Transportation security applications
LILIN announced that Aida traffic management solution will be released and unveiled at ISC West 2020. With the success of LILIN Aida number plate recognition (ANPR), LILIN Aida adds AI traffic management to Aida product line. LILIN Aida can be installed on the edge for traffic analysis where the metadata gets sent to remote Navigator Control Centre. LILIN Aida ANPR and traffic management can integrate with LILIN Navigator VMS products including Navigator Control Centre, Navigator Corporate, an...
As one of the most important provinces of Argentina, Buenos Aires Province has been seeking to improve work efficiency and emergency response speed of its police force. However, the local police was always lacking of evidence when performing legal actions towards violence, traffic accidents, and other social incidents. This created temporary loopholes in law enforcement that criminals and erring people took advantage of in order to escape legal sanctions. For this reason, the Ministry of Securi...
When you’re securing premises in Iceland, you need a reliable system that can cope with both plummeting temperatures and low-light levels. Hikvision cameras were used in such a solution – chosen by Securitas Iceland to secure a harbour for customer Samskip in Reykjavik. Global logistics company Samskip is one of the larger transport companies in Europe with offices in 24 countries in Europe, North and South America, Asia and Australia. They operate an extensive network of container...
Leon Medical Centers is a privately-owned healthcare organisation with seven state-of-the-art facilities serving over 46,000 elderly and Medicare patients in Miami and neighbouring communities in Dade County, Florida. Established in 1996 by Benjamin Leon Jr., Leon Medical Centers is one of the largest and most prestigious primary healthcare organisations in the state. However, what really sets it apart is its rigorously enforced service philosophy of ‘personal attention at all times&rsquo...
A video surveillance system with around 40 IP and thermal cameras from Dahua Technology has been installed at Yarmouth Harbour on the Isle of Wight. The harbour consists of a large marina, docks for the Wightlink Ferry terminal, and pontoons and boat moorings upstream. The previous system was becoming outdated, with poor picture quality and cabling issues. Following a number of thefts from boats and boat fires in neighbouring harbours, a new solution – including a thermal imaging capabili...
Recife’s urban trains system carries around 400 thousand passengers a day – it is the third largest railway operator in number of users in Brazil. To ensure a safe journey for passengers, it is imperative to increase the subway security with modern technologies and monitoring equipment. The main challenge was to adapt the technology to the specific conditions such as lighting, people flow and speed of a subway station while not interrupting the transportation service. Therefore, eas...
Motorola Solutions has agreed to acquire IndigoVision, a U.K.-based provider of end-to-end video security solutions. The boards of Motorola Solutions, its holding company and IndigoVision have reached an agreement on the terms of a recommended cash acquisition for approximately $37.2 million, representing a premium of approximately 116 percent based on the average share price over the most recent 12-month period. The acquisition will be funded by existing cash resources of Motorola Solutions and become final in May 2020. Motorola Solutions has a strong presence in the large and expanding area of video security since acquiring Avigilon in March 2018. Their product offerings include high-definition cameras, advanced video analytics, network video management hardware and software and access control solutions. IndigoVision is a developer of complete, end-to-end video security solutions from cameras to video recorders to body-worn cameras to security management software. Motorola Solutions says the IndigoVision range of products, global presence and customer base are "highly complementary" to Motorola Solutions' existing presence in video security. Among the benefits is enhanced geographical reach across a wider customer base. "The access we will now have to Motorola Solutions' range of innovative technologies will create new opportunities for IndigoVision and enable us to bring an exciting proposition to the market that allows us to further deliver on our goal of delivering safety, security and business intelligence," says Pedro Vasco Simoes, Chief Executive Officer of IndigoVision. "We share IndigoVision's commitment to providing next-generation, end-to-end video security solutions that enhance safety, security and efficiency," says John Kedzierski, Senior Vice President, Video Security Solutions, Motorola Solutions.
With just days left until the planned industry trade show, Reed Exhibitions has canceled ISC West over concerns about the COVID-19 coronavirus. Here is the statement on the decision: 'We at ISC West want to express our concern for everyone impacted by the COVID-19 coronavirus. Based on our close monitoring of ongoing developments with the virus, recent reports from public health officials and extensive consultation with our partners in the global security community, ISC West, scheduled to be held March 17-20, will now occur in July at the Sands Expo Center in Las Vegas. We take pride in offering vital business opportunities to our customers, including networking, education and access to new products and technologies, and commit ourselves to making July’s ISC West 2020 event live up to high standards. Over the coming weeks, along with ISC West’s Premier Sponsor SIA - we will continue to serve the industry, creating ways to connect, collaborate and keep our world moving during this difficult period.'
With growing concerns over the COVID-19 coronavirus, Motorola Solutions and its Avigilon brand have released a statement on their decision to pull out of this year's ISC West. The trade show, one of the biggest in the security industry, hosts over 30,000 security professionals and over 1000 exhibitors each year. The company states: "After careful consideration, we have withdrawn from this year’s ISC West trade show due to the widespread impact of the coronavirus." Official sources of updates "While ISC West is one important opportunity to demonstrate the power of Motorola Solutions' video security and analytics portfolio, the safety and well-being of our employees, customers and partners is our top priority. We are grateful to the ISC West organisers for their understanding and look forward to attending and supporting future ISC West events." ISC West will occur as scheduled March 17th through 20th, 2020, says Reed Exhibitions, despite the concerns. A statement from the show organisers is as follows: "While we regret that some companies have made the decision not to take part in ISC West 2020, we are focused on making ISC West 2020 a successful, safe, and enjoyable event for all attendees and exhibitors."
ISC West will occur as scheduled March 17th through 20th, 2020, says Reed Exhibitions. Following is a statement from show organisers: We take pride in offering vital business opportunities to our customers, including networking, education and access to new products and technologies and are working diligently to ensure ISC West 2020 and our other events live up to our high standards. While we regret that some companies have made the decision not to take part in ISC West 2020, we are focused on making ISC West 2020 a successful, safe, and enjoyable event for all attendees and exhibitors. Close Monitoring Over the last few weeks, Reed Exhibitions and our partners in ISC West have been closely monitoring the COVID-19 virus and its impact on members of the global security community. We are collaborating closely with the Sands Expo Center and local public health authorities and following local, state and federal public health guidelines, including those issued by the CDC. We have additional precautionary measures in place, including enhanced cleaning and sanitisation across all public areas and customer touchpoints in the show and we are constantly reviewing our health protection activities, public health messaging, hygiene and medical control measures with the aim of strengthening our COVID-19 response further in line with up to date public health advice and guidance, including that of the CDC. Health and Safety We will continue to provide updates on our website as we get closer to ISC West. The health and safety of our team members and guests is our utmost priority. Our policies and best practices are in close collaboration with our venue partner, Sands Expo Center. The Sands Emergency Management Team works closely with local officials and are taking appropriate steps to protect team members and guests as outlined by the Centers for Disease Control and Prevention (CDC) and the Southern Nevada Health District (SNHD). Sands is prepared to follow any additional protocols or guidance, as they are made available by the CDC or SNHD.
