Retail security applications
Protecting assets and people has always been a top priority for Kirkland’s, a global home décor retailer. With over 400 stores in 37 states, Kirkland’s is a go-to spot for a broad selection of distinctive merchandise: art, mirrors, candles, lamps, frames, accent rugs, furniture and more. When they evaluated their security solutions in 2016, they determined they needed to upgrade the analogue video surveillance systems in use at their existing locations and plan for new stores...
Todd Burgess has an easy answer when asked why he’s used a March Networks video solution in his Quik-E Food convenience stores for more than 15 years. “It’s simple. The system is constantly saving us money.” Networking and IT In his role as Vice President of Quik-E Food Stores, Burgess oversees all the networking and IT requirements for the Lynchburg, Virginia business, which includes 13 convenience stores and gas stations, six car washes, a laundromat and a craft beer...
Vanderbilt’s SPC Wireless is an ideal fit for the retail sector. First off, SPC Wireless devices’ aesthetically appealing design is perfect to fit in with retail environments and compliment the surrounding environments of a modern-day retail store. But, as well as featuring a sleek design, the Wireless devices also have many standout features that specifically benefit the retail sector. Automatic power saving One of these benefits is long battery life as the devices are supported b...
The retail industry is constantly looking to find new ways to be relevant in the ever-increasing shadow of online shopping. Researchers have predicted a 17.5 percent growth in the ecommerce share of global retail sales in 2021, rising from 13.7% in 2019. When designer brand Miniso opened new shops in Poland, they used Hikvision technology to give them the edge. The management team at Miniso had a number of specific questions they needed answers to in order to make the stores successful in the c...
Most retailers invest in a video surveillance solution to improve security. Many also use it as an investigation tool to help resolve customer disputes, liability claims and reduce losses from theft and fraud. Intelligent video solutions Complete Releaf relies on its intelligent video solution for all of those reasons, however compliance with state regulations was the primary objective when CEO and owner Eric Ryant started looking for a video system for his new, 3,000 square foot cannabi...
Coop wanted a security system to protect a number of their valuable instore goods, such as home electronics, cell phones, and tablets, perfumes, and jewellery. They wanted a modular alarm system that could transmit reliably with the most modern means of communication to the standard alarm receiving centres in Switzerland. They also wanted a solution that had proven reliability and fast alarm detection, and that was certified according to SES EN standards. It was essential that this solution wou...
Rapiscan Systems RTT 110 is the first high-speed Computed Tomography Explosive Detection System (EDS) to be approved on TSA's Air Cargo Screening Technology List (ACSTL). This was achieved last month after a thorough testing process with the TSA and means that the RTT 110 will now undergo further field test activities which it must pass before it can be formally qualified. The RTT 110 has revolutionised the EDS market by providing exceptional performance at significantly lower cost of ownership. With its unique stationary gantry design and belt speed of 0.5m/s, the RTT 110 produces industry-leading high-resolution full volumetric 3D images at high speed, giving excellent security. Reliable and effective high-speed screening “We are very excited to be included on the ACSTL and the only approved CT EDS on the list”, said Mal Maginnis, President, Rapiscan Systems. “Our teams have worked extremely hard to create an exceptional product which we are all proud of. The technology has been designed to the highest quality to provide reliable and effective high-speed screening with many features ideally suited for the fast parcel industry and we are really pleased that our hard work is now being recognised”. By February 2021, all cargo shipments leaving, entering or travelling within the USA must be screened by a product included on the latest TSA’s Air Cargo Screening Technology List (ACSTL). The RTT 110 is the only EDS to be approved by the TSA and to be included on the ACSTL.
Cybersecurity services and Integrated Risk Management solutions provider SureCloud has announced that it has been accredited to provide Simulated Target Attack and Response (STAR) Intelligence-Led Penetration Testing services by the not-for-profit accreditation and certification body, CREST that represents the technical information security market. CREST developed the STAR framework to deliver intelligence-led cybersecurity testing, incorporating advanced penetration testing and threat intelligence services to more accurately replicate cybersecurity threats to critical assets. To meet CREST’s stringent requirements to secure STAR service provider status, SureCloud had to demonstrate its robust methodologies and sophisticated capabilities relating to the latest vulnerabilities and cybercrime techniques, as well as meeting government and risk management requirements. We have recognised their high professional service standards and the rigorous approach" Mitigating risks President of CREST, Ian Glover said, “SureCloud has been successfully assessed against our strict criteria for the supply of Simulated Target Attack and Response (STAR) Intelligence-Led Penetration Testing services. In accrediting SureCloud, we have recognised their high professional service standards and the rigorous approach they take in helping their customers mitigate risks and safeguard against advanced cyber-attacks. We congratulate them on this excellent achievement.” SureCloud’s VP of Cybersecurity, Mike Harrison, said, “The CREST STAR accreditation is a real testament to our capabilities as a business and it’s an important industry benchmark for delivering STAR intelligence-led penetration testing services. We’re proud to be amongst only 5% of UK penetration testing vendors that have been awarded this accreditation and are therefore able to offer STAR services in line with the high standards set by CREST. The fact we can deliver this excellent service through our vulnerability management platform means further value for our clients.” SureCloud’s Penetration Testing services have been CHECK approved since 2009 This accreditation reinforces the strong performance of the SureCloud team in undertaking Red-Team simulated Cyber Attack services for their clients. Techniques used are typically a blend of penetration testing, social engineering and physical breach attempts, with the overall aim being that organisations can prevent, detect and respond to the attack as if it were real. Crucially, this gives them a realistic overview for testing crisis management procedures, and how they might need to improve. Minimising risks of potential data breaches Given the complexity of these engagements, the standards you need to achieve a STAR accreditation are set exceptionally high, as it is imperative that the increasing number of organisations looking to undertake these engagements can understand who has the capability to deliver the highest quality service to them. SureCloud’s Penetration Testing services have been CHECK approved since 2009, and has been re-certified by the Payment Card Industry Security Standards Council (PCI SSC) as a PCI Approved Scanning Vendor (PCI ASV) for more than 10 years running. SureCloud is certified by internationally recognised ISO/ IEC 27001 for achieving operational excellence, minimising the risks of potential data breaches. SureCloud is also certified by Cyber Essentials Plus, complying with the requirements of the scheme, which focuses on technical control themes such as firewalls, secure configuration, user access control, malware protection and patch management.
