waste for the more than 250,000 residents of the city and district of Kaiserslautern, Germany. ZAK relies on MOBOTIX video systems to ensure that operations run smoothly and that the 88-hectare premises of the modern waste management facility remain safe. Modern waste treatment The landfill was closed in 1999 due to changes in the law. Since then, the waste from the city and district of Kaiserslautern has undergone mechanical biological treatment and been disposed of externally, or it has been thermally treated by an external company. For this reason, the waste collection and treatment facilities are therefore a priority, as well. All facilities are subjected to continuous improvement processes to remain state-of-the-art. The same applies to MOBOTIX camera solutions. “Initially we were using analogue video systems to keep an eye on the gate and facilities. Now there are 65 modern MOBOTIX video IP solutions ensuring smooth operations on the premises,” explains Michael Hentz, IT and telecommunications manager at ZAK. Camera for fire prevention and detection There are two M15D thermal cameras in use to monitor the temperature of the timber shelter in general and more specifically, the temperature of the fuel. The video systems can automatically detect events within a range from -40 to 550 °C (-40 to 1022 °F), thanks to a thermal sensor technology and thermal radiometry. For this reason, the technology is well suited to operate as an automatic alarm when paired with temperature thresholds or ranges.One of the thermal cameras has been suspended in the timber shelter where it monitors the entire area for high temperatures One of the thermal cameras has been suspended in the timber shelter where it monitors the entire area for high temperatures. A fire can break out quickly during the fermentation process. This way, materials with excessive temperatures being added to the facilities when brought by truck can be detected. The second video solution has been installed in a location where the material is transported by crane so it can be fed into the incineration process. Mr. Hentz explains: “We can know exactly how high the temperature is in the timber shelter and can take countermeasures, if necessary.” Video solution replaces rearview camera In addition to the thermal cameras, 90% of the cameras that ZAK uses are M25 video systems, which are distributed over the premises, especially in areas where people are not present. The M25 camera is a compact, affordable and powerful all-round system that uses 6MP Moonlight technology. “These cameras are particularly excellent because they are robust, low-maintenance and weatherproof,” adds Mr. Hentz. “These features play a very critical role because dirt is omnipresent at the waste management facility. And of course, this dirt collects on the cameras, as well. But the MOBOTIX models continue to perform well. They’ve really proven themselves.” A thermal camera has been suspended in the timber shelter where it monitors the entire area for high temperatures Video systems have also been installed on buildings where there is little leeway. Drivers of the two trucks, which are constantly moving back and forth on the premises, use a tablet computer to view the images provided by these cameras. It gives the drivers a good vantage point of things when they are manoeuvring their vehicles, and it prevents accidents. “Rearview cameras are of little use, as they become dirty quickly,” concedes Mr. Hentz, “which is what gave us the idea to provide tablets to our drivers, so they can use the images generated by the cameras.” Two T25 IP Video Door Stations have been installed on the exterior and interior area near the main gate. They are used for door communication and access control. Additionally, they make it possible to use RFID and keypad solutions to time-control and log access to the premises as well as create photo-documentation. Employees work around the clock at the biomass power plant, which means that chances are, there will be someone on the premises who needs to leave after ZAK closes for the day. In this event, the person can ring a bell and an employee will then open the gate. Quality stands out Mr. Hentz is very pleased with the MOBOTIX solutions. “I’ve been working for a long time with these video systems. They are both exceptionally robust and maintenance-free. What’s more, it is also easy to manage the network cameras. They score points because data can be stored directly in the camera. "I am also convinced because over the years, you can tell that the features are continually being tweaked. Yet, all cameras work on the same basic principle, which is a tremendous advantage when it comes to using them. The range of possible applications is still very diverse, thanks to the high image quality and the option to use various lenses.”
The Enforcer 32WE APP is a professional high-security wireless solution, that delivers maximum security, flexibility, potential and opportunities for installers and users alike. Profitable business solution With remote programming and diagnosis of the system using InSite UDL software via the PyronixCloud, the Enforcer 32WE APP system can be checked and even amended without having to send an engineer to site. This means there are fewer call-outs for the installer, or, should an engineer still be required to go to site, any issue can be pinpointed before arriving, which means much greater efficiency. This makes the system a much more profitable solution for their business. The initial installation is also much more efficient and flexible utilising the PyronixCloud and two-way wireless technology. Setting up an account on the PyronixCloud avoids the difficulty of having to set up static IP, while the sheer volume of Pyronix two-way wireless peripherals with features like one-push-to-learn and signal strength indicators (SSI), alongside wired expanders, allow the installer to tailor any installation to perfectly protect any property. Superior real-time remote control Users can rest assured knowing that the Enforcer 32WE APP is a superior security solution that can meet their property needs, with simple and non-invasive fitting and expandability. Another key benefit for the user is the HomeControl+ App, which gives them complete real-time control of their system from anywhere in the world. So, the system not only protects the property but provides the user complete functionality, with remote arming and disarming, as well as control of any wired automation outputs. They can even check the status of every device on the system in real-time and much more.
