Retail security applications
Todd Burgess has an easy answer when asked why he’s used a March Networks video solution in his Quik-E Food convenience stores for more than 15 years. “It’s simple. The system is constantly saving us money.” Networking and IT In his role as Vice President of Quik-E Food Stores, Burgess oversees all the networking and IT requirements for the Lynchburg, Virginia business, which includes 13 convenience stores and gas stations, six car washes, a laundromat and a craft beer...
Vanderbilt’s SPC Wireless is an ideal fit for the retail sector. First off, SPC Wireless devices’ aesthetically appealing design is perfect to fit in with retail environments and compliment the surrounding environments of a modern-day retail store. But, as well as featuring a sleek design, the Wireless devices also have many standout features that specifically benefit the retail sector. Automatic power saving One of these benefits is long battery life as the devices are supported b...
The retail industry is constantly looking to find new ways to be relevant in the ever-increasing shadow of online shopping. Researchers have predicted a 17.5 percent growth in the ecommerce share of global retail sales in 2021, rising from 13.7% in 2019. When designer brand Miniso opened new shops in Poland, they used Hikvision technology to give them the edge. The management team at Miniso had a number of specific questions they needed answers to in order to make the stores successful in the c...
Most retailers invest in a video surveillance solution to improve security. Many also use it as an investigation tool to help resolve customer disputes, liability claims and reduce losses from theft and fraud. Intelligent video solutions Complete Releaf relies on its intelligent video solution for all of those reasons, however compliance with state regulations was the primary objective when CEO and owner Eric Ryant started looking for a video system for his new, 3,000 square foot cannabi...
Coop wanted a security system to protect a number of their valuable instore goods, such as home electronics, cell phones, and tablets, perfumes, and jewellery. They wanted a modular alarm system that could transmit reliably with the most modern means of communication to the standard alarm receiving centres in Switzerland. They also wanted a solution that had proven reliability and fast alarm detection, and that was certified according to SES EN standards. It was essential that this solution wou...
A combination of SMARTair devices — wireless, battery-powered escutcheons, cylinders and wall readers ensure security at the new Almelo building, thereby also ensuring that the demands of a busy mixed-use environment are met. Authorised employees can use offices and warehouse spaces they need; shoppers only access the retail areas of this new Witzand superstore. "This building is our showroom and must come with a modern access control system: SMARTair is the right system for us,” ex...
Booth number: 14039 Dahua Technology USA Inc. will display video surveillance solutions, access control and intercoms at ISC West. Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. The first year that we exhibited at ISC West was in 2012. That was before we had a local US operation. The market started to pick up our brand and was surprised that we offer extensive product portfolios. In 2014, we registered our US office and continued to participate in ISC West. Through our presence at the show, customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints. We are local here and help our customers to grow their business and increase their satisfaction with us. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organisation Q: What strategies do you use to get the most out of exhibiting at ISC West? A trade show is definitely a lot of investment within a few days. Therefore, how we create the best ROI and meet the right customers are very important. A trade show is not just for marketing; ensuring the best ROI requires work by several parties in an organisation, including products and technical expertise as well as the sales team. We use an internal and highly coordinated plan with the team to get a better result. We make sure everyone is on the same page in terms of the products/technology we are going to present and have the people with the best knowledge to present to customers who visit our booth. Therefore, a highly coordinated team strategy is required. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Every company has their ways to follow up with the leads and evaluate the ROI from the show. The way we are using is to upload all our leads to our software and track all these leads afterwards. If they are not already buying from us, our goal is to convert them to become a registered dealer. Customers get to know us better and understand that we are not just a product manufacturer but can also support them from the service and operation standpoints If they are already our registered dealers, we seek to grow their business by using our latest technology solutions. In general, all marketing activities in business today require a clear ROI, and it has to tie into the sales numbers. From our experience, the ISC West show provides the best ROI among other shows in the North American market. Q: What company activities (outside the show floor) does your company organise each year? We have a partner event and invite our value-added dealers and partners. We’ve been hosting this event since 2015. Q: What sets ISC West apart from other trade shows on the calendar? As I mentioned, ISC West provides the highest ROI among other shows in the North America market. This show also brings many of our customers and partners to the city as well. I guess people value this opportunity to meet and discuss the technology, the industry trends, and the business to figure out how we can grow together. Other trade shows might be smaller than ISC West and targeted at different markets or address different scopes of the industry need. Every show we attend in 2019 plays a strategic role for us to communicate with the market and find the customers we are looking for.
Booth number: 8045 Costar Technologies, Inc. is a public company that designs, develops, manufactures and distributes a full range of products for the video surveillance and machine vision markets. Costar consists of five operating companies: Arecont Vision Costar, CohuHD Costar, Costar Video Systems, Innotech, and IVS Imaging. The combined product portfolio consists of surveillance cameras, video surveillance systems, recorders, monitors, lenses, cables, accessories, and cloud-enabled services. For more about their presence at ISC West, we contacted Jeff Whitney, Vice President of Marketing for Arecont Vision Costar, a Costar Technologies, Inc. business unit. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. One of our companies, Arecont Vision, exhibited in ISC West booth 17147 in 2005, a tiny space on which the hopes of the company rested. At the time AV was focused on pioneering IP megapixel surveillance cameras, but today we are part of Costar Technologies, offering cameras, VMSs, and recorders. In 2005, the technology was extremely new and unproven to the typically risk-adverse security industry. Talking with those who were with the company at time, the enthusiasm of the booth team reached the security dealers and systems integrators who were attending, helping bring megapixel cameras to a much wider audience. Q: What strategies do you use to get the most out of exhibiting at ISC West? The Costar companies have a very deep portfolio of products for the security market, and we bring our latest products from each business unit to ISC West. Attendees come in part to see the latest tech, and we drive our development cycle to have exciting new products to unveil on the show floor. We also have meeting space in the booth to provide one-on-one time with our executives and sales team, while sponsoring free admission to the expo for all who want it. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Unveiling our latest products and solutions to existing customers and partners is key to a successful event, and ISC West’s large impact on the industry ensures that many will attend. Perhaps even more important is informing those attending of the strength of the Costar product portfolio, including many Made in USA products and services that others don’t deliver. Both help to drive leads for projects in which we can really benefit our partners and end user customers. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show Q: What company activities (outside the show floor) does your company organise each year? A large show like ISC West brings many of the Costar business units together, providing an excellent opportunity to continue bonding as a team, as well as to participate in events beyond the show floor. Each of our companies will participate in meetings, dinners, and events with our customers and partners throughout the days of the show. Q: What sets ISC West apart from other trade shows on the calendar? ISC West brings a very large number of interested, security-focused systems integrators, dealers, consultants, and end user customers all to one place for a three-day expo. That audience and opportunity to share our message validates the investment any large show requires from Costar or others. While some industry events have struggled to find and maintain their audiences, ISC West continues to deliver quality, knowledgeable attendees from across the Americas and around the world. The show differs from other events we do, which are typically regional in attendance or focused more on specific vertical markets.