ExtraHop, the leader in cloud-native network detection and response, announced its top predictions for the cybersecurity and technology industries in 2020. Informed by insight from customers, partners and industry analysts and insiders, ExtraHop leaders predict a year of tool consolidation, headline-grabbing breaches and a shifting industry focus on what makes a successful tech start-up. The Year of Deeper Scrutiny for Fast-Growth Companies: “2019 was a tough year for heavily hyped, fast-growth companies going public in Silicon Valley. Several companies that raised huge rounds ultimately failed to deliver expected results or even approach profitability after they went public, and Wall Street was not amused. In 2020, we expect the investment community to more deeply scrutinise companies' financials and business fundamentals, ultimately leading to the support of companies who deliver on their promises, are capital-efficient with sound vision and innovation, and have truly sustainable business results and models to back them up.” - Arif Kareem, CEO File hashing has been the default mechanism for detecting malicious threat activity" Antiquated Threat Detection Methods like File Hashing and Signature-Based IDS Waste Time: “Since the 1990s, file hashing has been the default mechanism for detecting malicious threat activity, despite the fact that it's ineffective against modern attacks that use polymorphic or fileless methods to go undetected. The same goes for signature-based IDS, which are extremely noisy while providing very little actual alert context. Security teams will continue to rely on these antiquated methods of detection because they are expected to, regardless of how well they work in today's threat landscape.” - Jesse Rothstein, CTO and co-founder Accountability for the Ethical Use of Users’ Data: “Recent headlines tell of giant data corporations like Google and Facebook monetising users' data and lacking sufficient transparency in these activities. There’s already been significant social backlash, but in 2020 we predict that users will demand companies not just follow the often-dated laws, but that they also do what’s right. Regulations like GDPR and CCPA are helping to bring more clarity around what’s appropriate, but 2020 will be the year that the industry is held accountable for the ethical, in addition to regulatory-compliant, use of personal data.” - Raja Mukerji, CCO and co-founder A Slowing Economy Will Force Tool Consolidation: “In security programs, it's been very difficult to turn tools off. What gaps will I create? What unintended consequences will I see? As the economy has rolled along over the last decade, most security programs have had the necessary funding to add new tools and retain legacy tools under the guise of risk management. Economic slowdown is likely to change all of that, as investments in new technology will require cost savings elsewhere. A tighter economy will finally cause us to pull the plug on legacy security tools.” - Bill Ruckelshaus, CFO A tighter economy will finally cause us to pull the plug on legacy security tools""Observability" Will Gain Ground as Both a Concept and a Vocabulary Term in Security and DevOps: “Observability is a term that several companies are using to describe the practice of capturing metrics, logs and wire telemetry, or sometimes other data sources, mostly in the DevOps space. The value of correlating insights from these data sources has gained enough ground that vendors need a word for it. Observability, The SOC Visibility Triad, and other terms have been spotted in marketing materials and on big screens and main stages at security and analytics conferences. In 2020, we'll see heated competition to control the vocabulary and mental models that enterprises and vendors use to discuss and market security best practices regarding gathering multiple data sources and correlating insights between them.”- John Matthews, CIO A Major Information Leak from a Cloud Provider is Coming: “In 2020, we are likely to see a major information leak from a cloud provider. While at the same time the cloud providers are providing many useful built-in tools, it's not clear that they are using their own tools to secure themselves. As a further prediction, the leak will not effectively diminish migration to the cloud. As we have noticed with other breaches, they do not significantly erode confidence in the services.” - Jeff Costlow, CISO 2020 may well be the year that a breach of a vendor’s environment exposes the data of one or more of their customers" The Wave Begins Towards Security Tool Consolidation: “Organisations will take a strong look at the number of security vendors within their ecosystem in 2020 to determine overlap and begin a move towards consolidation of tools. The winners will include those that have proven their API superiority and ability to work together within an organisation’s ecosystem. The losers will be those who have not proven their ability to strengthen core security.” - Chris Lehman, SVP of Worldwide Sales A Vendor Will Be Responsible for a Major Breach of Data Due to Phoning Home: “In 2019, ExtraHop issued a security advisory about the vendor practice of phoning data home and how this is happening without the knowledge of customers. The problem with this practice is that it expands the attack surface via which that data can be breached, exposing it to threats within the vendor’s environment. 2020 may well be the year that a breach of a vendor’s environment exposes the data of one or more of their customers. Regulations like GDPR have imagined exactly this type of scenario and laid out specific requirements for data controllers and data processors. But when such a breach occurs, it will have broad impact and implications.” - Matt Cauthorn, VP Security The Big IoT Breach is Coming: “In 2017, major ransomware attacks crippled the networks, and operations, of major global organisations. While those attacks did billions in damage, for the most part, IoT devices were left unscathed. But sooner or later, and probably sooner, the big IoT breach is coming, and it could have global implications. Whether it happens in the US or abroad, in healthcare, shipping and logistics, or manufacturing, IoT devices around the globe are fertile hunting grounds for attackers. Taking down every connected device, from telemetry sensors to infusion pumps to mobile points-of-sale, could easily grind operations to a halt.” - Mike Campfield, VP of Global Security Programs
Traka, from ASSA ABLOY Global Solutions, has integrated with Maxxess’ award-winning security management software, eFusion, to present users with a powerful route to achieving operational efficiencies across a wide range of systems and functions. Complete site control Traka, in conjunction with Maxxess Systems, has developed a seamless integration with Maxxess’ eFusion open platform, to allow complete site control, centralise site visibility and present real-time monitoring, ensuring situational awareness for all assets, safely and securely. eFusion with Traka makes it simple for authorised staff to gain access to a wide range of controlled assets, from keys and premises to high value equipment, vehicles and machinery. The new integration enables full traceability and audit reports that can include video and audio recordings, as well as transactional data from systems such as access control, intruder, HR and fire. eFusion system is renowned as presenting a seamless opportunity to integrate to third party systems" Integration with third party systems Martin Woodhouse, Traka Head of Asia Pacific, Middle East, India and Africa (APACMEA), “Maxxess is one of the foremost global innovators within the security industry, its eFusion system is renowned as presenting a seamless opportunity to integrate to third party systems. Now together with Traka, we can deliver a significant futureproof technology that paves the way for users to benefit from one all-encompassing building control system.” “The power of this new integration brings together Traka’s intelligent key and equipment management systems with eFusion’s flexible cloud architecture, developing a solution that will deliver exciting advances in security and operational efficiency.” “It will not only benefit major new build projects, but also open new opportunities for existing users of eFusion and Traka. We look forward to building on this exciting partnership with Maxxess, which we jointly believe continues to deliver real benefits to our valued customers.” Audit capabilities across key cabinets and lockers As with all Traka solutions, the integration with Maxxess’ eFusion presents audit capabilities across its key cabinets and lockers, and enables instant traceability and reporting. Other important features include fault logging, curfews and multiple authorisations, which provide tangible returns on investment by improving operational efficiency, increasing productivity and minimising costly down time. Integration with eFusion opens the way for more powerful joint opportunities" Lee Copland, Managing Director, Maxxess EMEA adds, “With Traka solutions globally deployed in many market sectors such as critical infrastructure, retail, logistics, hospitality and corporate environments - and increasingly integrated with many third-party systems - this integration with eFusion opens the way for more powerful joint opportunities to be developed.” “There are huge benefits to be gained from integrating Traka’s capability with wider functions and operations, including building management systems, security, fire and the many application-specific systems used by our customers in different sectors.” To see Traka’s integration with Maxxess eFusion in action, one can visit Traka in hall 2, stand G20 at Intersec Dubai, taking place at Dubai’s International Convention and Exhibition Centre from 19 - 21 January 2020.