Security and surveillance systems are becoming critical to manufacturing plants and factories by helping to address the theft of raw materials, the theft of IP, and the tampering of equipment, machinery and cargo. They can also serve as an effective monitoring tool for overseeing assembly line production and worker safety. A Micron/Repon case study Repon, a manufacturer of high-quality ball bearing slides used in various industries including server- and rack-mount systems, office/home furniture, white appliances, tool boxes and medical carts, recently deployed an advanced security and surveillance system—an edge storage solution—at their newly built manufacturing plant in the south of Taiwan. Their system architect, Apogear, integrated Micron’s industrial microSD cards into this solution. In the case of Repon’s deployment, 24x7 operational requirements needed to be met while minimising the risk of data lossIn this case study, we discuss why Repon implemented an edge storage solution and how they will benefit—from a total cost of ownership (TCO) perspective—with Micron’s industrial microSD cards. Why edge storage? The simple answer: to enhance overall system reliability. In the case of Repon’s deployment, 24x7 operational requirements needed to be met while minimising the risk of data loss. Edge storage—the recording of video and storing it at the camera—provides recording redundancy, helping to reduce the risk of data loss. By storing a second copy of recorded video in a microSD card, edge storage provides backup in case there are any issues with the primary network storage (including network reliability issues). In the event the primary network storage goes offline, video continues recording in the microSD card. The recorded video can then be synchronised to network video recorders (NVRs) or video management systems (VMS) after the primary system is restored. Selecting the right industrial microSD Card Historically, memory manufacturers sell the lowest quality NAND flash (media grade) memory to the memory card market. While this quality of NAND can be sufficient for storing pictures and video (where data is written to once and stored), using it in microSD cards for edge storage (where data can be written and rewritten to often) is not recommended. Figure 1: Edge Storage for Recording Redundancy Edge recording with memory specifically designed to support 24x7 recording over a long period of time requires a new understanding of how that memory is made— from silicon selection, to manufacturing flow, to product design, to qualification testing. Many microSD cards available in the market today are intended for consumer use in digital still cameras (DSCs), car dash cams, or home cameras; they are not designed for commercial and industrial edge storage in IP video surveillance cameras. As such, edge storage can often be viewed as ‘unreliable’ by system integrators and installers.Users may not understand that the lifetime and quality of a microSD card can vary significantly depending on the quality of the card Users may not understand that the lifetime and quality of a microSD card can vary significantly depending on the quality of the card. Selecting the wrong quality of microSD card can result in costly field failures, often occurring within months after deployment. The importance of selecting the right memory card in an edge storage solution is illustrated in Apogear’s analysis of Repon’s edge storage solution. The analysis also shows the cost savings Repon anticipates from using Micron’s Industrial microSD cards in their solution. Project cost analysis and assumptions Apogear’s total cost of ownership (TCO) analysis (below) is reflected in relative percentages, and not on actual dollars and cents given regional and vendor differences. To create an understanding of the project scale, the TCO was estimated at approximately $850,000 USD over a three-year contract term in regards to deploying a 600-camera system at Repon’s manufacturing facility using Micron Industrial microSD cards. Figure 2: Cost Distribution Data, as provided by Apogear Figure 2 provides the percentage of costs during the estimated lifecycle of the edge storage system. The cost per system phase amounts to: Equipment cost (68%) - the cost of an IP camera, networking equipment (switch, cables, etc.), accessories, NVR and central monitoring system (CMS), and storage (HDD and microSD card). Deployment cost (20%) - the cost of installation, configuration and integration. Design cost (2%) - the cost of consulting and system architecture design. Maintenance cost (8%) - the cost of planned, regular and additional maintenance services. Decommission cost (2%) – the cost of dismounting and recycling equipment at the end of its lifetime Why Micron’s industrial microSD card? Micron’s solution is backed with a 3-year product warranty under professional surveillance use casesThe importance of product reliability is often underestimated when considering the cost of maintenance and field service. When a retail-grade microSD card fails, the card must be replaced. Not only are there direct costs of sending a crew to service and replace the card, but there are also outage times that can result in significantly more costs. By implementing Micron’s industrial microSD card, which is designed for 24/7 video surveillance edge storage usage, it is estimated that Repon will see an approximate $141,000, or about 16%, improvement in TCO compared to using an off-the-shelf retail microSD card1. High reliability and quality, lower maintenance and replacement costs Micron’s industrial microSD card supports 3 years