Rapiscan Systems RTT 110 is the first high-speed Computed Tomography Explosive Detection System (EDS) to be approved on TSA's Air Cargo Screening Technology List (ACSTL). This was achieved last month after a thorough testing process with the TSA and means that the RTT 110 will now undergo further field test activities which it must pass before it can be formally qualified. The RTT 110 has revolutionised the EDS market by providing exceptional performance at significantly lower cost of ownership. With its unique stationary gantry design and belt speed of 0.5m/s, the RTT 110 produces industry-leading high-resolution full volumetric 3D images at high speed, giving excellent security. Reliable and effective high-speed screening “We are very excited to be included on the ACSTL and the only approved CT EDS on the list”, said Mal Maginnis, President, Rapiscan Systems. “Our teams have worked extremely hard to create an exceptional product which we are all proud of. The technology has been designed to the highest quality to provide reliable and effective high-speed screening with many features ideally suited for the fast parcel industry and we are really pleased that our hard work is now being recognised”. By February 2021, all cargo shipments leaving, entering or travelling within the USA must be screened by a product included on the latest TSA’s Air Cargo Screening Technology List (ACSTL). The RTT 110 is the only EDS to be approved by the TSA and to be included on the ACSTL.
Cybersecurity services and Integrated Risk Management solutions provider SureCloud has announced that it has been accredited to provide Simulated Target Attack and Response (STAR) Intelligence-Led Penetration Testing services by the not-for-profit accreditation and certification body, CREST that represents the technical information security market. CREST developed the STAR framework to deliver intelligence-led cybersecurity testing, incorporating advanced penetration testing and threat intelligence services to more accurately replicate cybersecurity threats to critical assets. To meet CREST’s stringent requirements to secure STAR service provider status, SureCloud had to demonstrate its robust methodologies and sophisticated capabilities relating to the latest vulnerabilities and cybercrime techniques, as well as meeting government and risk management requirements. We have recognised their high professional service standards and the rigorous approach" Mitigating risks President of CREST, Ian Glover said, “SureCloud has been successfully assessed against our strict criteria for the supply of Simulated Target Attack and Response (STAR) Intelligence-Led Penetration Testing services. In accrediting SureCloud, we have recognised their high professional service standards and the rigorous approach they take in helping their customers mitigate risks and safeguard against advanced cyber-attacks. We congratulate them on this excellent achievement.” SureCloud’s VP of Cybersecurity, Mike Harrison, said, “The CREST STAR accreditation is a real testament to our capabilities as a business and it’s an important industry benchmark for delivering STAR intelligence-led penetration testing services. We’re proud to be amongst only 5% of UK penetration testing vendors that have been awarded this accreditation and are therefore able to offer STAR services in line with the high standards set by CREST. The fact we can deliver this excellent service through our vulnerability management platform means further value for our clients.” SureCloud’s Penetration Testing services have been CHECK approved since 2009 This accreditation reinforces the strong performance of the SureCloud team in undertaking Red-Team simulated Cyber Attack services for their clients. Techniques used are typically a blend of penetration testing, social engineering and physical breach attempts, with the overall aim being that organisations can prevent, detect and respond to the attack as if it were real. Crucially, this gives them a realistic overview for testing crisis management procedures, and how they might need to improve. Minimising risks of potential data breaches Given the complexity of these engagements, the standards you need to achieve a STAR accreditation are set exceptionally high, as it is imperative that the increasing number of organisations looking to undertake these engagements can understand who has the capability to deliver the highest quality service to them. SureCloud’s Penetration Testing services have been CHECK approved since 2009, and has been re-certified by the Payment Card Industry Security Standards Council (PCI SSC) as a PCI Approved Scanning Vendor (PCI ASV) for more than 10 years running. SureCloud is certified by internationally recognised ISO/ IEC 27001 for achieving operational excellence, minimising the risks of potential data breaches. SureCloud is also certified by Cyber Essentials Plus, complying with the requirements of the scheme, which focuses on technical control themes such as firewalls, secure configuration, user access control, malware protection and patch management.
Companies are following government guidance and getting as many people as possible working from home. Some companies will have resisted home working in the past, but I’m certain that the sceptics will find that people can be productive with the right tools no matter where they are. A temporary solution will become permanent. But getting it right means managing risk. Access is king In a typical office with an on-premise data centre, the IT department has complete control over network access, internal networks, data, and applications. The remote worker, on the other hand, is mobile. He or she can work from anywhere using a VPN. Until just recently this will have been from somewhere like a local coffee shop, possibly using a wireless network to access the company network and essential applications. CV-19 means that huge numbers of people are getting access to the same desktop and files, and collaborative communication toolsBut as we know, CV-19 means that huge numbers of people are getting access to the same desktop and files, applications and collaborative communication tools that they do on a regular basis from the office or on the train. Indeed, the new generation of video conferencing technologies come very close to providing an “almost there” feeling. Hackers lie in wait Hackers are waiting for a wrong move amongst the panic, and they will look for ways to compromise critical servers. Less than a month ago, we emerged from a period of chaos. For months hackers had been exploiting a vulnerability in VPN products from Pulse Secure, Fortinet, Palo Alto Networks, and Citrix. Patches were provided by vendors, and either companies applied the patch or withdrew remote access. As a result, the problem of attacks died back. But as companies race to get people working from home, they must ensure special care is taken to ensure the patches are done before switching VPNs on. That’s because remote desktop protocol (RDP) has been for the most part of 2019, and continues to be, the most important attack vector for ransomware. Managing a ransomware attack on top of everything else would certainly give you sleepless nights. As companies race to get people working from home, they must ensure special care is taken to ensure the patches are done before switching VPNs on Hackers are waiting for a wrong move amongst the panic, and they will look for ways to compromise critical serversExposing new services makes them also susceptible to denial of service attacks. Such attacks create large volumes of fake traffic to saturate the available capacity of the internet connection. They can also be used to attack the intricacies of the VPN protocol. A flow as little as 1Mbps can perturbate the VPN service and knock it offline. CIOs, therefore, need to acknowledge that introducing or extending home working broadens the attack surface. So now more than ever it’s vital to adapt risk models. You can’t roll out new services with an emphasis on access and usability and not consider security. You simply won’t survive otherwise. Social engineering Aside from securing VPNs, what else should CIO and CTOs be doing to ensure security? The first thing to do is to look at employee behaviour, starting with passwords. It’s highly recommended that strong password hygiene or some form of multi-factor authentication (MFA) is imposed. Best practice would be to get all employees to reset their passwords as they connect remotely and force them to choose a new password that complies with strong password complexity guidelines. As we know, people have a habit of reusing their passwords for one or more online services – services that might have fallen victim to a breach. Hackers will happily It’s highly recommended that strong password hygiene or some form of multi-factor authentication (MFA) is imposedleverage these breaches because it is such easy and rich pickings. Secondly, the inherent fear of the virus makes for perfect conditions for hackers. Sadly, a lot of phishing campaigns are already luring people in with the promise of important or breaking information on COVID-19. In the UK alone, coronavirus scams cost victims over £800,000 in February 2020. A staggering number that can only go up. That’s why CIOs need to remind everyone in the company of the risks of clickbait and comment spamming - the most popular and obvious bot techniques for infiltrating a network. Notorious hacking attempts And as any security specialist will tell you, some people have no ethics and will exploit the horrendous repercussions of CV-19. In January we saw just how unscrupulous hackers are when they started leveraging public fear of the virus to spread the notorious Emotet malware. Emotet, first detected in 2014, is a banking trojan that primarily spreads through ‘malspam’ and attempts to sneak into computers to steal sensitive and private information. In addition, in early February the Maze ransomware crippled more than 230 workstations of the New Jersey Medical Diagnostics Lab and when they refused to pay, the vicious attackers leaked 9.5GB or research data in an attempt to force negotiations. And in March, an elite hacking group tried to breach the World Health Organization (WHO). It was just one of the many attempts on WHO and healthcare organisations in general since the pandemic broke. We’ll see lots more opportunist attacks like this in the coming months. More speed less haste In March, an elite hacking group tried to breach the World Health Organization (WHO). It was just one of the many attempts on WHOFinally, we also have bots to contend with. We’ve yet to see reports of fake news content generated by machines, but we know there’s a high probability it will happen. Spambots are already creating pharmaceutical spam campaigns thriving on the buying behaviour of people in times of fear from infection. Using comment spamming – where comments are tactically placed in the comments following an update or news story - the bots take advantage of the popularity of the Google search term ‘Coronavirus’ to increase the visibility and ranking of sites and products in search results. There is clearly much for CIOs to think about, but it is possible to secure a network by applying some well thought through tactics. I believe it comes down to having a ‘more speed, less haste’ approach to rolling out, scaling up and integrating technologies for home working, but above all, it should be mixed with an employee education programme. As in reality, great technology and a coherent security strategy will never work if it is undermined by the poor practices of employees.