Steel fencing manufacturer Zaun Ltd has appointed Mat White from Highway Care Security Solutions. Zaun boasts a long-standing working relationship with White extending back over many years. For the past five years, he has been at Highway Care, initially as project manager on security and major highways contracts, and more recently as commercial manager and director for H2S2, a joint venture business between Highway Care and Hill & Smith business Hardstaff Barriers. White said, “I’m really excited to be joining the Zaun team and can’t wait to get my teeth stuck into my new role, while strengthening long term customer relationships and opening new doors to help create a sustainable future for the business. Zaun is picking up momentum thanks to the high-quality products it manufactures, and the dedicated and enthusiastic team that represent the business.” White project managed the design, program and deployment of security measures utilising the National Barrier Asset (NBA) Deployment of security measures Prior to Highway Care, White spent 12 years at Hardstaff, starting out as a plant operator and quickly progressing through the ranks to site supervisor and then operations manager overseeing highways and security projects. As the UK terrorist threat increased, he project managed the design, program and deployment of security measures utilising the National Barrier Asset (NBA) for high-profile events including the Nuclear Security Summit in Holland, Champions League Final, G8 and NATO conferences. High security environment Zaun sales and marketing director Chris Plimley said, “Mat brings a wealth of experience to Zaun in the high security environment, having previously worked alongside us on various high profile critical projects over the years. His product and design experience is exceptional, as is his ability to communicate at all levels from the teams on the ground to the end client means, building confidence that the project gets over the line. I’m delighted to welcome Mat into the team.” White joins four other recent recruits at Zaun. Andy Holloway has joined as internal sales manager, alongside sales estimator father and son Dave and Tommy Calvin together with design and production engineer Shane Rowton. Plimley concluded, “These appointments put the Zaun sales team on a stronger footing than ever and are key to driving forward our plans for continued growth coupled with ever improved customer service.”
RSA, a global cybersecurity provider of delivering Business-Driven Security solutions to help organisations manage digital risk, will extend its enterprise offering of modern authentication and identity assurance through a strategic partnership and joint solution with Yubico. The solution, YubiKey for RSA SecurID® Access, combines a FIDO2-enabled hardware device by Yubico with the benefits of enterprise-grade security, risk-based authentication and simplified credential lifecycle management delivered by RSA SecurID Access. YubiKey for RSA SecurID Access In today’s dynamic workforce, users expect a frictionless experience, regardless of where they are or what applications they are accessing. At the same time, organisations want to reduce the risk of security breaches, secure critical assets and minimise the costs associated with credential lifecycle management. Stolen identity is a critical security issue, and often the weakest link in security postures. In fact, 80 percent of breaches involve compromised and weak credentials, and last year security breaches cost companies an average of $3.86 million per breach. “Our partnership with RSA demonstrates a shared commitment to protect millions of users from security breaches,” said Jerrod Chong, Chief Solutions Officer, Yubico. “This collaborative effort combines RSA’s long-standing expertise in identity and access management, with Yubico’s proven leadership in standards and innovation, to bring forward a unified FIDO-based hardware authentication solution for enterprises, their partners and their customers.” Leadership in authentication and identity assurance YubiKey complements the existing range of authentication methods of RSA SecurID AccessAs organisations continue to pursue digital transformation initiatives, identity management has become increasingly complex. Continuing leadership in authentication and identity assurance, the strategic partnership will add to the broad range of authentication methods offered in the RSA SecurID Access Suite. RSA and Yubico will address a variety of workforce use cases with a simple login experience enabled by the YubiKey for RSA SecurID Access and backed by the enterprise-grade security of RSA SecurID Access. The YubiKey complements the existing range of authentication methods of RSA SecurID Access including push notification, one-time password, SMS and biometrics to enable the broadest support for diverse user populations and use cases. FIDO authentication is uniquely suited for use cases like passwordless logon to PCs and laptops and mobile-restricted environments (e.g., call centres). The joint solution will also provide identity insights, threat intelligence, and business context for user access, devices, applications and behaviour to provide businesses with the confidence that users are who they say they are. “With ongoing support for FIDO, RSA continues to deliver modern authentication solutions and identity assurance to help enterprises meet business needs, provide a range of authentication options for users and protect their most valuable assets,” said Jim Ducharme, VP of Identity and Fraud & Risk Intelligence Products, RSA. “Now, we’re enabling our customers to combine the robust, enterprise-grade identity assurance of RSA SecurID Access with YubiKey hardware devices, for secure and convenient authentication. The strategic partnership extends our support for FIDO in RSA SecurID Access, allowing integration with applications from ground to cloud to address the evolving threats and challenges in today’s dynamic workforce.” RSA SecurID Access bridges islands of identity RSA SecurID Access provides a unified platform for secure enrolment Today, RSA SecurID Access provides the backend software and services required for a full range of authentication options like the YubiKey for RSA SecurID Access to be successfully deployed, managed and used across an enterprise environment. RSA SecurID Access bridges islands of identity, and with one of the strongest partner ecosystems in the industry (RSA Ready), RSA SecurID Access provides a unified platform for secure enrolment, access control, policy enforcement and lifecycle management across all of an enterprise’s applications from data centre, endpoint and network perimeter to the cloud. For customers, this enables features like secure (multi-factor) enrolment, self-service, emergency access, and a single FIDO registration across all enterprise applications. It also provides broader compatibility and a consistent user experience for YubiKeys within the enterprise. RSA is a longstanding member of the FIDO Alliance as well as a member of the Board of Directors. As a market leader in multi-factor authentication, RSA is committed to supporting the new FIDO2 standard and providing best practices for FIDO deployment in the enterprise with RSA SecurID Access.