Booth number: 12089 At this year's ISC West, VIVOTEK USA, Inc. will be showcasing their 180⁰/360⁰ product line plus other general form factors with new features and benefits, including a cybersecurity application embedded onto the cameras, crowd detection, smart motion detection, tailgating, and many more. In addition to IP cameras, VIVOTEK will display a comprehensive product line that also includes NVRs, video receivers, video servers, PoE switches, and video management software. Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. We have come a long way from a little-known surveillance manufacturer with a small booth size VIVOTEK has been an exhibitor at ISC West for many years now. Looking back, we have come a long way from a little-known surveillance manufacturer with a small booth size to one of the global providers in the security industry with a recognisable and trusted brand. Now, we are well-known in the industry and are proud of our accomplishments, but we feel greater things are still in front of us. Q: What strategies do you use to get the most out of exhibiting at ISC West? Each year, we want our booth to tell our stories – who we are, what we do and what we are capable of, and where we are heading. We do not want to just be another camera manufacturer who only promotes and displays products; we want to be the solution provider that customers are looking for. In addition, we have very knowledgeable sale managers who can assist visitors at our booth who are looking for surveillance, whether it’s an upgrade or a totally new solution. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Gain industry knowledge and perspective as to where surveillance security industry is heading Like any trade show, it is difficult to quantify success. We attend ISC West to promote the VIVOTEK brand, meet and discuss with customers and gain industry knowledge and perspective as to where surveillance security industry is heading. If we achieve these, then ISC West is a success for us. Q: What company activities (outside the show floor) does your company organise each year? Our main focus each year at ISC West has always been the interaction with customers and potential customers on the show floor. We pride ourselves in the products and technology we offer, and there aren’t any other trade shows in North America to showcase our capabilities than ISC West. Q: What sets ISC West apart from other trade shows on the calendar? ISC West is the industry standard of security trade shows in North America. Since we are a security surveillance manufacturer, ISC West is the one show that all manufacturers in this industry must attend.
Booth number: 26041 March Networks is a global provider of video surveillance and video-based business intelligence solutions. Their product portfolio is end-to-end, ensuring that customers can deploy comprehensive solutions designed to help them address real business challenges and improve performance. At ISC West this year, March Networks will be showcasing new hosted services, new PTZ cameras and additional offerings. Attendees will also be encouraged to discover their solutions for banking, retail, cannabis and transportation – all of which help organisations transform video into business intelligence through the integration of surveillance video, analytics, and data from business systems and IoT devices. For more about their presence at ISC West, we contacted Peter Strom, President and CEO, March Networks. And not surprisingly, the technology was a lot less sophisticated compared to what we see today Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. I believe March Networks first exhibited at ISC West in 2001. I did not join the company until 2003, however I had been working in the industry for several years already, and can recall that the exhibitions back then had a much different feel. For one thing, there weren’t the very large companies we see today dominating a lot of the landscape. And not surprisingly, the technology was a lot less sophisticated compared to what we see today. Anyone who has worked in physical security for a long time can attest to the remarkable shift we have seen over the years, first with the transition from analogue to IP video and all that entails, to security analytics, to today’s truly advanced business intelligence applications, hosted solutions, and artificial intelligence, computer vision and similar content analytics. Q: What strategies do you use to get the most out of exhibiting at ISC West? Our most effective strategy by far is scheduling our business meetings in advance of ISC West. Our sales team does a very good job of planning meetings with enterprise end users and channel partners ahead of time, so we’re hitting the ground running even before the doors open on Day 1 of the event. In addition, our channel partners are also very well organised, and know which organisations they are going to bring to our booth during ISC West. This pre-planning saves us a tremendous amount of time and ensures that we make the most of the opportunity to meet face-to-face with the many decision-makers who have travelled to the show. The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year Q: How do you quantify your success at ISC West? What ROI do you receive from the show? The quality and quantity of our planned business meetings is definitely how our company measures the success of our ISC West participation each year. Of course we do track the number and quality of the leads we capture as well; however, our face-to-face meetings with end user organisations and channel partners are the primary measures of our ROI. Q: What company activities (outside the show floor) does your company organise each year? The activities we organise outside of the show floor vary from year to year. We have hosted customer appreciation events and roundtable events. We will typically organise an internal sales meeting as well to take advantage of the fact that many of our salespeople and product managers are in the same location. Q: What sets ISC West apart from other trade shows on the calendar? The timing of ISC West is good for most people, as it is still early enough in the budget cycle for most customers to leverage the show to help make decisions – particularly in our banking, retail, cannabis and transit target verticals. Holding the event consistently in Las Vegas is also beneficial, as it makes it easier for people and exhibitors to plan in advance. The city itself is well equipped to handle large exhibitions, offering everything from a central conference space at the Sands to the convenience of nearby accommodations, restaurants etc. Travel is typically convenient as well. In our opinion, ISC West is the premier industry show in North America and appears to be gaining momentum each year.
Booth number: 18037 Hikvision will showcase a wide-range of its video surveillance solutions and security products such as its DarkFighterX dual-sensor with patented bi-spectral fusion technology for low light color imaging; thermal technology for critical perimeter applications, as well as preventive maintenance through temperature alarming and fire detection; specialty solutions for vertical markets including retail, education, gaming and commercial real estate with tailored products and valuable business intelligence analytics; TurboHD (HD over coax) for high resolution video using existing cabling; PanoVu and multi-sensor cameras. We will also feature Hikvision’s central management system, HikCentral, which provides a highly-scalable, reliable, and efficient centralised system management. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience? Hikvision has exhibited at ISC West since 2006. Our presence has grown considerably since then. Each year we showcase Hikvision’s latest technologies and the evolution of the brand through ad campaigns: “Heartbeat of Security” (2016), “Art of Video Surveillance” (2017), and “Achieve Extraordinary” (2018). At ISC West, Hikvision enjoys re-connecting with existing customers and developing new partnerships. Over the years, Hikvision has demonstrated growth and strength within the industry and will continue to support its partners through the dedicated workforce that makes up Hikvision North America. Q: What strategies do you use to get the most out of exhibiting at ISC West? The strategy is simple. We bring the latest and greatest in technology and a knowledgeable workforce to meet our customers and partners. With our latest products displayed at our booth and our team of product managers, vertical-market leaders, and other technical gurus readily available in one place, it’s a great opportunity to connect with our current and future partners. Of course, we also have one-on-one client meetings in our meeting rooms throughout the show. And, we also host interactive experiences including trivia games, product demonstrations, and other technical presentations at the Thought Theater in our booth. Q: How do you quantify your success at ISC West? What ROI do you receive from the show? Hikvision quantifies its success with a variety of metrics including traffic throughout the booth, attendance at educational sessions we host, the number of meetings we conduct with customers, and responses from our sales team on the engagement with integrators and end users after the show. We also measure the feedback we receive from our advertising campaigns whether it’s through our signage at the show or coverage in publications. Q: What company activities (outside the show floor) does your company organise each year? We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners We host a Hikvision Partner Celebration @ ISC West, an invitation-only event to celebrate Hikvision Dealer Partners, distribution, technology and design partners, and end users. We consider it a fun way for us to say thank you to our valued partners in a casual setting. We’re also an enthusiastic sponsor of the Mission 500 Security 5/2K. Hikvision is fielding a running team, and we’ve begun our fundraising in earnest. Corporate social responsibility is part of our DNA at Hikvision, and the Security 5/2K is a wonderful way to join with our security industry colleagues to make a difference in kids’ lives and give back. Q: What sets ISC West apart from other trade shows on the calendar? Hikvision attends a variety of important conferences and trade shows throughout the year, but ISC West is the big show that attracts international attendees that everyone looks forward to. We wouldn’t miss it.