Morphean’s CEO, Rodrigue Zbinden, explores the benefits of hosted video surveillance and access control, and what the growing interest from the IT community might mean for the physical security sector. Digital transformation continues to have an impact on every industry. In the physical security sphere, traditional CCTV and access control systems that once sat outside the connected world, are being replaced by their intelligent, cloud-enabled equivalents. The tired stand-alone legacy solutions of the past are increasingly being overhauled in favour of the smarter, customisable and scalable digital versions of these technologies. The question then is this: does this represent a new horizon for the physical security industry, or is it an existential threat in the form of a land-grab from the IT sector? Digital transformation continues to have an impact on every industry As the tectonic plates, as represented by the physical security and IT industries, continue to converge, it is clear that the underlying responsibility for physical security systems will be questioned. Conscious of the rapidly growing adoption of IoT devices, such as a surveillance camera, and their connection to IT networks and hosted data centres, Morphean commissioned an independent survey into the attitudes and behaviours of 1000 IT decision makers across the UK and Europe. We wanted to gain a better understanding of purchasing intent for evolving security provision in the 2020s. Landscape Report: Hosted Security adoption in Europe Our results revealed that as many as 84% of IT managers are currently using, or considering using, cloud-based video surveillance (VSaaS) or access control (ACaaS) systems. This points to an appreciation of the convergence of the physical and cyber security realms, and a willingness to embrace the merging of physical devices, connected through the IoT, with existing IT and cloud infrastructure. Of those considering such solutions, nearly 8 in 10 respondents said that integration with existing platforms or emerging technologies would also accelerate VSaaS and ACaaS adoption. The growing confidence in cloud seems to translate into more positive purchasing intentions around hosted security solutions with 77% of IT managers reporting that physical security is not currently optimised and one in five identifying it as a priority for 2020. Of those considering hosted security solutions, 4 in 5 (79%) anticipate introducing them to their business within a year. Our survey also revealed that 36% of IT managers identified operational performance as a priority for improvement within the next year. When we consider the many aspects of operational performance, productivity will always be a key measure, and cloud facilitates leaner decision-making, being more adaptable to the changing business landscape as required. Business application: unlocking intelligence Cloud-enabled physical security has much potential beyond security Cloud-enabled physical security has much potential beyond security. The data collected by network cameras and other physical security devices, combined with other sources of intelligence, can be used for a multitude of different purposes. For example, real-time analysis of visitor numbers, gender and age demographic in a retail store could be cross-referenced with promotional campaigns to gauge effectiveness, or used to identify insights into customer behaviour patterns, such as hot and cold zones. The same platform might ‘learn’ to predict the behaviours that cause queue build-ups, and trigger alerts more readily to advise management that more till staff are needed. In the transportation industry, intelligent analytics can be used to improve operations across a small fleet of vehicles or an entire transport hub. Cameras and sensors can be integrated on board buses and trains to provide instant images and video footage to control centre personnel, while proactive intruder and loitering alarms employed at busy stations and depots, can deter suspected troublemakers before an incident occurs. People counting technology provides insights which can be used to increase or decrease security provision according to the amount of footfall, or to predict when additional turnstiles should be opened to more effectively manage queuing customers. The existential threat For the IT security professional already working with cloud systems and services, the growth in connected digital devices through the IoT is resulting in a growing appetite for physical security, such as network cameras, to enhance existing IT systems and assist business intelligence gathering. And, it is perhaps because of its digital DNA that the IT department is increasingly responsible for physical security purchasing decisions, a relationship historically managed by the fire and security professional who has been slow to adopt digital transformation practices and cloud-based business models. But we know there is an opportunity for the physical security provider because the IT manager who is well versed in computing protocols may have scant knowledge around maximising the full potential of physical security systems. The challenge is that IT will already have an existing relationship with their own IT solution providers, to whom they may naturally turn to help them with their physical security requirements. It is imperative, therefore, that the physical security provider of today becomes well versed in not only cybersecurity principles but is also able to speak the language of IT in order to successfully compete. The challenge is that IT will already have an existing relationship with their own IT solution providers Establishing partnerships One approach, given the nature of the shifting security landscape, is for IT and physical security vendors to unite in the delivery of a mutually beneficial and overarching solution. This would enable them to pull together their combined expertise to not only offer comprehensive protection of software and systems from a cybersecurity standpoint, but also take care of access control, perimeter protection, surveillance and all aspects of physical security too. For the IT manager, confident about the security of their cloud provision and committed to optimising physical security within their business, the bringing together of physical and cybersecurity solutions, provided by IT and physical security providers who speak the same language, can only be beneficial, enabling them to meet all of their security requirements. As the threat, both cyber and physical, continues to evolve, vendor partnerships and a joined up strategic approach could well prove to be the best line of defense for today’s businesses.