It’s not just a new year, it’s a new decade. And somehow this makes it feel bigger. Almost like we’re moving faster or reaching farther. Technology is certainly advancing at an unprecedented pace. While there’s a lot to talk about, there are three big security trends that we think will continue to have a huge impact in the year to come. 1. What is artificial intelligence and is it going to take over? We’ve seen countless versions of artificial intelligence (AI) in pop culture—think of Sonny in the 2004 film I, Robot or Rachael in Blade Runner—so we feel we know the technology. And, based on this, we believe our anxieties around it are warranted. But, the truth is that the science to produce even far less sophisticated versions of these characters just doesn’t exist. AI today Computers use data to help improve performance without being explicitly programmed Today’s AI science is focused largely on machine learning. With machine learning, computers use data to help improve performance without being explicitly programmed. This means that, through the use of algorithms and training, a computer can be programmed to determine which features it should use in the identification process to efficiently produce the most accurate output. Over time and based on a trainer’s feedback, for example, a computer can determine that using color rather than shape to identify a flower is more efficient because the results are more accurate. Machine learning in the physical security industry In the security sector, we’re seeing good results with automatic license plate recognition (ALPR) systems that employ machine learning. Today’s ALPR cameras and systems are better at recognising license plates from different countries, states, or provinces because they’re more efficient at identifying an ever-expanding number of inputs. We don’t need to worry that AI will be running our lives So, we don’t need to worry that AI will be running our lives. And, in fact, we should be relieved that machine learning can be used to identify scofflaw plates as this will help keep our roads and spaces safer. 2. Can we move beyond the single, secured door? With increased globalisation and the rise of multinational companies, organisations everywhere are facing new challenges around visitor, and employee access management. Protecting your environment is no longer as easy as securing a single door. As the nature of work becomes more complex, organisations are going to have to take a different approach for managing the flow of people through their facilities. Organszations are going to have to take a different approach for managing the flow of people through their facilities The challenges of traditional access control We’ve seen that relying exclusively on a static access control system can increase workload and inefficiencies. With this approach, granting and revoking temporary access and provisioning employees is a labor-intensive process. It requires hands-on participation from security operators and front office staff. There is no guarantee that corporate or regulatory policies are being followed as well as little-to-no traceability. And, ultimately, the process is, by its very nature, prone to human error. Large conglomerates have been meeting these challenges by developing tailor-made solutions based on physical identity management. These systems are costly and require 3rd party support. Smaller organisations simply could not afford the time or resources necessary to implement them. Heading into 2020, we’re seeing an increase in out-of-the-box solutions that will allow organisations of all sizes to move to cloud-based identity management systems. How Physical Identity and Access Management (PIAM) systems can help More affordable Physical Identity and Access Management (PIAM) solutions will help organisations secure their systems and facilities by effectively managing access requests based on an individual’s identity and an organisation’s security policies. They can ensure that only those individuals who have the right to access a secured area can do so by managing and automating the process. In effect, by extending an access control system with a PIAM, organisations of any size will be able to reduce workloads, fully implement corporate policies, and better protect their spaces. 3. Should we be nervous about facial recognition? We shouldn’t be surprised by the public’s fear of facial recognition. The idea that private citizens can be identified and tracked in public is the stuff of political espionage and sci-fi thrillers. But, beyond the fictional examples, we’ve also seen cases where facial recognition gets it wrong. Incorrectly identifying an innocent man for a robbery twice or having difficulty distinguishing members of the same race are just some of the real-world reasons people don’t trust facial recognition. How facial recognition can increase security Facial recognition technology can play a huge role in helping keep people, assets, and spaces safe. It can monitor visitors to improve safety and efficiency, assist security personnel by helping to reduce response times, and aid in the investigation of incidents. Facial recognition technology can play a huge role in helping keep people, assets, and spaces safe In the coming year, we’re going to see a greater focus on developing solutions that use a privacy-by-design approach. For video surveillance applications, this will include the ability to automatically mask—through blurring or pixelation—persons in live and stored video feeds. The system itself will ensure that only authorised personnel can access un-pixelated or blurred images and only in cases that warrant it. Anonymisation Using this approach will help reduce concerns and increase protection, which will lead to greater accuracy and trust. In parallel, technology providers must continue to work with regulating bodies to ensure that the policies around implementing and using any surveillance technology, especially facial recognition, align with our values. With all these trends, we’re seeing the relationship between people and technology evolving. When we focus on improving the lives of people in our communities, we can harness the power in these advancements and make a real difference.
Entrance control and access control - of the physical kind - are common terms in the security industry which are often used interchangeably, but should they be? Having worked both sides of the fence, with previous roles at TDSi and HID and now the Major Accounts and Marketing Manager at Integrated Design Limited, Tony Smith highlights the subtle but important differences between these two terms and the systems they refer to, outlining how they should work together to achieve optimal security. Access control is a system which provides discriminating authentication Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial Used to describe a system which performs identification of users and authentication of their credentials (deciding whether or not the bearer of those credentials is permitted admission) access control is an incredibly broad term. Access control provides a discriminating authentication process and comprises the software or hardware that defines the criteria for acceptance or denial of an individual to a restricted area. Entrance control – such as security turnstiles - takes the output of that validation and has the capability to see whether that criteria is being adhered to, either granting or denying access as appropriate. Entrance control is the hardware responsible for keeping people honest If access control verifies authorised personnel using their credentials – their face, fingerprints, PIN number, fob, key card etc – and decides whether or not they are permitted access, entrance control is the hardware which enforces that decision by making users present their credentials in the correct way, either opening to allow pedestrian access or remaining closed to bar entry and potentially raising an alarm. For example, a card reader acts as an access control device, recognising the card holder as having the correct permissions and saying ‘yes, this person can pass’. But, it’s the entrance control system – a turnstile, for example – which actually physically allows or denies access. Physical access and video surveillance Some entrance control systems don’t feature a physical barrier, however. Fastlane Optical turnstiles will not physically stop an unauthorised person from passing through, and instead alarm when someone fails to present valid credentials, alerting security staff that a breach has occurred. These kinds of turnstiles are suited to environments which just need to delineate between the public and secure side of an entrance, with less need to physically prevent unauthorised users from entering. State of the art access control integrations have been installed for award-winning complex, The Bower It’s also possible to capture video footage of any incidents, allowing security personnel to identify users failing to abide by the access control system’s rules, using It’s also possible to capture video footage of incidents, allowing security personnel to identify users failing to abide by access control system rules the footage to decide on the level of response required. The breach could have been the result of a member of staff being in a hurry and failing to show their card before passing through, in which case they can be reminded about the security protocol. Or, it could be an unidentified person who needs to be escorted from the premises. Entrance control and access control working together For optimum security, access control and entrance control should work together, with the entrance control system enhancing the use of the access control system, making it more efficient and better value for money. The two can’t effectively operate without each other. Security turnstiles, for example, require something to tell them that someone is about to enter – the access control system does this – and, the access control system needs a method of stopping people when they don’t badge in correctly. The two systems are complementary.