Booth number: 20031 Pelco is highly invested in providing end-to-end video surveillance solutions for customers, so this priority will remain the same in 2019 and beyond Pelco’s priorities for 2019 at ISC West are informed by worldwide trends in the security industry. As a result, Pelco will be focusing on enhancing cloud connectivity and cybersecurity for their customers. In addition, VideoXpert is Pelco’s best-selling video management solution, so this system will be the primary solution focus moving forward. Pelco is also planning to build upon Pelco Professional Services, which will include VxCare, a three-tier service plan for VideoXpert owners available worldwide this May. Overall, Pelco is highly invested in providing end-to-end video surveillance solutions for customers, so this priority will remain the same in 2019 and beyond. Q: What was the first year your company exhibited at ISC West? Please share your remembrances of that experience. Pelco was established in its current form around the year 1987, we have been attending ISC West since at least then. One memory that stands out is having to make many coax cables connect with all the analogue cameras and switchers. Q: What strategies do you use to get the most out of exhibiting at ISC West? We truly value the media relationships we’ve nurtured over the years. The security trade media specifically have played a pivotal role in sharing the latest news as it relates to our industry and ISC West. In addition to media relations, e-mail blasts and blogs are also key tools to build buzz around our exhibit. Lastly, we utilise a playbook and training protocols developed for our sales department. This information ultimately benefits our customers because they will receive accurate and up-to-date information about our video surveillance solutions. One way we quantify our success at ISC West is to keep track of the number of people attending our booth Q: How do you quantify your success at ISC West? What ROI do you receive from the show? One way we quantify our success at ISC West is to keep track of the number of people attending our booth. The show is considered the premier event in North American security so a major way we measure our ROI is through initial or final meetings with customers and partners. These initial connections can happen on or near the show floor. In addition, our product managers and engineers create a dialogue with our customers so they can determine the transferrable value of a potential solution, which in turn influences our product world map. Q: What company activities (outside the show floor) does your company organise each year? We have participated in the Security 5K in support of Mission 500. Additionally, we sometimes host customers at local end user sites so they get to see the system in operation. Q: What sets ISC West apart from other trade shows on the calendar? It’s the best-attended security conference in North America by far, attracting both domestic and international visitors.
It’s hard to believe that we’re in the final quarter of 2019. It’s time to wrap up goals and make new ones that will guide us into another decade. As we look forward, we can’t help but look back at some of the key trends that emerged in the last couple of years, and their continued presence in the product road maps and plans that so many security industry leaders and manufacturers are creating. Some of these trends have enhanced the efficacy of security systems, whereas others have the potential of having adverse impacts. Cybersecurity Cyber-attacks of all kinds have become, and will continue to be, a major threat, making this one of the most important initiatives that today’s businesses embrace. From a manufacturer’s perspective, building cybersecurity into the product from its inception is critical, with integrators beginning to demand this level of consideration from the products they sell. As a result of a rise in the convergence of IT applications alongside security investments, end users are now seeking out solutions designed with data security top-of-mind. All network connected devices such as DVRs/NVRs, servers, IP cameras, access controllers, intrusion alarms, smart sensors, are vulnerable, which is why this added step in developing cybersecurity protocols and applying them across the organisation is critical. Building cybersecurity into the product from its inception is critical More connected devices The Internet of Things (IoT) has been a major trend for the past few years in many industries, and this will continue as we integrate sensors of all kinds into the network. The collection and analysis of the data collected by these sensors is giving rise to a plethora of applications such as industrial applications, intelligent building management, event management, and much more. The physical security industry benefits by having additional intelligence for situational awareness and emergency management, as well as opportunities to provide additional value-added services and business insights. Being deployed in an increasing number of scenarios and with continued improvements in computing capabilities, video has the opportunity to become the eye of IoT. AI-enabled devices Software manufacturers are looking toward artificial intelligence to help propel advanced analytics in an effort to deliver more situational awareness to operators, and an increased ability to proactively assess threats or anomalies. While video and data analytic capabilities have been around for quite some time, some would argue they were rudimentary in comparison to software that uses AI to make existing applications such as facial recognition much more accurate, and to create new ways to detect anomalies. In addition, AI continues to be used to make sense of the large amounts of data that are being generated by intelligent sensors and by analysing the growing amount of video. 5G connectivity It’s safe to say that 5G will revolutionize the way people stay connected to the internet. Extra speed, extra bandwidth are going to make our mobile devices faster, more powerful and hyperconnected, with the same thing happening to IoT connected devices such as cameras. This is going completely change the way we think about smart cities: more powerful IP devices connected to one another, powered by AI, will have a massive impact on the way we move, shop and live in urban areas. more powerful IP devices connected to one another, powered by AI, will have a massive impact on the way we move, shop and live in urban areas Privacy concerns In most advanced economies around the globe, citizens are increasingly concerned with privacy of their data, and many governments have put – or are in the process of doing so – stringent data protection laws in place. The EU has lead the way in using these concerns to develop privacy regulations that govern the development of data-driven applications. This trend is starting to impact the entire globe, as we shift toward more data autonomy and privacy. Since most physical security applications involve the collection of video and data about people and assets, privacy regulations will continue to have a significant impact on the industry well into the future. Cloud and mobile capabilities Mobility is critical for physical security and is emerging through the development and use of cloud-based services, as well as the ability to access security devices through a smart phone or Web-based browser. That’s why there’s been such an influx of mobile apps created to manage cameras, receive automatic alerts for the most diverse event, and giving users the ability to grant or restrict access to a facility. All of this demonstrates the world’s demand for mobility, connectivity and ease-of-use. More video — everywhere Video is the cornerstone of security, providing both real-time and forensic coverage for emerging threats and incidents, which is why it’s one of the fastest growing segments of the marketplace. The use of video for traditional applications in new markets, as well as for use in newer applications that are not necessary security related is poised to see the most movement. In some industries such as oil and gas, there is a trend towards extending video coverage into extremely harsh and hazardous environments, so manufacturers are challenged to develop appropriately certified equipment to meet a more stringent demand. Manufacturing facilities such as food processing plants are also increasing their use of video for training and compliance purposes to prevent incidents such as food recalls that can be extremely costly for the business. It’s an exciting time to be a part of the security market, as we’re really just beginning to see that, when it comes to technology advancements, the sky is the limit. I would argue at the core of these innovations is the video data being collected, and as we work to build technologies that can harness the power of these applications, we will continue to be at the forefront of this movement toward greater intelligence and business insights.