Artificial Intelligence. You’ve heard the words in just about every facet of our lives, just two words, and they’re quite possibly the most moving, life-changing words employed in everyday conversations. So what exactly is AI, who currently uses it and should be using it? What is AI? AI is a powerful way of collecting, qualifying and quantifying data toward a meaningful conclusion to help us reach decisions more quickly or automate processes which could be considered mundane or repetitive. AI in its previous state was known as “machine learning” or “machine processing” which has evolved into “deep learning” or, here in the present, Artificial Intelligence. AI as it applies to the security and surveillance industry provides us the ability to discover and process meaningful information more quickly than at any other time in modern history. Flashback - VCR tapes, blurred images, fast-forward, rewind and repeat. This process became digital, though continued to be very time-consuming. Today’s surveillance video management systems have automated many of these processes with features like “museum search” seeking an object removed from a camera view or “motion detection” to create alerts when objects move through a selected viewpoint. These features are often confused with AI, and are really supportive analytics of the Artificial Intelligence, not AI themselves. Machine Learning Fully appreciating AI means employment of a machine or series of machines to collect, process and produce information obtained from basic video features or analytics. What the machines learn depends on what is asked of them. The truth is, the only way the AI can become meaningful is if there is enough information learned to provide the results desired. If there isn’t enough info, then we must dig deeper for information or learn more, properly described as “deep-learning” AI. Translated, this means that we need to learn more on a deeper level in order to obtain the collaborative combined information necessary to produce the desired result. Deep learning AI Deep learning AI can afford us the ability to understand more about person characteristic traits & behaviors. Applying this information can then further be applied to understand how to interpret patterns of behavior with the end goal of predictable behavior. This prediction requires some degree of human interpretation so that we are able to position ourselves to disrupt patterns of negative behavior or simply look for persons of interest based on these patterns of behavior. These same patterns evolve into intelligence which over time increases the machine’s ability to more accurately predict patterns that could allow for actions to be taken as a result. This intelligence which is now actionable could translate to life safety such as stopping a production manufacturing process, if a person were to move into an area where they shouldn’t be which might put them in danger. Useful applications of intelligence Informative knowledge or intelligence gathered could be useful in retail applications as well by simply collecting traffic patterns as patrons enter a showroom. This is often displayed in the form of heat mapping of the most commonly traveled paths or determining choke points that detract from a shopper’s experience within the retail establishment. It could also mean relocating signage to more heavily traveled foot-paths to gain the highest possible exposure to communicating a sale or similar notice, perhaps lending itself to driving higher interest to a sale or product capability. Some of this signage or direction could even translate to increased revenues by realigning the customer engagement and purchasing points. Actionable Intelligence From a surveillance perspective, AI could be retranslated to actionable intelligence by providing behavioral data to allow law enforcement to engage individuals with malicious intent earlier, thus preventing crimes in whole or in part based on previously learned data. The data collection points now begin to depart from a more benign, passive role into an actionable role. As a result, new questions are being asked regarding the cameras intended purpose or role of its viewpoint such as detection, observation, recognition or identification. Detecting human presence By way of example, a camera or data collector may need to detect human presence, as well as positively identify who the person is. So the analytic trip line is crossed or motion box activated or counter-flow is detected which then creates an alert for a guard or observer to take action. Further up the food chain, a supervisor is also notified and the facial characteristics are captured. These remain camera analytics, but now we feed this collected facial information to a graphic processing unit (GPU) which could be employed to compare captured characteristics with pre-loaded facial characteristics. When the two sources are compared and a match produced, an alert could be generated which results in an intervention or other similar action with the effort of preventing a further action. This process- detect, disrupt, deter or detain could be considered life-saving by predictably displaying possible outcomes in advance of the intended actions. The next level is deep-learning AI which employs the same characteristics to determine where else within the CCTV ecosystem the individual may have been previously by comparatively analyzing other collected video data. This becomes deep-learning AI when the GPU machine is able to learn from user-tagged positive identification, which the machine learns and begins to further reprocess its own data to further understand where else the person of interest (POI) may have existed on the ecosystem and more correctly improve its own predictive capabilities, thus becoming faster at displaying alerts and better at the discovery of previously archived video data. The future In conclusion, the future of these “predictables” wholly rests in the hands of the purchasing end-user. Our job is to help everyone understand the capabilities and theirs is to continue to make the investment so that the research perpetuates upon itself. Just think where we’d be if purchasers didn’t invest in the smartphone?
Even though ISC West 2020 was cancelled, many of the product introductions planned for the trade show still happened. For example, physical security and secure identification company Identiv introduced the Hirsch Velocity Cirrus and MobilisID. Hirsch Velocity Cirrus is a cloud-based Access Control as a Service (ACaaS) solution. It is an optimal solution for both end-users and integrators, with lower upfront costs, reduced maintenance, enhanced portability, and the future-proof assurance of automatic security updates and feature sets. Smart mobile physical access control solution Identiv’s MobilisID is a smart mobile physical access control solution that uses Bluetooth and capacitive technologies to allow frictionless access to a controlled environment without the need to present a credential. We caught up with Jason Spielfogel, Identiv’s Director of Product Management, to discuss the new products and other topics. Q: How is Identiv positioned in the market as a whole? What philosophy drives your product offerings? What vertical markets do you target? Every customer needs every one of these components Spielfogel: Identiv provides a total solution. Our platforms provide access control hardware and software, video surveillance and analytics, door access readers, and ID credentials, both cards and mobile, for a variety of vertical markets: Federal government, state, local and education government agencies (SLED), healthcare, schools, banks/financial services, retail, airports and transportation, and infrastructure. Every customer needs every one of these components in every physical security deployment, and we ensure that all parts are working together at all times, even as technology continues to evolve. With that said, our philosophy is very customer-centric, and we position ourselves as a trusted partner. Our products and technology platform always strive to reflect and anticipate the environment our customers are facing, both in terms of technical requirements and functional capabilities. Q: How does the MobilisID system eliminate "friction?" Spielfogel: Identiv’s MobilisID eliminates the “friction” of access control by forgiving the user from presenting a physical credential to the reader. A simple wave of their hand over the MobilisID reader establishes a connection, and the reader reads their mobile device’s credential from the MobilisID app. No badge or access card to read, and no contact with the reader, makes this a frictionless access control experience. Administrative friction is also eliminated because there is no physical credential to issue or withdraw; it’s all done via the MobilisID Manager. Q: Discuss the advantages of Bluetooth over competing technologies. Bluetooth offers a blend of reliability and specificity Spielfogel: There are two primary competing technologies: WiFi and Near Field Communication (NFC). The problem with WiFi is that it’s not location-specific. In other words, the WiFi router can’t tell which door the user is near. NFC has the opposite problem in that it’s impossible to get credential reads unless the phone is presented within an inch or two of the reader. Bluetooth offers a blend of reliability and specificity to create frictionless access. Q: "Touchless" has always been a big selling point. Doesn't the coronavirus improve the outlook for these systems even more? Spielfogel: The coronavirus certainly highlights the value of frictionless access. But the vast majority of access systems today use proximity which was already touchless. But for systems using touchpads or contact-based credentialing, certainly frictionless is offering some alternatives that would help keep employees and visitors safer in the current climate. Q: How else might the current pandemic change the security market forever (i.e., more teleworking?) Spielfogel: Permanent changes are not likely, but it does force security directors to rethink how their employees interact physically with systems for both physical and logical access. As a result, we might see accelerated adoption of some emerging technologies, such as greater use of mobile logical access solutions, as well as frictionless physical access control. We’ve already seen an uptick in our smart card reader and token line and our Thursby enterprise and personal mobility offering during the coronavirus pandemic. Q: There are a lot of cloud systems in the access control space. How is your Cirrus cloud product different? Velocity already has all those features Spielfogel: Cirrus is different from many others in that it’s built on one of the most mature, feature-rich, secure physical access solutions available today – Hirsch hardware and Velocity Software. While many competitors are scrambling to add features to their relatively new ACaaS platforms, Velocity already has all those features. While they are building up their encryption capabilities and cybersecurity testing, we’ve already been doing that for two decades. We certainly have some more development ahead of us for Cirrus, but most of it is just surfacing features we already have into the Cirrus interface. Q: How do you guide customers as their needs change? Spielfogel: Whether users want solutions that are on-prem, in the cloud, or anything in between, Identiv’s full architecture ensures that customers can adopt and migrate to new solutions as they see fit. No two customers are alike, so providing the flexibility to gradually update or change systems is a real differentiator. Our competitors either want customers to jump all at once to the cloud or push to keep everything on-prem/legacy. CSOs and CISOs live in a different world: they've got it all to deal with. We're there with them across all of it, because that's the true reality.