On November 2019 in Stockton, California, surveillance footage found that vandals shot out glass windows and doors in many places in a small business complex (FOX40). The intruders broke in only to leave with nothing, proving their intent was solely to vandalize the property. Meanwhile, it was reported that a trio of ATM thieves struck around 9 times across many different locations inside Brooklyn and Queens within just over a month in fall 2019 (ATM Marketplace). On average, the cost of vandalism to SMB is around $3,370 per incident (US Small Business Administration), including a staggering 692 vehicle vandalism claims per day. Likewise, the average cost of theft to SMB is about $300 per shoplifting incident and $1,500 per employee theft incident, which accounts for 38% and 34.5% of all theft instances, respectively (National Retail Security Survey). High-performance artificial intelligent systems can automate the monitoring tasks Vandalism and theft have proven time and time again to be inconvenient and deconstructively harmful towards SMB. However, these financial burdens can be prevented with the use of the right security system. AI-based security systems with Deep Learning contain many features that many SMB owners find advantageous in their pursuit to stop unwarranted and unwanted money loss. Intrusion and loitering detection The first of many features that can help with vandalism and theft prevention is Intrusion Detection. High-performance artificial intelligent systems can automate the monitoring tasks for high-risk sites to provide a high level of security and security personnel monitoring efficiency. Traditional intrusion detection systems detect objects based on size and location, but they do not recognise the type of objects. Now, Intrusion Detection (Perimeter Protection) systems with cutting-edge, built-in AI algorithms to recognise a plethora of different object types, can distinguish objects of interest, thus significantly decreases the false-positive intrusion rate. The more advanced AI-based systems, like those we offered at IronYun, enable the users to draw ROIs based on break-in points, areas of high-valuables, and any other preference to where alerts may be beneficial. Similarly, AI Loitering Detection can be used to receive alerts on suspicious activity outside any given store. The loitering time and region of interest are customisable in particular systems, which allows for a range of detection options. Advanced loitering detection software as such can detect and trigger real-time alerts for both people loitering and/or vehicles that are illegally parked in certain areas of interest. A benefit, which only certain advanced systems contain, is the ability to send trigger actions to 3rd-party systems in reaction to receiving an alert of loitering and/or intrusion detection. These trigger actions can be set to contact authorities immediately and/or trigger a scare tactic alarm or announcement to intruder/loiterer. Certain Face Recognition and License Plate Recognition software can record individual people/vehicles Face and license plate recognition In addition to the activity detection solutions, certain Face Recognition and License Plate Recognition software can record individual people/vehicles and use pre-configured lists to identify particular faces or plates that may be of interest, such as those in watchlists. These systems can also enable the users to upload images of faces not in the lists and search for them in the camera recording. For instance, if a person is detected several times loitering outside a store, one may save one of the detection photos into the watchlist, and set up an alert when said face is recognised again outside the building in the future. The alerts will help to deter and prevent vandalism or theft, and notify the authorities to the scene before the troublemaker completes the act. The main attributes of high-performance Face Recognition systems which maximise assistance with vandalism and theft management include: Face match rate > 90% with good camera angles and lighting. Processing multiple streams and multiple faces per image. Live face extraction and matching to databases of thousands of faces within 3 seconds. State-of-the-art AI security software with Deep Learning allows the user to no longer need to install special LPR camerasIf the watchlist individual is wearing a mask or their face is not in view of the camera, their license plate may be a good indicator. If a particular car is detected several times loitering in the parking lot or street outside a store, the user can set the alerts for such car to get notified in the future. With an AI solution like this, common street cameras should be equipped with LPR capabilities. So, state-of-the-art AI security software with Deep Learning allows the user to no longer need to install special LPR cameras. High-performance alert mechanisms A high-performance AI solution, in addition to having high accuracy, should be able to: Easily integrate with 3rd-party systems Work well with all ONVIF IP cameras including infrared and thermal ones (for Intrusion detection) Analyses video streams in real time and trigger alerts within a few seconds Send alerts to multiple VMSs, connect with signalling devices such as loud speakers or flashing lights Send email notifications to security staff and police departments Send notification on mobile device using AI NVR mobile app Maintains a record of all alerts to provide evidence of intrusion and loitering instances for police and insurance agencies. To assist in theft and vandalism prevention, AI-based security systems with deep learning will do all of the tedious work for you. Their low cost and high performance also make them the most accessible security solutions in the market with large return on investment. Stopping crimes is a difficult, ongoing challenge, but with the right AI software, business vendors and police departments can do so with more ease.
Facial recognition continues to be a political football and a target of privacy activists in the United States. For example, San Diego has suspended its use of facial recognition scanners by law enforcement after a campaign by civil rights groups. The San Diego Tactical Identification System (TACIDS) programme included a database of facial recognition scans shared by 30 local, state and federal agencies. A California law, passed in the fall, puts a three-year moratorium on law enforcement use of face recognition technology. A proposal in Congress would prohibit use of biometric recognition technology in most public and assisted housing units funded by the Department of Housing and Urban Development (HUD), thus protecting the more than two million public housing residents nationwide from being “over-surveilled.” The “No Biometric Barriers to Housing Act” is supported by the NAACP, the National Housing Law Project, National Low-Income Housing Coalition, National Action Network, Color of Change, and the Project on Government Oversight. The problems of Facial Recognition "Studies that show that facial recognition systems may misidentify many individuals including women and people of colour" A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing because it “could be used to enable invasive, unnecessary and harmful government surveillance of…residents.” The letter cites studies that show that facial recognition systems may misidentify many individuals including women and people of colour, thus “exacerbating vulnerabilities that marginalized groups already face in life.” In June, Somerville, Mass., became the second U.S. city to ban the use of facial recognition technology in public spaces. The first was San Francisco. A coalition of organisations and trade associations has issued a letter to Congress outlining concerns with “blanket prohibitions” or moratoriums on facial recognition technology and listing beneficial uses for public safety, national security and fighting fraud. The Security Industry Association (SIA) is part of the coalition, the Information Technology and Innovation Foundation. A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing Facial recognition technology has benefited Americans in many ways, such as helping to thwart identity thieves" The letter says: “While polls consistently show that Americans trust law enforcement to use facial recognition technology responsibly, some groups have called for lawmakers to enact bans on [the] technology. While we agree that it is important to have effective oversight and accountability of these tools to uphold and protect civil liberties, we disagree that a ban is the best option.” Development and guidance As alternatives to outright bans, the letter proposes expanded testing and performance standards, develop of best practices and guidance for law enforcement, and additional training for different uses of the technology. “Facial recognition technology has benefited Americans in many ways, such as helping to fight human trafficking, thwart identity thieves and improve passenger facilitation at airports and enhance aviation security,” says Don Erickson, CEO of SIA. “SIA believes this advanced technology should be used in a safe, accurate and effective way, and look forward to working with Congress to help the U.S. set the example on how to ethically and responsibly govern this technology.” SIA has produced a document called “Face Facts: Dispelling Common Myths Associated with Facial Recognition Technology.”