of high-quality continuous 24/7 video recording with a quality specification of 2 million hours mean time to failure (MTTF) and 0.44% annualized failure rate (AFR) —2X better than a typical HDD today. Additionally, Micron’s solution is backed with a 3-year product warranty under professional surveillance use cases, helping to keep maintenance and replacement costs to a minimum. Figure 3: Maintenance and Replacement Cost Comparison, as provided by Apogear Advanced features minimise risk of data loss Micron’s industrial microSD card contains firmware optimised to provide stable performance for 24x7 high quality video recording with minimal frame drops.Micron understands the unique needs of this market and has developed deep application-level expertise In addition, Micron’s industrial microSD card offers a health monitoring feature for IP camera integration that reports card usage and lifetime remaining. Systems can integrate this feature into their software to alert predictive maintenance service. Micron’s industrial microSD card comes with password protected lock/unlock features to keep the device secure. Conclusion The move to edge recording and high endurance storage is happening across the Industrial IoT landscape. Targeted solid state storage solutions are emerging, and with it, new entrants into the security and surveillance ecosystem. As a leader in automotive and industrial memory solutions, Micron’s new product line of industrial microSD cards are built to meet the requirements of this industry. As a trusted advisor to its embedded customers for more than 25 years, Micron understands the unique needs of this market and has developed deep application-level expertise and a portfolio designed with that in mind. Most importantly, it brings to the market a mindset to deliver sustainable value to its customers.
At one of Spain’s newest co-working spaces, the founders’ vision incorporated using the latest in security, accessibility and design to create a 21st-century business centre. Flexible and wire-free, SMARTair™ from TESA delivers real-time access control that can accommodate both regular daily traffic and busy one-off events at ULab’s dedicated events area. SMARTair Wireless Online management SMARTair™ Wireless Online management now enables access to the building and individual offices to be controlled in real time. ULab’s SMARTair™ system securely manages regular daily traffic of approximately 100 people, and has the flexibility to accommodate many more temporary visitors when their event space is full. “In addition to regular daily traffic, weekly traffic can almost multiply by 10 if an event is held,” says Enrique Burgos. “We needed an access control system as flexible and convenient as SMARTair™.” Also — and critically for ULab — SMARTair™ escutcheons and wall readers complement the ultra-modern design aesthetic of this new workspace. With SMARTair™ Wireless Online, ULab’s facility manager can monitor the building’s security status from a single control point and in real time, controlling who enters and when. The installation permits remote opening of any door at ULab, enabling easy access in cases where users have lost or forgotten their credential. Remote access can be granted from the SMARTair™ Web Manager software, which works on any device inside a standard browser without software installation, or from the SMARTair™ admin app for Apple and Android mobile devices. Individual access rights for user profiles It’s also easy to schedule individual access rights for different user profiles — allowing, for example, site managers to access all doors, but offering occasional users more limited entry to common areas. Changes in status can be made instantly from the Web Manager. And because SMARTair™ locks are operated with RFID smartcards, there’s no security problem if an employee loses their credential. With the SMARTair™ admin software, a simple click cancels the credential’s access rights — a much quicker and cheaper process than replacing a mechanical lock. With contemporary, low-profile design, user-friendly operation and flexible, real-time security functionality, SMARTair™ wireless access control has captured the spirit of ULab. About ULab ULab is a new co-working space in Alicante’s financial district. It has 56 co-working stations, 12 offices and an area reserved for events. For more information, see www.ulab.es. For more information visit www.tesa.es/discoverwireless
The Dahl Auto Plaza in Winona, Minnesota is part of an auto dynasty that first began in 1911, when Andrew H. Dahl began selling Ford Model T’s out of his general store in Westby, Wisconsin. The company is in its fifth generation of Dahl family ownership with over a century of growth behind it. Today Dahl operates three dealership campuses throughout the Midwestern United States that are home to Subaru, Hyundai, Mazda, Toyota, Chevrolet, Buick, GMC, Ford, and Lincoln automobile franchises. During construction of the new Dahl Auto Plaza in Winona, the installation of a video surveillance system was a required part of the planning. Arecont Vision became the go-to manufacturer for all the dealership’s surveillance cameras. Video surveillance system challenge Winona’s Dahl is home to three different dealerships on a single campus — Chevy, Toyota, and the Dahl Used Car Express Service Centre. The company needed a comprehensive video surveillance system to monitor its parking lots and service bays for traffic, customer flow, vehicle flow, vandalism, and theft. With a desired 15-16 camera limit to cover such a large amount of space, cameras with high image quality and flexibility