Insider threat programmes started with counter-espionage cases in the government. Today, insider threat programmes have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a programme, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organisation Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organisation. They can cause brand and financial damage, along with physical and mental damage. Insider threat programme Once you determine you need an insider threat programme, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a programme Next, get a top to bottom risk assessment to learn your organisation’s risks. A risk assessment will help you prioritise your risks and provide recommendations about what you need to include in your programme. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat programme will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a programme and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of programme needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the programme. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the programme, build the culture and promote awareness. Teach employees about the behaviours you are looking for and how to report them. Behavioural analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organisation need to detect insider threats? Organisations need software solutions that monitor, aggregate and analyse data to identify potential threats. Behavioural analysis software looks at patterns of behaviour and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behaviour of people and notifies security staff when behaviour changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviours and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behaviour, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behaviour. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organisation has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat programme. Big companies should invest in trained counterintelligence investigators to operate the programme. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behaviour Using the right technology along with thorough processes will result in a successful programme You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behaviour and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat programme. IT is the most privileged department in an organisation. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat programme takes time and patience. Using the right technology along with thorough processes will result in a successful programme. It’s okay to start small and build.
Growing up, I was surrounded by the military way of life as my father was a Captain in the Marine Corps during the Vietnam War and my grandfather and uncles all served in the military. Even from a young age, I knew I was going to serve our country. My 22-year career in the military includes serving in the United States Air Force, the California Air National Guard and as a reservist assigned to an active-duty Air Force unit. Training and development operations Over the course of my military career, I held a variety of assignments from starting out as a Gate Guard to becoming a Flight Chief and Non-Commissioned Officer in Charge (NCOIC) of a Security Forces section. I retired from the military as a Master Sergeant. After my deployment to Afghanistan, I joined Allied Universal as a security director. My 17-year career at Allied Universal encompasses roles including Service Manager and General Manager at the West Los Angeles Branch and leading the Training and Development operations and Fire Life Safety Division. In 2008, I was tasked to develop and implement the company’s Healthcare Division. Attaining meaningful employment opportunities Below are just a few reasons why the physical security sector is a natural fit for military veterans: Self-Discipline and Organisation Coveted in Security Sector - I believe that the skills learned in the military, such as self-discipline and organisation, have provided the necessary tools to be successful. I truly enjoy working with other veterans at my company as we all know that we can count on each other to get the job done right. This bond and sense of commitment to each other is always there. Multi-faceted Career Paths Available - The security sector also offers veterans the ability to attain meaningful employment opportunities with multi-faceted career paths. A veteran’s background and experience are highly valued in this sector and there are many positions to match our skill sets and expertise. The responsibility we have for those in our charge is really not any different than what we have learned in the military. Team Players - Teamwork is a lesson all military veterans learn. In the military, you live and work together, and are taught to support your team members and efficiently collaborate with the people around you. This is an invaluable skill in the security sector whether you are seeking an entry level or management position. No Military to Civilian Decoder Needed - Veterans need a ‘military to civilian decoder’ system to help explain the significance of their military skills and how they translate to the general employment landscape. The physical security sector, however, understands the language of the military and don’t generally require that military responsibilities be coded into language that non-military can understand. Securing mid-level appointments The physical security sector features a wide variety of jobs from entry level, middle management to senior positions. A retired veteran with a pension may look to the security sector for part-time or full-time entry level work. Other former military, who are not eligible for retirement benefits, may secure mid-level appointments with the goal of climbing the ladder to the highest rungs. The flexibility and opportunity are unparalleled in the security sector. Veterans generally enter the workforce with identifiable skills that can be transferred to the physical security world and are often skilled in technical trends pertinent to business and industry. And what they don't know, they are eager to learn - making them receptive and ready hires in physical security environments that value ongoing learning and training.
There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetisation Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is changing and evolving. New entrants in the monitoring space New entrants in the monitoring space face barriers to entry, in particular the need for more investment"“New entrants in the monitoring space face barriers to entry, in particular the need for more investment in infrastructure and expertise,” said Spencer Moore, Vice President of Sales and Marketing, Rapid Response Monitoring. ”Because of the expense of new technologies, more full-service monitoring companies are outsourcing the monitoring function to existing wholesale monitoring companies.” “The cost of entry has gone up, and companies are trying to preserve capital,” agreed Jim McMullen, President/COO at COPS Monitoring. “Larger companies are realising wholesale monitoring does a better job from a customer service viewpoint. We are more focused on monitoring and the quality of service. It takes a lot of money to keep up with the cyber world,” added McMullen. Wholesale monitoring companies Wholesale monitoring companies are finding that they need petabytes of storage space, among other expensive requirements. “The trend is toward technology evolving quicker, and that often requires investment and training in a monitoring center,” said Daniel Oppenheim, CEO of Affiliated Monitoring. “Because trying out new technology is so important, wholesale monitoring centers often find that they serve as a ‘laboratory’ to experiment with newer technologies. Limited trials often expand later to broader outsourcing of a company’s monitoring services”, said Oppenheim. Automated Secure Alarm Protocol “What people miss out on is that monitoring is quite complex, and there are specialised services and skillsets, and barriers to entry from a regulatory perspective,” said Moore. Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service. The national service saves time, improves accuracy and increases efficiency in communications between monitoring centers and public safety answering points (PSAPs). The service uses the Automated Secure Alarm Protocol (ASAP). Public Safety Answering Points Up to 60 PSAPS have joined the programme, although the low number is misleading, given that a single PSAP could represent the ‘City of Houston’. (There are an estimated 6,000 total PSAPs nationwide). It has taken six to eight years to develop the program from its genesis to where it is today, when more participation is finally creating a critical mass. Technology is fundamentally changing monitoring companies. “We used to be a services company powered by a little bit of technology, but we’re now moving toward a technology services company,” said Moore. Critical ‘filtering service’ Monitoring provides a critical ‘filtering service’ between public requests for emergency service and those tasked with providing the services. In effect, monitoring centers work with manufacturers to make them more resilient to false alarms. Monitoring companies also provide a human touch in a time of need, and emotional empathy. Today, emergency information is being transmitted to PSAPs electronically, which saves time and money. The current low-taxation environment means there are fewer resources for municipal governments, so cost savings make a difference. Monitoring, a specialised skillset Increasingly, monitoring is becoming a business that requires a more specialised skillset Increasingly, monitoring is becoming a business that requires a more specialised skillset. Regulation, and the need for increasing investment, is driving consolidation. “With a decreasing number of monitoring companies, there are fewer customers for software developers and other tools. Less outside innovation makes it more likely monitoring centers will have to ‘go it alone’ and develop software and other tools internally,” said Oppenheim. Importance of monitoring systems “In effect, consolidation will serve to limit technology choices, and to increase the need to in-source a lot of expertise”, agrees Moore. Tying monitoring systems into other software systems is another continuing challenge. “People want our system tied into their system,” said McMullen. “I have two people who focus full time to tie our systems into other systems. There will be more computers talking to computers.”