HID Global is introducing a new “flagship” line of access control readers as successors to the iCLASS line. The new HID Signo readers will support 15 different credentialing formats and communicate using the latest NFC (near field communication), BLE (Bluetooth Low Energy) and OSDP (Open Supervised Device Protocol) standards. HID Global says the new readers will simplify integration to more secure and mobile credentials. HID Global has invested in a “future-proof” approach that both accommodates a variety of current market needs and can adapt to embrace new technologies as they come onto the market. The new line incorporates “all the hardware you need,” combining the capabilities of older generations of readers into a single product. Simplifying the choice of readers The new reader line seeks to simplify the choice of readers in a time when a variety of trends is complicating the access control market, from cloud systems to mobile access to identity management. “We are simplifying the way we bring our products to market, and baking it all into our readers,” says Harm Radstaak, HID Global Vice President and Managing Director. “If an installer takes a reader out of the box and mounts it on the wall, it just works.” We are simplifying the way we bring our products to market" In designing the product, HID sought feedback from channel partners, installers, consultants and end users on how the new readers would function. In addition, the company sought advice from architects on the design of the product. Aesthetics and industrial design elements were a priority because they ideally reflect the quality and “promise” of how the product will perform. Cybersecurity Cybersecurity is another emphasis. The readers store cryptographic keys and process cryptographic operations on certified EAL6+ secure element hardware, and custom authentication keys can be used for organisations who prefer that level of control. EAL6+ certification is a designation of the Evaluation Assurance Level of an IT product or system (the highest score is EAL7). Signo also includes a velocity checking feature designed to mitigate and thwart brute force attacks. “The new Signo line is a continuation of the journey we have been on,” says Radstaak. “It is the natural succession of what we have been doing for years, and it underlines our position in the market.” By natively supporting mobile credentials, the new product line reinforces HID’s commitment to mobile systems, which the company first brought to market in 2014. Signo readers also include Enhanced Contactless polling to support mobile credentials in Apple Wallet. Addressing standards Embracing the OSDP standard, which was created in 2008, also addresses the growing customer need for bi-directional, secure communications. There is built-in support for OSDP Secure Channel as well as legacy Wiegand communication for organisations seeking to transition. Signo incorporates support for most credential technologies globally, including Seos, credentials with HID’s Secure Identity Object, and a variety of 125kHz legacy technologies such as Indala and Prox. The flexibility and openness of Signo is a response to the acceleration of new technologies entering the access control market. “If you look at new technologies in general, our market has been slow in adopting them,” says Radstaak. “However, with new entrants in the market, new technologies, new device manufacturers and artificial intelligence (AI), I believe the market is adopting new technologies much faster than before. Users are much savvier.” The consumer Administrators will be able to remotely configure and diagnose readers Radstaak says he expects market adoption of the new readers will be fast. “Customers have been waiting for this platform,” he says. “This has been a tremendous investment for HID Global, and it underlines our position in the market with its open platform, simplicity and future-proofing. We are prepared for whatever comes next technology-wise.” With Signo readers, administrators will be able to remotely configure and diagnose readers as well as monitor status through a centrally managed and connected reader ecosystem. As a member of the FiRA Consortium, HID Global has advocated bringing new technology to market based on the “fine ranging” capabilities of ultra-wideband (UWB) technology, which has applications in detection of the precise location or presence of a connected device or object. It’s the kind of technology that Signo platform’s “future-proofing” approach is geared to accommodate. “As the capability unfolds, we will be there to adapt,” says Radstaak.
The U.S. Department of Homeland Security (DHS) will be participating at ISC West in a big way. Representatives of the federal department will be taking part in more education sessions this year, and the DHS tech-scouting team will be on hand to view the latest technologies on display at the show. Exhibitors – and anyone else at the show – are invited to the “DHS Town Hall” on March 19 (Thursday) at 3:30 p.m. in meeting room Galileo 1001. The aim is for DHS to engage with the technology community and provide guidance as industry innovation moves forward. In the face of growing operational demands and complex threats, the need for homeland security technology solutions continues to rise. The Department of Homeland (DHS) is seeking new ideas and partners to safeguard public trust, save lives, reduce risks, and protect the flow of commerce and goods for the community. They will share information about the department’s problem sets, capability needs and business opportunities for accelerating technology development to ensure they are keeping pace with the speed of innovation and complex threats. Speaking at ISC West DHS seeks to challenge industry partners to develop technology to enhance security operations across multiple end user missions. The DHS Science and Technology Directorate (S&T) and Cybersecurity and Infrastructure Security Agency (CISA) will jointly speak and exhibit at ISC West. Attendees can meet DHS professionals working in cyber security, critical infrastructure, resilience, aviation security, border and port operations, and first responder capabilities. Attendees are invited to visit the DHS exhibit booth #33040 in the Drones and Robotics Zone. The DHS Town Hall on Thursday, titled “Enhancing Security and Doing Business at the Speed of Life,” will be a “call to action” for show participants to help secure the future. DHS seeks to become more agile and to pursue new pathways to do business in a fast-moving world. Through strategic partnerships, DHS is mobilising the innovation community to safeguard the public trust. Security sessions DHS will also be participating in these sessions at ISC West, March 17-20 at the Sands Expo, Las Vegas, Nev: You Say It’s Going to Change the World? Tues., March 17, 9:45 a.m., Sands 302. Security relies on anticipating what comes next and staying a step ahead. How will 5G increase secure capabilities and reduce threats from bad actors? How will blockchain secure personal and financial identity and when will quantum computing render all encryption obsolete? How is DHS investing in counter-drones? How does AI change the security landscape? The New Federal Security Landscape – Are You Prepared? Wed., March 18, 1 p.m., Sands 302. The federal security landscape is evolving alongside the private sector. What are the new high-risk areas of concern and how are emerging threats (cyber, UAS) changing the way federal facilities are protected? How are these new risks balanced against traditional ones? How is the Interagency Security Committee (ISC) responding? DHS panelists will discuss. CISA Special Guest Speaker at SIA Interopfest. Wed., March 18, 4 p.m., Sands 701. Daryle Hernandez, Chief, Interagency Security Committee, DHS, Infrastructure Security Division, will provide insights to complement the technology interoperability demonstrations. Enhancing Security Through UAS Technology, A DHS Perspective. Thurs., March 19, 11:30 a.m., Venetian Ballroom. What is DHS doing today to prepare for a future of increased visualisation and automation? New questions are emerging around capabilities and vulnerabilities. Emerging technologies like AR, Next Gen Sensors, and UAS, provide the Department of Homeland Security (DHS) with tools to become more responsive and adaptive to new threats.