were essential to the new surveillance system’s success. No other camera manufacturer could compete with the price and performance of the Arecont Vision Omni series Arecont Vision Try-and-Buy programme The implementation of Arecont Vision megapixel cameras at Dahl Winona began with the use of Arecont Vision’s Try-and-Buy programme at the recommendation of Russ Neitzke, President and Founder of systems integrator Digicom, Inc. Cameras selected for a Try-and-Buy trial can be returned by the systems integrator for a full refund of the purchase price if the customer is unsatisfied. SurroundVideo Omni unique design The only cameras considered for the Dahl video surveillance system were Arecont Vision SurroundVideo Omni models after they were tested. “No other camera manufacturer could compete with the price and performance of the Arecont Vision Omni series,” Mr. Neitzke said. “As a result, no other surveillance camera manufacturers were recommended by Digicom, Inc. or would be able to so effectively cover the 15 acres of new and used vehicle display, public access, and vehicle service areas at the new Dahl Auto Plaza.” The SurroundVideo Omni series features a unique, patented 360o track design. Each camera includes four individual megapixel (MP) sensors mounted in multi-axis gimbals that can be independently placed and aimed in nearly any configuration, allowing coverage to be highly customised to specific project requirements. With features like remote focus in the SurroundVideo Omni G2, interchangeable lenses and high-resolution capabilities (12 and 20MP) in both G1 and G2 series models, the versatility of this camera family is unmatched. For large open spaces such as those found at the new Dahl campus, the SurroundVideo Omni series provides high resolution, omni-directional video in a rugged, low profile enclosure suitable for both indoor and outdoor use. The cameras are IK-10 impact resistant and IP66 environmental rated against dust and water, making them ideal for Dahl’s requirements. Reduced need for multiple cameras Most critical for Dahl were the SurroundVideo Omni series benefits of low maintenance, high video resolution, and the ability to reduce the number of cameras required for full situational awareness throughout the campus. The SurroundVideo Omni 12MP models selected include Wide Dynamic Range (WDR) technology, which aids in producing high quality, clear images even in challenging light situations. The SurroundVideo Omni reduces the need for multiple cameras to cover open spaces, saving the customer money The SurroundVideo Omni reduces the need for multiple cameras to cover open spaces, saving the customer money on both camera cost and installation requirements. Without the need for the constantly moving parts of a legacy Pan-Tilt-Zoom (PTZ) camera, there are no parts, gears, belts, or motors to wear out and to require maintenance in the SurroundVideo Omni series. This reduces ongoing operational costs. With Digicom Inc. designing the surveillance and installation plans, Dahl was in good hands. Dahl selected the SurroundVideo Omni series, reaping the significant benefit of reduced installation time. Each sensor gimbal in a SurroundVideo Omni is magnetically set in place around the 70+ placement-point omnidirectional track and then quickly locked down during installation. This makes it easy for the installer to arrange an ideal coverage layout. Another significant selling point for Dahl was that each SurroundVideo Omni camera requires only a single IP category 5 PoE (Power over Ethernet) cable, which reduces both complexity and installation cost. ExacqVision VMS Dahl can monitor the surveillance system locally, corporate-wide, and on various smartphones and tablets. Arecont Vision Technology Partner Program member ExacqVision is utilised for the video management system (VMS). A single ExacqVision VMS licence is required for each SurroundVideo Omni camera, while providing four high-definition video views. Arecont Vision cameras are certified with ExacqVision and the VMS is installed in the Arecont Vision MegaLab™ to enable ongoing collaboration between the two companies and to ensure the best possible integration and support for customers. Dahl can monitor the surveillance system locally, corporate-wide, and on various smartphones and tablets Arecont success at Dahl The Arecont Vision SurroundVideo Omni cameras at Dahl have been a great success, with high customer satisfaction. “Basically,” Mr. Neitzke stated, “The coverage that you get with the SurroundVideo Omni is really like buying four cameras in one.” Being able to effectively cover Dahl’s range of campus requirements with fewer cameras and lower purchase, installation, and operational costs meant that Arecont Vision has hit all the required marks for this project, according to Mr. Neitzke. The system has performed incredibly well, with few issues from the end-user. On the rare occasion when an issue has popped up, the Arecont Vision team has been responsive to the customer’s needs, providing technical support, advanced replacements, or any other kind of assistance Dahl has needed for the surveillance system. Future projects Arecont Vision and Dahl are now planning a second, even larger project at Dahl’s campus in downtown La Crosse, Wisconsin. Dahl plans on upgrading this campus with a new surveillance system for indoor and outdoor spaces with Arecont Vision cameras. Digicom, Inc. and the Arecont Vision Field Application Engineering groups are developing a campus-wide plan for this next project. SurroundVideo Omni will be ready to be deployed yet again whenever Dahl needs it.