Industry experts predict that sensors in the home will reach a level of sophistication never considered in early versions of Smart Home. These devices will know when the house is empty and be able to shut off heating and cooling systems. Smart phone with geolocation will then tell it when the owner is on their way back so it can start adjusting the temperature to a comfortable level. And, it won’t just be lights that turn on and off. Sensors in washing machines will know that clothes have been put inside and will start the cycle at a time when costs are at a lower level. The Smart Home market is also driving innovation in the form of Bluetooth low energy (BLE)-enabled locks for external doors on homes and adding mobile credential use to their offering. This in turn is driving volume in the wireless lock sector and having a positive impact on volumes and pricing in the commercial locking market. Data capture form to appear here! Wireless home automation As the home automation industry has expanded with an ever-growing number of devices and services, companies are placing bets on which wireless protocols will dominate. The past few years the leaders have been Z-Wave and ZigBee. Companies are also using a variety of other standards including Crestron’s Infinet, Insteon, and proprietary technologies such as Lutron’s ClearConnect. The home automation industry has expanded with an ever-growing number of devices and services The popular ZigBee and Z-Wave short-range wireless technologies have proven ideal for the kinds of home-area networks that are becoming prevalent. Based on the IEEE’s 802.15.4 personal-area network radio standard, ZigBee is an open wireless standard. Z-Wave was developed by Zensys (later acquired by Sigma Designs) as a proprietary wireless standard. Z-Wave’s wireless mesh networking technology allows nodes to communicate with each other directly or indirectly through available relays if they’re within range. Out of range nodes can link with each other to access and exchange information. A Z-Wave network can have up to 232 nodes. Some companies have sought to hedge their bets out of a desire to be more “manufacturer agnostic.” Bluetooth and Wi-Fi are gaining popularity with new low-power variations of these standards. Smart doors and their benefits Despite a wealth of features offered by the latest smart door locks — remote and location-based locking/unlocking; voice activation; timed access; emailed entry alerts; and integration with smart camera and lighting systems — most people still have limited knowledge of their capabilities. Only 14% of survey respondents described themselves as “very familiar” with what a smart lock can do. Even though most of them probably use smart access control solutions at their workplace. While smart video surveillance solutions that can impact home automation are still in nascent stages, the potential is immense. Modern video analytics and surveillance technology have the capability to offer convenience to the connected homeowner and lower energy consumption. By determining the optimum lighting, heating and cooling needs of a connected home, smart video surveillance technology can drive down energy-related costs significantly. Smart cameras will also have an impact on the need for DVR/NVR products in an automated home, as analytics-driven video surveillance solutions that generate large amounts of data will reduce the need for these devices. Another emerging element in home security is the use of drones The resolution of an advanced radar sensor Smart video surveillance technology can drive down energy-related costs significantly Today, the resolution of an advanced radar sensor is high enough to enable not only presence detection, but also to provide advanced features for security, automation and well-being, all in one. Imagine for example, that the security sensor installed in an elderly parent’s home could also detect a fall having occurred, monitor the breathing of a baby or even leaks in the wall. Due to the unique field of view that radar provides as well as the multi-functional potential, this technology will be the key to the awaited convergence of smart home functionalities and minimisation of home devices. A radar sensor’s accuracy and its ability to support wide functionality and applications are determined initially by its resolution, which is based on two key factors: bandwidth and number of channels. The wider the bandwidth and the more channels the radar supports, the more accurate the data received. Imagine the difference between a 1990s television model and a 4K 2018 television model: as the resolution is ever improving, the sharper and more detailed is the image. Drones as a security mechanism Another emerging element in home security is the use of drones. An Amazon patent outlines how its unmanned aerial vehicles (UAVs) could perform a surveillance action at a property of an authorized party. It would be “hired” to look out for open garage doors, broken windows, graffiti, or even a fire. The drone would only view authorized locations and provide information back to the homeowner. The idea is to deploy Amazon’s previously proposed (but not yet realized) “delivery drone” to provide surveillance of customers’ homes between making deliveries. In a “surveillance as a service” scenario, Amazon’s customers would pay for visits on an hourly, daily or weekly basis. Drones would be equipped with night vision and microphones to expand their sensing capabilities. Catch up on part one and part two of our smart home mini series.
Penetration testing of physical security systems is used to evaluate if a company’s security measures operate as intended. From a technology angle, penetration testing (pen testing) assesses whether the totality of the systems operate as designed, rather than testing each individual component. Does the system work with the officers, the policy and procedures that are in place? A session at ISC East, Nov. 20 in New York, will address the need for and benefits of penetration testing (also known as red teaming). The session, titled “We Sneak into High Security Buildings and Get Paid for It”, will be presented by Michael Glasser, President, Glasser Security Group. He has two decades of experience providing security design strategic planning, implementation oversight, auditing and penetration testing. “Penetration testing determines whether people and systems are providing the protection you think they are,” says Glasser. Various system components should come together into a solution that works for the client. People, technology and architecture are all components of successful security systems. His motto: “Stop guessing and starting testing". Test-driving security systems “You can compare it to driving a car,” says Glasser. “You want to be sure the brakes work and the engine works, but then somebody has to test-drive the car.” Stop guessing and starting testing" The concept of penetration testing goes back to the Cold War, when the military had “Red Teams” and "Blue Teams”, competing squads that used their skills to imitate attack techniques enemies might use. More recently, the term “pen testing” has become common in the cybersecurity industry, often referring to “white hat” hackers that test the effectiveness of cybersecurity measures. Applying the concept to physical security in corporate America brings the concept full circle. “People think their controls work, but they realize they really need to see if it all works together,” says Glasser. Pen testing in corporate America “You can go to any military base or nuclear power site and you see pen testing,” says Glasser. “But often it doesn’t happen in corporate America.” Sometimes physical pen testing is approached as an extension of cybersecurity testing because addressing physical threats is an element in cybersecurity, too. “It’s the same service, except to make sure the physical house is in order,” says Glasser. Glasser’s session will be among the SIA Education@ISC East presentations scheduled at the education theaters on the show floor at ISC East, Nov. 20-21 at the Javits Center in New York. The process If you believe the movies, Glasser’s job is all fun and excitement, like a “bunch of kids having fun”. The reality is more mundane, he says. “People think it’s fun, but it’s work, not fun.” The process is front-loaded with weeks of research and surveillance to determine possible vulnerabilities before attempting a break-in. Research is based on threat modelling: What is a company worried about? Who is the bad guy? What do they want to do? What are the threats? The process is front-loaded with weeks of research and surveillance to determine possible vulnerabilities Among other tools, Glasser uses Open Source Intelligence (OINT), which is collection and analysis of information gathered from public, open sources, such as media, the Internet, public government data, etc. Glasser comes from a physical security industry family – both his mother and father were employed in the security industry – and he attended his first ISC East show in the 1990s when he was 11 years old. As a security consultant and security expert witness for more than 20 years, he has previously spoken at GSX and various ASIS International events.