Security’s intersection with consumer electronics is on view at CES 2020, the world’s largest technology event, Jan. 7-10 in Las Vegas. The giant show features more than 170,000 attendees, 4,500 exhibitors and 1,100 industry thought-leaders featured on the CES stage. A range of technologies will be on display, from artificial intelligence (AI) to 5G, vehicle technology to AR/VR (augmented and virtual reality), robotics to home automation. Security plays a prominent role, too.The impact of this event for the smart home could be about delivering home analytics and enhancing privacy" Smart home market on the forefront The smart home market is a major focus. “For the smart home market at CES this year, we expect to see numerous announcements regarding home awareness,” says Blake Kozak, Senior Principal Analyst at IHS Markit. “This will include brands offering up additional analytics for consumer security cameras with a focus on edge-based solutions.” “The impact of this [event] for the smart home could be about delivering home analytics and enhancing privacy through cloudless architectures and new electronic door lock approaches,” he adds. An example of cloud analytics is the Resideo Home app, introduced in December, which will make whole-home monitoring possible for four critical networks of the home – water, air, energy and security. Resideo promises a “simplified and integrated smart home experience.” Video is also prominent at the show. “For cameras, we can expect to see more cameras focused on the outdoor space and possibly new form factors for video doorbells,” says Kozak. Familiar security industry brands exhibiting at CES 2020 include ADT, Ring, August Home and Yale (both part of ASSA ABLOY), Bosch and Alarm.com. Focus on Cybersecurity In 2020, companies will continue to focus on solutions for protecting consumer data" Cybersecurity is an aspect of many of the devices on display at CES. “Device security and data privacy play a key role in the adoption of connected devices,” says Elizabeth Parks, President, Parks Associates. “Consumer security concerns for smart home products will continue to be a barrier to adoption in the U.S. and Europe, and these concerns can actually intensify with device adoption-71% of U.S. smart home households are concerned about cybersecurity. In 2020, companies will continue to focus on solutions for protecting consumer data. One big area of interest is protection on the network router, providing whole home solutions, which are very appealing to consumers.” “At CES we will see the traditional players introducing new DIY (do-it-yourself) products, as well as new players announcing new product features, services, and partnerships,” Parks adds. Smart access control Smart locks will be among the security products at CES 2020. For example, PassiveBolt, a lock company, will show the Shepherd Lock, a touch-enabled smart lock with enhanced security through sensors and AI. The add-on lock converts existing locksets into touch-activated devices. Another lock manufacturer is Kwikset, whose door locks and door hardware include Wi-Fi-enabled smart locks, Bluetooth-enabled smart locks, keyless and keyway-less locks and connected home technology. Video doorbells, including industry-innovator Ring, have been a hit in the consumer market. At CES, Ring will expand the mission to make neighbourhoods safer by creating a “Ring of Security” around homes and communities with a suite of home security products and services. The “Neighbors by Ring” app enables affordable, complete, proactive home and neighbourhood security. Homeguard offers a range of affordable CCTV solutions for home and small business DIY CCTV demonstrations DIY security systems are another market. Homeguard is a leading DIY consumer brand offering a range of affordable CCTV solutions for home and small business, including wired and wireless CCTV kits, smart cameras, home alarm systems and wire-free HD CCTV kits. Swann Communications is also at the forefront of surveillance and monitoring with new products developments including wire-free HD cameras and doorbells, professional CCTV video surveillance systems, and 1080p full HD systems with “True Detect” heat and motion sensing. AVTECH, and subsidiary YesGo Tech, will demonstrate a compact Wi-Fi home security set, a series of special cameras with face recognition, thermal detection and license plate recognition, customised central management software and a university ID tag that is compatible with access control, OEM and ODM opportunities. Security and automation solutions D-Link’s home networking, security and automation solutions will help consumers connect, view, share, entertain, work and play. SECO-LARM, manufacturer of a Room Occupancy Monitor that shows whether a room is in use, has a line of keypads and proximity readers with built-in Bluetooth for convenient access. Another smart home security solutions provider, Climax Technology, integrates wireless security, home automation, energy management, home emergency monitoring and live visual monitoring. Personal safety mobile application Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens" WaryMe designs and develops a personal safety mobile application to improve a user’s security in public places, schools, transports and companies by addressing major risks such as terrorism attacks, intrusion, fire and even industrial accidents. An all-in-one mobile application integrates alerting, crisis management and mass notification features. “Market players are looking to expand beyond established smart home devices like smart thermostats and networked cameras to products like smart water leak detectors, smart pet feeders, and smart air purifiers,” says Elizabeth Parks. “Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens. This trend is part of a broader security marketing effort to extend the perimeter of home security beyond traditional home access points.” “Familiarity with smart home devices lags behind familiarity with smart entertainment products; it even lags that of smart speakers, which are quite new in the market,” adds Parks. “In 2020, we will see players working to advance the visibility and marketing around device integration, and specifically focus on use case scenarios around safety, security, and convenience, which have always been the primary drivers of adoption of these types of products.”
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
A combination of SMARTair devices — wireless, battery-powered escutcheons, cylinders and wall readers ensure security at the new Almelo building, thereby also ensuring that the demands of a busy mixed-use environment are met. Authorised employees can use offices and warehouse spaces they need; shoppers only access the retail areas of this new Witzand superstore. "This building is our showroom and must come with a modern access control system: SMARTair is the right system for us,” explains Kevin Hoitink at Witzand Almelo. SMARTair wireless access control With SMARTair wireless access control, Witzand facility managers tailor the precise security levels they need for different areas of the building. It’s easy to manage and amend access rights for every site user, to ensure authorised employees come and go freely, while everyone else is kept out. The Almelo installation runs via an Update on Card system, which is ideal for premises with medium to high daily user traffic. With Update on Card management, administrators can set time-limited access rights and order audit trails when needed. Strategically located wall updaters provide a link between the software and the SMARTair-protected doors. It’s easy even for non-specialists to manage a SMARTair installation with the bundled, full-featured TS1000 admin software. Witzand’s new flagship building was awarded a score of 56.6% by the Dutch BREEAM sustainability certification program. Its employees, customers and valuable stock are kept safe by SMARTair. Learn more about SMARTair wireless access control system and visit: https://campaigns.assaabloyopeningsolutions.eu/smartair
Located in Milpitas, California, Jang Su Jang restaurant offers high quality, authentic Korean cuisine offering an extensive menu to satisfy even the pickiest taste buds. Their main goal is to provide delicious meals served with great service in a clean, modern and upscale environment. Jang Su Jang prides themselves by only using the freshest produce for their side dishes and quality meats for their BBQ, providing an excellence to the Jang Su Jang brand. Highly committed to creating an exceptional dining experience not only with great food, but through superior service and an attractive atmosphere, Jang Su Jang employees will always do their best to provide the highest level of Korean cuisine and customer service.The primary objectives of a security overhaul are to monitor staff and provide overall coverage of dining areas as well as entrances and exits Management acknowledges that security plays a crucial role influencing sustainability of operations. The primary objective of a security overhaul including maintenance with camera additions and upgrades will allow management to monitor staff, provide overall coverage of dining areas as well as entrances and exits. Solution by VIVOTEK VIVOTEK’s camera deployment was crucial to assist management in the day-to-day operations of the restaurant. Remotely monitoring employees, customer disputes, damage to customer property and car break-ins are all concerns upper management must address. Also, being able to monitor the main dining areas, assist hosts with seating and table occupancy and camera installations always provide security during non-business hours. Since 2015, management at Jang Su Jang restaurant have always wanted, at a security level, no blind spots left uncovered in the kitchen and dining areas. At the same time, it is critical to maintain the restaurant’s upscale design, making sure cameras are discrete but fully functional. The new video surveillance system features twelve VIVOTEK Network cameras including a 16-channel network video recorder, ND8401. A security overhaul will allow management to monitor staff, provide overall coverage of dining areas as well as entrances and exits Perfect fit for overall coverage FD816BA-HT 2 megapixel fixed dome network camera is equipped with a Full HD sensor enabling a viewing resolution of 1920x1080 at 30 fps. Featuring WDR Pro and Supreme Night Visibility technology, this camera can capture high quality and high visibility video in high contrast or low light environments.Armed with a removable IR-cut filter, VIVOTEK's solution can maintain optimal image quality around the clock As a professional day/night camera, the FD816BA-HT features a removable IR-cut filter as well as IR illuminators effective up to 30 meters for superior image quality around the clock making this camera a perfect fit for overall coverage of the main dining area. Following with the FE9191 H.265 fisheye network camera was used to cover the large banquet area. Covering 360° surrounding view, restaurant staff has no blind spots and can easily run the floor without having to constantly walk the area. The 12 megapixel camera guarantees superb image quality utilizing the latest in panomorph lens technology for 180°panoramic view (wall mount) or 360°surround view (ceiling/wall/floor mount). Armed with a removable IR-cut filter and WDR Enhancement technology, the camera can maintain optimal image quality around the clock for unparalleled visibility under high-contrast lighting environments. Jang Su Jang’s kitchen area was outfitted with FE8174V, VIVOTEK fisheye network camera featuring 5 megapixels.The restaurant uses VAST as the central management software designed to manage all surveillance products Finally, the FD8134 fixed dome network camera completed the deployment and was installed at various exits and entrances, hallways and the cash register area. Specifically designed for indoor applications with its compact and stylish exterior, FD8134 allows discrete surveillance by capturing high quality, high resolution video. In addition to completely outfitting the property in VIVOTEK cameras, the restaurant uses VAST as the central management software designed to manage all surveillance products. VAST allows owners to operate their business efficiently on premises or remotely. VIVOTEK's effective solution “When we originally started improving our security system, we chose VIVOTEK cameras and were continually impressed with the quality and reliability, we continued to do upgrades as new VIVOTEK equipment was released. Delicious, quality food is not our only priority; safety is also fundamental to our business. Our staff and customers well-being is of immense importance and helps our business operations run smoothly,” said Manager of Jang Su Jang restaurant Brian Chung.