LAN airline, one of the most important airline companies in Latin America, is based in Lima, Peru. The airline company operates scheduled domestic and international services, controlling over seventy percent of the domestic market. Its main base and maintenance centre are located in Jorge Chávez International Airport, Lima, which is a significant transfer hub and aviation infrastructure of South America. The LAN airline deploys its surveillance system with Dahua solutions for its office and airplane maintenance centre, which plays a vital role to keep customers' airplanes flying safely. As what the customer specified, they want the centre covered to ensure a 100% regular management and operation. However, since it is located inside of Jorge Chávez International Airport, it brings along with a hassle as neither too many cables nor wireless antennas are allowed because it may generate electronic jamming. The Dahua 6C-series speed dome cameras can not only provide clear and crisp images, but also requires less output power AP mode wireless video transmission Under this circumstance, Dahua team suggested to use a hybrid solution — a combination of AP (access points) and wire transmission — wirelessly transmit the camera data to inter-connected sub-centres, and then cable-transmit to the control room. The ‘AP mode’ wireless video transmission system includes access points, feeders, PoE, antennas and power cables, allowing a 3.0km to 5.0km long-distance fast transmission with a wide angle, by which, the coverage is further expanded. High-quality images at low power consumption There are in total hundreds of network cameras and Dahua speed domes adopted, ranging from basic line-up to the Eco-Savvy series with versatile shapes such as domes and box cameras according to the actual surveillance surroundings. Take the Eco-Savvy camera series for example, the dome camera is able to provide high-quality image with much lower power consumption — saving up to 50% energy compared with similar products from other bidders. Moreover, the Dahua 6C-series speed dome cameras can not only provide clear and crisp images, but also requires less output power, lowering the power output of the airport. Over fifteen 16-channel PoE NVRs are applied, each with 384Mbps incoming bandwidth, rendering a smooth HD real-time preview and recording As for storage, over fifteen 16-channel PoE NVRs are applied, each with 384Mbps incoming bandwidth, rendering a smooth HD real-time preview and recording; and its PoE function simplifies installation and reduces signal interference. The NVR accommodates up to 16TB with 4 SATAs supported, ensuring a large volume 24/7 storage. Products deliver excellent performance “Actually, we have many bidders and the final reason that drives us to cooperate with Dahua is their outstanding product quality and service. We can see their professionalism in video surveillance and plus their sincerity makes us moved during the communication,” said Luis A. Gómez Cornejo, Supervisor of Electronic Security at LAN Perú. “The implementation went great, they deployed the system within quite a short time and the products are in very good performance.” “We feel super honoured to be involved in this case,” said William Zhou, Sales Director for Latin Americas at Dahua Technology. “In recent years, we are going vertical rather than providing simple and individual products. And this project deepened our insight and practical experience towards airport projects.”
The 9th BRICS Summit was successfully held in Xiamen, China from September 3rd-5th, 2017, where leaders of the five member-countries were in attendance. Building on its success in providing a comprehensive security solution for the G20 Hangzhou Summit in 2016, the 9th BRICS Summit was yet another accomplishment for Dahua. The 2017 BRICS Xiamen Summit demanded high-level protection for national leaders from Brazil, Russia, India, China, and South Africa. As Xiamen’s city centre is located on an island, the security system required comprehensive surveillance of all roads leading into the area, also known as the “Four Bridges and One Tunnel” network.Dahua provided 1723 bullet cameras, 379 PTZ cameras, 226 vehicle checkpoint cameras, 116 Face Recognition cameras, 10 mobile 4G PTZ cameras Protection through Dahua technology In addition to roads leading into the city, routes to and from the airport, hotels, and the Xiamen International Conference & Exhibition Center needed to be protected as well. A solution of this proportion would also require an advanced, automated, and centralised system to ensure efficient, coordinated responses. With its cutting-edge IP camera, video cloud, network storage, and transmission technologies, Dahua was up to the task of securing Xiamen and the BRICS venues. In total, Dahua provided 1723 bullet cameras, 379 PTZ cameras, 226 vehicle checkpoint cameras, 116 Face Recognition cameras, 10 mobile 4G PTZ cameras, and many other advanced Dahua products and services used in various areas of the city. The BRICS security command centre, administered by the Public Security Department of the Xiamen, was fitted with a Dahua visual emergency dispatch and command system. The centre’s large display wall was stitched together with Dahua edgeless HD LED panels, enabling a complete picture of all units under command center control during the meeting, greatly simplifying control and responses. The security system surrounding the Xiamen International Conference & Exhibition Center as well as the visual emergency dispatch and command system in the security command center both adopted a full range of Dahua video surveillance and display solutions. Dahua employed advanced technologies such as intelligent analysis and big data, to increase the efficiency of emergency command and management capabilities Live video security on the road A customised Dahua Mobile Solution with GPS positioning and in-vehicle wireless image transmission system was installed on 228 patrol cars and 72 special cars from the Xiamen Public Security Bureau, which was used to clear the way for Summit leaders. This provided the command centre with a continuous live overview of all areas while providing support for the handling of various emergencies. Dahua contributed to the security of other key areas including the Xiamen Airport, train station, ferry piers, and police checkpoints In order to secure “Four Bridges and One Tunnel” access points, Dahua employed advanced technologies such as intelligent analysis, big data, and video analytics to significantly increase the efficiency of emergency command and information technology management capabilities, providing uninterrupted HD video surveillance and smart road event monitoring on bridges and tunnels. In addition, Dahua also contributed to the security of other key areas including the Xiamen Airport, train station, ferry piers, and police checkpoints. In surrounding Haicang and Jimei districts, Dahua constructed video surveillance on routes and sites which held key activities in the city, achieving full coverage of places such as guarded routes, main roads, key sites, as well as surrounding areas and regions of elevated risk. Dahua securing public safety Dahua also played a role in safeguarding conference-related affairs such as catering, accommodation, and travel. The hotels in which leaders stayed in and surrounding areas were upgraded to HD systems in a short amount of time, making sure the leaders were secure while they rested during the Summit. The mobile law enforcement surveillance system assisted the Xiamen Market Supervision Commission in guaranteeing the provision of safe food during the Summit. The three day BRICS Summit concluded without a hitch. National leaders and their delegations were able to smoothly move about the city and attend the conference while Dahua products prevented threats through a vast network of smart video technologies. In addition, the large-scale project significantly upgraded Xiamen’s city surveillance system and provided a long-term foundation for not only public security-related operations, but also broader public projects such as the Xiamen Wireless Image Transmission System.