Located in Milpitas, California, Jang Su Jang restaurant offers high quality, authentic Korean cuisine offering an extensive menu to satisfy even the pickiest taste buds. Their main goal is to provide delicious meals served with great service in a clean, modern and upscale environment. Jang Su Jang prides themselves by only using the freshest produce for their side dishes and quality meats for their BBQ, providing an excellence to the Jang Su Jang brand. Highly committed to creating an exceptional dining experience not only with great food, but through superior service and an attractive atmosphere, Jang Su Jang employees will always do their best to provide the highest level of Korean cuisine and customer service.The primary objectives of a security overhaul are to monitor staff and provide overall coverage of dining areas as well as entrances and exits Management acknowledges that security plays a crucial role influencing sustainability of operations. The primary objective of a security overhaul including maintenance with camera additions and upgrades will allow management to monitor staff, provide overall coverage of dining areas as well as entrances and exits. Solution by VIVOTEK VIVOTEK’s camera deployment was crucial to assist management in the day-to-day operations of the restaurant. Remotely monitoring employees, customer disputes, damage to customer property and car break-ins are all concerns upper management must address. Also, being able to monitor the main dining areas, assist hosts with seating and table occupancy and camera installations always provide security during non-business hours. Since 2015, management at Jang Su Jang restaurant have always wanted, at a security level, no blind spots left uncovered in the kitchen and dining areas. At the same time, it is critical to maintain the restaurant’s upscale design, making sure cameras are discrete but fully functional. The new video surveillance system features twelve VIVOTEK Network cameras including a 16-channel network video recorder, ND8401. A security overhaul will allow management to monitor staff, provide overall coverage of dining areas as well as entrances and exits Perfect fit for overall coverage FD816BA-HT 2 megapixel fixed dome network camera is equipped with a Full HD sensor enabling a viewing resolution of 1920x1080 at 30 fps. Featuring WDR Pro and Supreme Night Visibility technology, this camera can capture high quality and high visibility video in high contrast or low light environments.Armed with a removable IR-cut filter, VIVOTEK's solution can maintain optimal image quality around the clock As a professional day/night camera, the FD816BA-HT features a removable IR-cut filter as well as IR illuminators effective up to 30 meters for superior image quality around the clock making this camera a perfect fit for overall coverage of the main dining area. Following with the FE9191 H.265 fisheye network camera was used to cover the large banquet area. Covering 360° surrounding view, restaurant staff has no blind spots and can easily run the floor without having to constantly walk the area. The 12 megapixel camera guarantees superb image quality utilizing the latest in panomorph lens technology for 180°panoramic view (wall mount) or 360°surround view (ceiling/wall/floor mount). Armed with a removable IR-cut filter and WDR Enhancement technology, the camera can maintain optimal image quality around the clock for unparalleled visibility under high-contrast lighting environments. Jang Su Jang’s kitchen area was outfitted with FE8174V, VIVOTEK fisheye network camera featuring 5 megapixels.The restaurant uses VAST as the central management software designed to manage all surveillance products Finally, the FD8134 fixed dome network camera completed the deployment and was installed at various exits and entrances, hallways and the cash register area. Specifically designed for indoor applications with its compact and stylish exterior, FD8134 allows discrete surveillance by capturing high quality, high resolution video. In addition to completely outfitting the property in VIVOTEK cameras, the restaurant uses VAST as the central management software designed to manage all surveillance products. VAST allows owners to operate their business efficiently on premises or remotely. VIVOTEK's effective solution “When we originally started improving our security system, we chose VIVOTEK cameras and were continually impressed with the quality and reliability, we continued to do upgrades as new VIVOTEK equipment was released. Delicious, quality food is not our only priority; safety is also fundamental to our business. Our staff and customers well-being is of immense importance and helps our business operations run smoothly,” said Manager of Jang Su Jang restaurant Brian Chung.
Recent times have seen Saudi Arabia experience development at a remarkable rate, but key industry sectors have not always been able to keep pace. While certain industries grew by leaps and bounds (architecture, technology), others took longer to find their stride. Take, for instance, the retail industry; up until the early 2000s, Saudi Arabia was still new to the idea of North American shopping malls—most people still preferred shopping at traditional neighbourhood convenience stores. Arabian Centres: developer and operator One company single-handedly changed that: Arabian Centres. Founded in 2002 as a subsidiary of the Fawaz Alhokair Group, it is the developer and operator of 19 shopping centres in highly-populated cities, with over 1 million square metres of gross leasable area (GLA) under its management. This makes Arabian Centres the largest mall operator in the Kingdom. It has been an unprecedented change in the retail landscape of Saudi Arabia, and it shows no signs of stopping, with an additional 12 malls currently in development to help Arabian Centres reach its goal of 2 million GLA in the next 3 years. But just a few years prior, Arabian Centres was facing a significant challenge to its future operations: security compliance. Upgrading security systems In 2015, changes in local security laws required Arabian Centres to upgrade their security systems across all 19 shopping centres. Local security standards for video security in retail establishments increased, requiring higher image quality and performance. Arabian Centres needed to meet those new requirements quickly to ensure their centres were up to code in order to continue operations.Local security standards for video security increased, requiring higher image quality and performance Arabian Centres needed a partner that would not only help them satisfy applicable legal requirements, but also provide them with the hardware and software to meet their own personal standards of quality as a top-ranked market entity. Moreover, with 19 centres currently operational and more coming in the future, any security solutions they adopted would have to be scalable and versatile enough to meet a wide variety of unique scenarios. Upgrading to Avigilon Beginning in 2015, and continuing to the present day, the overall video security system of Arabian Centres has been upgraded to the Avigilon security solution. In the first phase of upgrades, Avigilon security solutions were installed in 12 of the 19 shopping centres; for phase two, the remaining seven centres will be upgraded with Avigilon solutions, with all areas expected to contain Avigilon solutions by 2018. Avigilon solutions that have been implemented: HD Dome Cameras – superior image resolution, self-learning video analytics and excellent low-light performance HD Pro Cameras – with up to 7K (30 MP) resolution, this camera line captures detailed images over vast areas and provides wide area coverage options Avigilon Control Center (ACC) Enterprise video management software – enhances the way security professionals interpret, manage and interact with high-definition security video Network Video Recorders (NVRs) – Avigilon NVRs include pre-installed ACC™ software, high-performance recording technology, and a three-year Avigilon warranty with dedicated support The Avigilon security solution provides higher image quality and performance at a lower cost of ownership As the new video security standard, each Arabian Centres mall features an average of 350 Avigilon cameras, including HD Dome and award-winning HD Pro cameras, network video recorders, and Avigilon Control Center™ video management software. The Avigilon security solution provides higher image quality and performance at a lower cost of ownership than previously installed systems. By utilising Avigilon 5K (16 MP) HD Pro cameras in their parking areas, it allows operators to cover the same area in greater detail with fewer cameras installed. With the adoption of Avigilon security solutions, Arabian Centres met all security compliance laws across Saudi Arabia. Avigilon cameras provide the image detail and quality that police required, and Arabian Centres passed their inspections without issue.