Recent times have seen Saudi Arabia experience development at a remarkable rate, but key industry sectors have not always been able to keep pace. While certain industries grew by leaps and bounds (architecture, technology), others took longer to find their stride. Take, for instance, the retail industry; up until the early 2000s, Saudi Arabia was still new to the idea of North American shopping malls—most people still preferred shopping at traditional neighbourhood convenience stores. Arabian Centres: developer and operator One company single-handedly changed that: Arabian Centres. Founded in 2002 as a subsidiary of the Fawaz Alhokair Group, it is the developer and operator of 19 shopping centres in highly-populated cities, with over 1 million square metres of gross leasable area (GLA) under its management. This makes Arabian Centres the largest mall operator in the Kingdom. It has been an unprecedented change in the retail landscape of Saudi Arabia, and it shows no signs of stopping, with an additional 12 malls currently in development to help Arabian Centres reach its goal of 2 million GLA in the next 3 years. But just a few years prior, Arabian Centres was facing a significant challenge to its future operations: security compliance. Upgrading security systems In 2015, changes in local security laws required Arabian Centres to upgrade their security systems across all 19 shopping centres. Local security standards for video security in retail establishments increased, requiring higher image quality and performance. Arabian Centres needed to meet those new requirements quickly to ensure their centres were up to code in order to continue operations.Local security standards for video security increased, requiring higher image quality and performance Arabian Centres needed a partner that would not only help them satisfy applicable legal requirements, but also provide them with the hardware and software to meet their own personal standards of quality as a top-ranked market entity. Moreover, with 19 centres currently operational and more coming in the future, any security solutions they adopted would have to be scalable and versatile enough to meet a wide variety of unique scenarios. Upgrading to Avigilon Beginning in 2015, and continuing to the present day, the overall video security system of Arabian Centres has been upgraded to the Avigilon security solution. In the first phase of upgrades, Avigilon security solutions were installed in 12 of the 19 shopping centres; for phase two, the remaining seven centres will be upgraded with Avigilon solutions, with all areas expected to contain Avigilon solutions by 2018. Avigilon solutions that have been implemented: HD Dome Cameras – superior image resolution, self-learning video analytics and excellent low-light performance HD Pro Cameras – with up to 7K (30 MP) resolution, this camera line captures detailed images over vast areas and provides wide area coverage options Avigilon Control Center (ACC) Enterprise video management software – enhances the way security professionals interpret, manage and interact with high-definition security video Network Video Recorders (NVRs) – Avigilon NVRs include pre-installed ACC™ software, high-performance recording technology, and a three-year Avigilon warranty with dedicated support The Avigilon security solution provides higher image quality and performance at a lower cost of ownership As the new video security standard, each Arabian Centres mall features an average of 350 Avigilon cameras, including HD Dome and award-winning HD Pro cameras, network video recorders, and Avigilon Control Center™ video management software. The Avigilon security solution provides higher image quality and performance at a lower cost of ownership than previously installed systems. By utilising Avigilon 5K (16 MP) HD Pro cameras in their parking areas, it allows operators to cover the same area in greater detail with fewer cameras installed. With the adoption of Avigilon security solutions, Arabian Centres met all security compliance laws across Saudi Arabia. Avigilon cameras provide the image detail and quality that police required, and Arabian Centres passed their inspections without issue.
Located in the Capitol Hill neighbourhood of Seattle, the historic two-story brick and timber commercial building at 115 Belmont Street is surrounded by apartment complexes, coffee shops, and other commercial establishments. The building was renovated and upgraded in 2002 to make it more attractive to potential tenants. It is currently the home of a Seattle Goodwill® Industries store. Effect of graffiti on property value Retailers, shoppers, and residents in this area of Capitol Hill face a number of security challenges, including vandalism and theft. One of the most pressing issues is the problem of graffiti. The Belmont Street building was a prime target for graffiti vandals, known as “taggers.” The cost of graffiti cleanup is substantial and few perpetrators were being apprehended. Graffiti can also encourage a serious snowball effect as its initial appearance in a location may attract more graffiti and crime. This was the case with the Capitol Hill building. Retail sales were negatively impacted and the property’s value was jeopardised. Arecont megapixel solution Sequoyah Electric and Network Services provided the property owner with a solution to help resolve the recurring graffiti problem. By installing Arecont Vision® megapixel cameras, it was expected that the surveillance system would capture high resolution images of the taggers both during the day and at night, and provide the police with the evidence they needed to apprehend and prosecute the offenders. Five Arecont Vision® MegaDome® 2 vandal resistant 3 megapixel cameras were installed along with an ExacqVision video management system. Almost immediately, a tagger was caught on video defacing the building. The quality of the image allowed an identification to be made and the matter was handed over to the Seattle Police Department. After a few more taggers were caught on video, word quickly spread and the graffiti problem disappeared. Incidents of vandalism and theft were also captured by the Arecont Vision® megapixel cameras, and the detailed images provided the authorities with sufficient identification and forensic documentation for prosecution. The system was designed so that both the building owner and Sequoyah can remotely access live or recorded video with the ability to zoom in on footage for a closer look. A mobile app gives real time access as needed. The cameras are contained in environmental, vandal-proof housings and automatically switch from colour to black and white recording in the evening. Assisting authorities with suspect identification “The excellent resolution and frame rate of the Arecont Vision® cameras makes forensic review of the video evidence a snap. We are able to resolve facial detail and provide the authorities with quality images to assist with identification of suspects,” said Jon Tabler, Loss Prevention Systems Manager, Seattle Goodwill® Industries. Theft and vandalism may never be completely eliminated but with the Arecont Vision® megapixel cameras deployed with the exacqVision video surveillance software, the building owner and the authorities now have the tools to initiate prosecution while protecting people, property, and assets.