Manchester-Boston Regional Airport opened to serve the state of New Hampshire and the surrounding New England community in 1927, a little over two decades after the Wright brother’s first powered flight. Located three miles south of central Manchester, the Manchester-Boston Regional Airport is the fourth largest passenger and third largest cargo airport in New England. The airport is also the busiest in the state, qualifying under the Federal Aviation Administration (FAA) as a “small hub primary commercial service facility.” Airport redevelopment project The 1990’s brought a large redevelopment project to the airport, sparking more modern facilities, increased room for aircraft, and a range of new shops and restaurants. By 2012 it had become clear that the airport and its parking areas required enhanced surveillance. Increased foot traffic, manpower, and federal safety regulations resulted in the awarding of an FAA grant for a new surveillance system.Increased foot traffic, manpower, and federal safety regulations resulted in the awarding of an FAA grant for a new surveillance system The Manchester-Boston Regional Airport faced a lengthy decision-making process when it came to security camera manufacturers, requiring products able to support the unique applications and varied environment of the airport. The security team monitored a range of spaces both in and outdoors, and required products that excelled under all of these varying situations and lighting conditions. The selected cameras needed to provide full high-definition video across multiple open areas, while also delivering detailed, close-up images within busy, crowded spaces. The airport’s FAA grant included stipulations regarding the types of products that could be purchased with the supplied funds, specifying that the selected system must qualify under the “Buy American” standard. This provision meant that all potential selections not only meet the technical requirements, but also be Made in USA. Arecont Vision: foundation for security system After a year of exploring the market, the client determined that Arecont Vision was the only manufacturer that not only satisfied the “Buy American” stipulation, but did so without sacrificing the airport’s fundamental security requirements by providing a wide range of high resolution megapixel cameras.Arecont Vision was open in demonstrating its Made in USA product design, manufacturing, quality control, and support as part of the selection process Arecont Vision was open in demonstrating its Made in USA product design, manufacturing, quality control, and support as part of the selection process. Securadyne Systems was selected as the systems integrator. Extensive planning determined which Arecont Vision products to install, where to do so, and how the installation process would be accomplished. Once Manchester-Boston Regional Airport chose Arecont Vision cameras as the foundation for their security system, they began to collaborate with On-Net Surveillance Systems, Inc. (OnSSI) to supply the video management system (VMS). OnSSI is an Arecont Vision Technology Partner Program member, with many joint customers around the world, demonstrating proven integration between the two company’s products and support services. Arecont cameras chosen by airport security team The Arecont Vision SurroundVideo® multi-sensor camera series piqued the security team’s interest for its 180° panoramic capabilities. Passengers, staff, and aircraft crew move frequently and often swiftly from one location to another in varied lighting, yet all proved trackable with the SurroundVideo cameras and the OnSSI software. The placement of SurroundVideo cameras at the Manchester-Boston Regional Airport provides comprehensive coverage while reducing the number of cameras needed overall, a feat that was especially useful in large areas such as the airport’s apron. The security team chose cameras from the Arecont Vision MegaDome® series, which are equipped with a wide range of innovative features For locations that required a single coverage view, the security team chose cameras from the Arecont Vision MegaDome® series, which are equipped with a wide range of innovative features. Features such as low light capabilities and remote focus and zoom all proved crucial to the airport’s requirements. Casino Mode™ is available in the 1080p versions of the MegaDome series, a feature that proved to be as useful at the Manchester-Boston TSA checkpoints as it is in a Las Vegas casino. Casino Mode guarantees 30 frames per second to capture every detail on fast-action applications, an incredibly effective tool when investigating security situations involving many complex, small movements for both live and forensic viewing.Casino Mode guarantees 30 frames per second to capture every detail on fast-action applications for many complex, small movements in both live and forensic viewing Investigating criminal or worker concerns Manchester-Boston Regional Airport has installed over one hundred and fifty Arecont Vision cameras, and the video surveillance system is continuing to grow. The latest installation of Arecont Vision products included the lower level of a parking garage as well as a newly renovated passenger checkpoint area. When asked if there are any specific incidents in which Arecont Vision cameras proved useful, Mr. Mueller responded, “Every other day we use the cameras to investigate criminal or worker concerns. We go back and monitor them for possible safety issues on the ramps, for passenger interaction, and for worker interactions. Anytime someone expresses a concern to me, they can come in and we can watch the footage together. I try to make sure that the option to view footage is fairly transparent, which has proved very useful to everyone. "SurroundVideo 180° cameras were again utilised in the latter situation due to the client’s satisfaction with stitching together images from multiple 180°s." Paul Mueller, Manchester-Boston Regional Airport’s security manager, stated, “We were sure to go back to Arecont Vision during this process. We have had a good working relationship with them for the past five years, and they enable us to use less cameras while still maintaining full view of inspection areas.”Primary camera views are displayed and monitored all the time, while others can be pulled up and played back as issues arise Passport and ticket inspection made easy Arecont Vision cameras are monitored 24/7 in the airport’s communications centre. Primary views are displayed and monitored all the time, while others can be pulled up and played back as issues arise. The system also allows for particular divisions within the Manchester-Boston Regional Airport to monitor cameras that are applicable to their work, such as in the parking garage. In terms of responsiveness, Arecont Vision makes it a top priority. “We had an issue recently with the lack of detail in some of the views for when people were having their passports and tickets inspected by TSA employees,” Paul stated, “An Arecont Vision rep came out and agreed that we could improve images, so he pulled the cameras and re-installed a newer firmware version which allowed for finer adjustments, completely and efficiently solving our problem.” Arecont Vision prides itself in its relationship with clients such as Manchester-Boston Regional Airport and to its continued design and manufacturing of quality, innovative, and industry-leading cameras within the United States for customers to use worldwide.