Located in the Capitol Hill neighbourhood of Seattle, the historic two-story brick and timber commercial building at 115 Belmont Street is surrounded by apartment complexes, coffee shops, and other commercial establishments. The building was renovated and upgraded in 2002 to make it more attractive to potential tenants. It is currently the home of a Seattle Goodwill® Industries store. Effect of graffiti on property value Retailers, shoppers, and residents in this area of Capitol Hill face a number of security challenges, including vandalism and theft. One of the most pressing issues is the problem of graffiti. The Belmont Street building was a prime target for graffiti vandals, known as “taggers.” The cost of graffiti cleanup is substantial and few perpetrators were being apprehended. Graffiti can also encourage a serious snowball effect as its initial appearance in a location may attract more graffiti and crime. This was the case with the Capitol Hill building. Retail sales were negatively impacted and the property’s value was jeopardised. Arecont megapixel solution Sequoyah Electric and Network Services provided the property owner with a solution to help resolve the recurring graffiti problem. By installing Arecont Vision® megapixel cameras, it was expected that the surveillance system would capture high resolution images of the taggers both during the day and at night, and provide the police with the evidence they needed to apprehend and prosecute the offenders. Five Arecont Vision® MegaDome® 2 vandal resistant 3 megapixel cameras were installed along with an ExacqVision video management system. Almost immediately, a tagger was caught on video defacing the building. The quality of the image allowed an identification to be made and the matter was handed over to the Seattle Police Department. After a few more taggers were caught on video, word quickly spread and the graffiti problem disappeared. Incidents of vandalism and theft were also captured by the Arecont Vision® megapixel cameras, and the detailed images provided the authorities with sufficient identification and forensic documentation for prosecution. The system was designed so that both the building owner and Sequoyah can remotely access live or recorded video with the ability to zoom in on footage for a closer look. A mobile app gives real time access as needed. The cameras are contained in environmental, vandal-proof housings and automatically switch from colour to black and white recording in the evening. Assisting authorities with suspect identification “The excellent resolution and frame rate of the Arecont Vision® cameras makes forensic review of the video evidence a snap. We are able to resolve facial detail and provide the authorities with quality images to assist with identification of suspects,” said Jon Tabler, Loss Prevention Systems Manager, Seattle Goodwill® Industries. Theft and vandalism may never be completely eliminated but with the Arecont Vision® megapixel cameras deployed with the exacqVision video surveillance software, the building owner and the authorities now have the tools to initiate prosecution while protecting people, property, and assets.
Trust – along with appearance – both play a key role in the world of exclusive watches and jewellery. This is the case for Meiller Jewellers in Schwandorf, Germany. This fifth-generation partnership offers exclusive watches, jewellery, and glasses from venerable, high-end, and contemporary brands and models. With their experience, exceptional service and extremely wide selection of both traditional and trendy products, the family-run company has captivated customers since 1876. Twenty employees advise customers and sell products, as well as ensure the high-quality maintenance and repair of watches and jewellery in the certified master workshop. The jewellery store’s range includes around 200 brands of watches, rings, necklaces, earrings and bracelets as well as eyewear, offering over 10,000 products in total. When it comes to video security, Meiller also relies on a modern solution and has installed ten MOBOTIX cameras in the store. The family-run company Meiller Jewellers has captivated customers since 1876 Analogue footage issues Up until now, the jeweller had been using an analogue security camera system, which was starting to show its age and no longer ran smoothly. In addition, the quality of the video images sometimes left much to be desired. "We are dealing with very small items here, such as earrings, and sometimes these were difficult to make out due to the low resolution of the analogue camera," explains Roland Meiller, owner of Meiller Jewellers. Roland Meiller decided to install a new video solution and called security consultant Norbert von Breidbach-Bürresheim, Managing Director at VALEO IT Neteye GmbH. Norbert packed the MOBOTIX cameras up and brought them to the store where he demonstrated the video systems for the jeweller. In addition, he made a number of test recordings and the customer was more than satisfied with the results. "The resolution of the video systems was very good, and the details were easy to make out – even in backlight situations," Meiller said. "The price of the solutions sealed the deal for us because you can really see the difference when it comes to the value for money the new indoor cameras offer. Another criterion was the design of the cameras. Their design is very discreet, making the cameras on the ceiling hardly noticeable." Cameras ready for use in 12 hours The ten cameras were to be installed outside opening hours, but since shops were allowed to open on the Sunday of the chosen weekend, which is not usually the case in Germany, VALEO IT Neteye began to remove the old analogue system on Saturday afternoon, directly after the store was closed. Afterwards, new network cables had to be installed in the ceiling since there were only analogue cables in place at the time. Finally, the new cameras were mounted. "The removal of the old cameras and installation of the new ones went incredibly smoothly and was finished within just 12 hours, so that we were able to re-open the shop on time for a bustling day of business that Sunday,” Meiller explained. “VALEO IT Neteye had already preconfigured the video equipment they brought, so the installation was especially fast." Meiller Jewellery offers exclusive watches, jewellery, and glasses from venerable, high-end, and contemporary brands and models Excellent image quality even in poor light conditions A total of nine c25 indoor cameras were installed at the entrance and on the ceiling over the sale tables. These are ideal for installation in ceilings due to their small diameter of just 12 centimetres and a weight of approximately 200 grams. Features include a light-sensitive sensor with 6MP Moonlight technology, a microSD memory card and the latest camera software. The integrated Lowlight Exposure Optimisation MxLEO facilitates high-contrast images without motion blurring, even in poorly lit surroundings. This allows the easy identification of people, as well as the details of individual watches or pieces of jewellery. In addition, the c25 is equipped with MxAnalytics video analysis tools that can be used, for example, to carry out people and object counting or display a heat map of high-traffic areas. "We do not use these functions yet, but we are thinking about doing so in the near future," says Meiller. In high-end shops, a highly visible video surveillance system is not always desired, since the customers usually place high value on discretion Cameras provide overview of the entire shop A p25 indoor camera was installed above the cashier’s area. It is equipped with a 6-megapixel Moonlight sensor, and is very light-sensitive. Due to the manual swivel and tilt functions, the camera offers high flexibility during installation. The camera features a telephoto lens and provides high-resolution 6-megapixel images in high detail. It is true that a highly visible video surveillance system may deter potential burglars or thieves by emphasising the danger of being identified and caught after the act. In high-end shops, however, this is not always desired, since the customers usually place high value on discretion. That is why a video-based solution should be as discreet as possible. "In a jewellery shop like ours, a video system is part of the basic kit, for insurance purposes for starters. The MOBOTIX cameras have an elegant design, so that at first sight, they aren’t even visible on the ceiling," says Meiller. Evaluation made easy in suspicious cases The MOBOTIX cameras are based on a decentralised concept. In this decentralised concept, each camera functions as a high-performance computer. Both data and image processing, as well as the encoding, are performed by the camera itself. The recording can be stored to the camera’s SD card at Meiller Jewellers and transferred to a network storage device. It is only viewed in concrete cases of suspicion. Compared to a centralised system, up to ten times more cameras per server can be connected this way. Furthermore, no additional computers or software are necessary. This is another key advantage, since the old analogue cameras required an expensive hard drive recorder. In the workshop separate from the store, there is a computer on which live feeds from the jewellery shop can be viewed. In this way, employees always know what is going on in the shop, while as a result, the jeweller has a video surveillance system that ideally ensures quick identification and arrest of the culprits in the case of theft or burglary.