Trust – along with appearance – both play a key role in the world of exclusive watches and jewellery. This is the case for Meiller Jewellers in Schwandorf, Germany. This fifth-generation partnership offers exclusive watches, jewellery, and glasses from venerable, high-end, and contemporary brands and models. With their experience, exceptional service and extremely wide selection of both traditional and trendy products, the family-run company has captivated customers since 1876. Twenty employees advise customers and sell products, as well as ensure the high-quality maintenance and repair of watches and jewellery in the certified master workshop. The jewellery store’s range includes around 200 brands of watches, rings, necklaces, earrings and bracelets as well as eyewear, offering over 10,000 products in total. When it comes to video security, Meiller also relies on a modern solution and has installed ten MOBOTIX cameras in the store. The family-run company Meiller Jewellers has captivated customers since 1876 Analogue footage issues Up until now, the jeweller had been using an analogue security camera system, which was starting to show its age and no longer ran smoothly. In addition, the quality of the video images sometimes left much to be desired. "We are dealing with very small items here, such as earrings, and sometimes these were difficult to make out due to the low resolution of the analogue camera," explains Roland Meiller, owner of Meiller Jewellers. Roland Meiller decided to install a new video solution and called security consultant Norbert von Breidbach-Bürresheim, Managing Director at VALEO IT Neteye GmbH. Norbert packed the MOBOTIX cameras up and brought them to the store where he demonstrated the video systems for the jeweller. In addition, he made a number of test recordings and the customer was more than satisfied with the results. "The resolution of the video systems was very good, and the details were easy to make out – even in backlight situations," Meiller said. "The price of the solutions sealed the deal for us because you can really see the difference when it comes to the value for money the new indoor cameras offer. Another criterion was the design of the cameras. Their design is very discreet, making the cameras on the ceiling hardly noticeable." Cameras ready for use in 12 hours The ten cameras were to be installed outside opening hours, but since shops were allowed to open on the Sunday of the chosen weekend, which is not usually the case in Germany, VALEO IT Neteye began to remove the old analogue system on Saturday afternoon, directly after the store was closed. Afterwards, new network cables had to be installed in the ceiling since there were only analogue cables in place at the time. Finally, the new cameras were mounted. "The removal of the old cameras and installation of the new ones went incredibly smoothly and was finished within just 12 hours, so that we were able to re-open the shop on time for a bustling day of business that Sunday,” Meiller explained. “VALEO IT Neteye had already preconfigured the video equipment they brought, so the installation was especially fast." Meiller Jewellery offers exclusive watches, jewellery, and glasses from venerable, high-end, and contemporary brands and models Excellent image quality even in poor light conditions A total of nine c25 indoor cameras were installed at the entrance and on the ceiling over the sale tables. These are ideal for installation in ceilings due to their small diameter of just 12 centimetres and a weight of approximately 200 grams. Features include a light-sensitive sensor with 6MP Moonlight technology, a microSD memory card and the latest camera software. The integrated Lowlight Exposure Optimisation MxLEO facilitates high-contrast images without motion blurring, even in poorly lit surroundings. This allows the easy identification of people, as well as the details of individual watches or pieces of jewellery. In addition, the c25 is equipped with MxAnalytics video analysis tools that can be used, for example, to carry out people and object counting or display a heat map of high-traffic areas. "We do not use these functions yet, but we are thinking about doing so in the near future," says Meiller. In high-end shops, a highly visible video surveillance system is not always desired, since the customers usually place high value on discretion Cameras provide overview of the entire shop A p25 indoor camera was installed above the cashier’s area. It is equipped with a 6-megapixel Moonlight sensor, and is very light-sensitive. Due to the manual swivel and tilt functions, the camera offers high flexibility during installation. The camera features a telephoto lens and provides high-resolution 6-megapixel images in high detail. It is true that a highly visible video surveillance system may deter potential burglars or thieves by emphasising the danger of being identified and caught after the act. In high-end shops, however, this is not always desired, since the customers usually place high value on discretion. That is why a video-based solution should be as discreet as possible. "In a jewellery shop like ours, a video system is part of the basic kit, for insurance purposes for starters. The MOBOTIX cameras have an elegant design, so that at first sight, they aren’t even visible on the ceiling," says Meiller. Evaluation made easy in suspicious cases The MOBOTIX cameras are based on a decentralised concept. In this decentralised concept, each camera functions as a high-performance computer. Both data and image processing, as well as the encoding, are performed by the camera itself. The recording can be stored to the camera’s SD card at Meiller Jewellers and transferred to a network storage device. It is only viewed in concrete cases of suspicion. Compared to a centralised system, up to ten times more cameras per server can be connected this way. Furthermore, no additional computers or software are necessary. This is another key advantage, since the old analogue cameras required an expensive hard drive recorder. In the workshop separate from the store, there is a computer on which live feeds from the jewellery shop can be viewed. In this way, employees always know what is going on in the shop, while as a result, the jeweller has a video surveillance system that ideally ensures quick identification and arrest of the culprits in the case of theft or burglary.
Intrusion can be a complicated and expensive subject when looking to protect retail businesses. Each installation can come with various difficulties to overcome, whether this is aisles, display spaces, counters, furniture and more. Maximum protection in all areas Another consideration is that burglars can be creative when breaking in. To avoid detection, they can hide behind furniture, crawl across the floor or even stay close to walls or aisles, where there may be natural blind spots in the security system. Therefore, to ensure maximum protection in all areas, a multitude of detectors would need to be utilised to cover each angle the different obstacles create. This can be a very time-consuming and expensive exercise. So, what’s the solution for a cost-effective and efficient installation that provides maximum protection? Fit the Pyronix Octopus DQ and take a different approach to detection. Instead of fitting various detectors at varying angles to cover large or awkward areas, you can fit one and detect from above! Better intruder catch performance This ceiling mount quad infrared detector utilises advanced Pyronix technologies, with 360º coverage to provide complete peace of mind. With a quad-element passive infrared (PIR) sensor, the Octopus DQ has better intruder catch performance when compared with traditional dual element ceiling mount PIR sensors. While its simple clip in PCB, single screw fitting, selectable EOL resistors and walk test LED make the Octopus DQ fast to fit! A more cost effective and secure solution for any installation. With the Pyronix Octopus DQ, retail owners can have complete peace of mind that the security system is watching over their property.
Round table discussion
2019 was a big year for the Expert Panel Roundtable. The range of topics expanded, and we had more participation from more contributors than ever before. In closing out the year of contemplative discussions, we came across some final observations to share. They can serve both as a postscript for 2019 and a teaser for a whole new year of industry conversations in our Expert Panel Roundtable in 2020.
The new year comes with new opportunities for the security industry, but what technologies will dominate our discussions in 2020? Topics such as artificial intelligence (AI) and HCI (hyperconverged infrastructure) became familiar in conversations during 2019, and they are likely to dominate our thoughts again in the new year. But other buzzwords are also gaining steam, such as “blockchain” and “frictionless access control.” Connectivity and the cloud will also be timely technology topics as the industry evolves. We asked this week’s Expert Panel Roundtable: What technology buzz will dominate the security industry in 2020?
“Open systems” has been a security industry buzzword for decades, although reality has sometimes diverged significantly from the ideal. The current state-of-the-art in open systems provides a multitude of benefits to increasingly complex physical security systems. We asked this week’s Expert Panel Roundtable to elaborate: What is the impact of open systems on physical security?