Intrusion can be a complicated and expensive subject when looking to protect retail businesses. Each installation can come with various difficulties to overcome, whether this is aisles, display spaces, counters, furniture and more. Maximum protection in all areas Another consideration is that burglars can be creative when breaking in. To avoid detection, they can hide behind furniture, crawl across the floor or even stay close to walls or aisles, where there may be natural blind spots in the security system. Therefore, to ensure maximum protection in all areas, a multitude of detectors would need to be utilised to cover each angle the different obstacles create. This can be a very time-consuming and expensive exercise. So, what’s the solution for a cost-effective and efficient installation that provides maximum protection? Fit the Pyronix Octopus DQ and take a different approach to detection. Instead of fitting various detectors at varying angles to cover large or awkward areas, you can fit one and detect from above! Better intruder catch performance This ceiling mount quad infrared detector utilises advanced Pyronix technologies, with 360º coverage to provide complete peace of mind. With a quad-element passive infrared (PIR) sensor, the Octopus DQ has better intruder catch performance when compared with traditional dual element ceiling mount PIR sensors. While its simple clip in PCB, single screw fitting, selectable EOL resistors and walk test LED make the Octopus DQ fast to fit! A more cost effective and secure solution for any installation. With the Pyronix Octopus DQ, retail owners can have complete peace of mind that the security system is watching over their property.
Founded in 1977, Cea Point Industrial Co. Ltd. initially specialised in the manufacture of men’s trousers, later shifting its focus to producing licenced products for various brands. Currently, Cea Point is Taiwan’s only licenced manufacturer for the Italian business casual brand Pebbles, British golf apparel brand Wolsey, Japanese brand Simple Life and British swimwear brand Zoggs, all of which are prominent brands in department stores and shopping centres across Taiwan. To accommodate the increasing number of retail outlets for these brands and the related demands on business management, Cea Point, after comprehensive research and assessment, employed an advanced IP surveillance system and secure network structure plan. Following the installation of this system, the flexible deployment of network cameras and convenient, real-time management were achieved – the sum result was substantially elevated management efficiency. Managers can also engage in real-time communication with staff members to arrange support during busy periods Remote surveillance and real-time inspection management Deputy Manager Li Si-Xian of the Import Brand Business Division of Cea Point stated that as Simple Life’s stores are spread across Taiwan, the company decided to employ an IP surveillance system, thereby enabling real-time monitoring for all stores and the efficient remote management of store displays. Even when travelling overseas for business, managers can monitor the stores’ operations by connecting their smartphones to the Internet and accessing the remote surveillance system, ensuring that all staff members are at their designated positions and that the retail outlet is running at maximum efficiency. Managers can also engage in real-time communication with staff members to arrange support during busy periods or to adjust product displays, thus increasing customers’ satisfaction and improving flow arrangements in all stores. This not only enhances management efficiency but also saves the cost and time required for inspecting stores. It also creates a unified shopping experience for customers loyal to the brand; who can expect the same displays and store layout no matter which retail outlet they decide to shop at. FE8180 for wide-range surveillance As Simple Life stores are mainly located in shopping centres, stores are not subject to the same limits found at department store counters. For example, Simple Life has stores in Mitsui Outlet Park, E-DA Outlet Mall, and Miramar Entertainment Park. The display areas of Simple Life stores in these three locations are quite large and are primarily open-plan. With the assistance of VIVOTEK’s distributor Zero One Tech, Cea Point employed the stylish VIVOTEK FE8180 fisheye network camera. This high performance but low profile camera has a diameter of only 90mm, but is able to offer 5-megapixel sensors and 180° panoramic and 360° surround views. The camera’s resolution enables effective wide-range surveillance, decreasing the number of cameras needed The camera’s excellent resolution enables effective wide-range surveillance, offering a comprehensive view while decreasing the number of cameras needed and thus cutting procurement costs. The FE8180’s built-in WDR enhancement technology results in significant benefits for processing environments with complex light sources, thus eliminating interference caused by the many projection lights found in many retail stores. Further, the FE8180’s lightweight, miniature, and minimalistic design ensures simple installation and a seamless integration with the surrounding environment, meaning that the camera’s stand-out performance can blend into even the most fashion-conscious retail environment. Smart surveillance in the future Finally, Deputy Manager Li also stated that with the rapid advancement of technology, IP surveillance systems can now be integrated with smart devices. In the near future, smart analytic functions such as traffic statistics, hotspot analysis, and motion detection will be applied to combine management and business intelligence and to provide customers with a more comprehensive and real-time shopping experience while multiplying the benefits and opportunities for marketing.
Round table discussion
The role of video surveillance is expanding, driven by all the new ways that video – and data culled from video – can impact a business. As a growing population of video cameras expands into new fields of view, we asked this week’s Expert Panel Roundtable: What is the most unusual application of surveillance cameras you have seen recently?
Tools such as standard operating procedures (SOPs) and checklists ensure that every factor is considered when installing a physical security system – or do they? Security system installations are detailed projects, and any overlooked detail is a missed opportunity to make the system better. We asked this week’s Expert Panel Roundtable: What is the most overlooked factor when installing physical security systems?
Products are the building blocks of the security industry. Historically much of the industry’s sales effort has been focused on highlighting product features and functionality. At the end of the day, however, an end user is less interested in the performance of any individual system component than in the system as a whole. Lately, the industry has embraced a changing sales approach by emphasising systems rather than products. We asked this week’s Expert Panel Roundtable: What are the benefits of a transition from selling security products to selling security solutions?