From humble beginnings providing bus services along the New South Wales and Queensland coasts in Australia, Transit Systems has not only gone on to become one of Australia’s biggest public transport providers, but has also made significant inroads overseas, having purchased several bus routes from the First Group London, United Kingdom, in 2013. Employing over 2500 staff Australia-wide, Transit Systems operates from 26 depots and terminals, with a fleet of 500 buses and 40 ferries. When Quorum Security Systems were approached by the company to install an access control and surveillance system at their newest Sydney depot, they were able to develop a multi-faceted solution providing far more than just security. More than just security The Sydney-based security integrator Quorum Security Systems, twice named MOBOTIX dealer of the year in 2014 and 2015, are strong proponents of a consulting-based approach to design. "After a series of meetings and site visits, we created an extensive business case with the client, along with detailed ROIs. This was then developed into a totally bespoke system, which went far beyond security," explains Chris Pearson, Managing Director at Quorum Security Systems.It became clear that an integrated approach using IP surveillance cameras would best serve to improve services and cut costs "Surveillance is fast leaving behind its traditional role of securing premises against unlawful entry,” he adds, “moving increasingly into the spheres of risk mitigation, compliance monitoring and process management." Working to identify the core needs of Transit Systems, it became clear that an integrated approach using IP surveillance cameras, along with access control and fleet tracking technology, would best serve to improve services and cut costs, whilst offering a clear audit trail along the way. An integrated system MOBOTIX IP cameras were integrated with a sophisticated access control system incorporated with long-range RFID readers with prox-boosters to allow dual custody-tagging of either buses and drivers, or buses and routes. Armed with a wealth of fully traceable real-time information, Transit Systems were now able to streamline and enhance their business and operational processes, saving both time and money. Surveillance monitoring is ensuring that buses are refuelled before leaving the depot and that any vehicle damage is always reported, a comprehensive record of driver and vehicle movements is used for dispatching and scheduling purposes, and OH&S compliance is enforced, with the footage also serving as proof that due diligence has been carried out. In addition to this, payroll time and attendance has also been automated. Surveillance monitoring is ensuring that buses are refuelled before leaving the depot and that any vehicle damage is always reported The installation also doubles up as a PA system, which is essential for mustering on a dangerous goods site and also extremely useful communicating with staff over such a large area. Simple installation Easy to install and configure, with low power and network bandwidth consumption, the MOBOTIX cameras offered just the flexibility, functionality, and high image quality required to achieve effective coverage throughout the depot. The versatile mounting of the S15 camera, with its dual lenses each connected to a cable of up to 2 metres, means vehicles sitting in the fuelling bays or repair docks can be monitored from all sides. An M15 camera with a long-pass filter and ANPR (Automatic Number Plate Recognition) technology, records the number plate of every vehicle that leaves and enters the depot, and hands-free entry and exit both increases site security, safety of drivers and reduces manpower requirements. Furthermore, the cameras provide a fool proof real-time backup of all movements recorded by the access control system for auditing and compliance purposes. The cameras provide a fool proof real-time backup of all movements recorded by the access control system for auditing and compliance purposes A wireless solution The MOBOTIX decentralised concept makes this easy because the recordings are compressed and stored on the SD card inside the camera, so the bandwidth required to transfer the images to the NAS is very low. Indeed a MOBOTIX system can support up to 10 times more cameras per server compared with a centralised VMS-based recording system, requiring no additional computers. Retro-fitting such a large installation into the purpose-built depot was not without its challenges: "You’re talking about 2 foot thick concrete slabs in the bus bays throughout the whole depot. Cabling through the concrete was unfeasible from a financial and time point of view," Chris explains. "The MOBOTIX cameras were powered from existing poles inside the depot and we used a ubiquity Wi-Fi to transmit the footage back to the NAS." This innovative surveillance and access control system has enabled Transit Systems to monitor the behaviour of vehicles and people throughout the depot, bringing a significant increase in effectiveness, efficiency and safety. With Government funded bus routes incurring penalties for failing to meet on-time targets by at least 9%, this achievement promises further financial savings. Equally, because the video surveillance system footage provides protection against negligence claims by proving due diligence, expensive litigation proceedings can be avoided. The role of security is evolving and this example shows one of the many diverse ways in which security can be applied to modern business practices to make operations more efficient and economical.
Mirasys Video Management Solutions are being utilised in a number of transport projects which include ports, motorways, airports, trains and logistic centres. Each project needs a highly adaptive solution which adapts to changing requirements, technologies and regulations, and provides unlimited scalability and high reliability. Mirasys VMS increases efficiency The transportation sector provides a great example of how an intelligent video management system can increase the efficiency of activities, safety, and ensure smooth-running operations. Mirasys offers the possibility to increase productivity and savings with powerful connectivity to other systems. Mirasys VMS includes a number of intelligent features. Playback and powerful search tools identify incidents quickly and efficiently. The intuitive storyboard function helps in reporting events and incidents and high quality images can be used for evidence. Advanced motion detection and alarm event settings let you decide what you want to track; reducing operational costs and the number of false alarms. The ingenious use of cameras and analytics increases the flow of cargo, luggage and passenger traffic Mirasys Video Content Analytics Mirasys VCA (Video Content Analytics) provides full VCA functionality with object classification and enter / exit, direction, vehicle speed, stopping, dwell time, etc. filtering. The setup is versatile and supports, for example, different type of vehicle classification, zone definitions, entering directions and vehicle speed. You have plenty of different analytic alternatives available per camera. The object that is being analysed can have several different analysis rules active simultaneously. The ingenious use of cameras and analytics increases the flow of cargo, luggage and passenger traffic. You can, for example: Tighten platform security Improve crowd management Identify people and any unusual behaviour such as running Identify abandoned objects Manage queues and staffing level Control the number of vehicles in the area Vast integration possibilities With Mirasys and its endless integration possibilities, you can speed up the logistic centre’s functions, transport management efficiency, and ensure the undisturbed flow of cargo operations. The use of Mirasys integrations will increase the value of visual information captured by the system, and bring significant cost savings. The information from video images can be linked to the information received from other sensors, also enabling the utilisation of IoT (Internet of Things). Different organisations can use the same Mirasys system to manage their part of the surveillance and security, but each party has its own rights With Mirasys and its endless integration possibilities, you can speed up the logistic centre’s functionsWhen integrating a bar code reader with the video management system in a warehouse, the movements of each package can be searched and visualised. The images from cameras can be found immediately, which helps to determine the condition of the package at the time of entering and leaving the warehouse, and on which vehicle it is located. For each and every event, the system provides the exact time, visual information from a number of different cameras, and delivers event reports to specified recipients. This results in a clear decrease in the time spent in resolving customer complaints. Automatic number plate recognition With the Mirasys ANPR+ (Automatic Number Plate Recognition) application you can automate the management and guidance of the vehicles in a certain area. For example, based on the number plate information the system can advise: Which loading bridge the vehicle is assigned to, Which driving lane the vehicle is assigned to, Driving through automatic weight-in-motion (WIM) is needed, etc. The system can monitor the vehicle on its way in and out, film it from the side, top, front and back and is therefore a great solution for vehicle damage control. Using integration to the automatic weight-in-motion (WIM) function you can also ensure automatically that the amount and type of product loaded on the vehicle is correct. Automate operations with the ANPR+ Different organisations can use the same Mirasys system to manage their part of the surveillance and securityA forwarding company can book a space for its truck from a shipping company’s ticket selling system. When the truck arrives at the shipping company’s area, for example in a harbour, it is automatically measured, and if the measurements match the ticket, the truck is guided to the green lane. If the measurements deviate from the ticket data then the truck is guided to the ticket window lane. The measurement information will be sent automatically to the system optimising the ship loading. If a vehicle exceeds its allowed time to stay in one place, or deviation from the planned route of the vehicle is detected, the system will report an event. In harbours and airports different entities, such as Security, Police and Customs, need different information from the same system. Different organisations can use the same Mirasys system to manage their part of the surveillance and security, but each party has its own rights; simultaneous users are no problem. Information from different sources flows automatically between organisations, resulting in faster response times on investigations, and increasing the performance level considerably in handling the joint security issues. Decreased total cost of ownership Mirasys is an industry-recognised Video Management System provider. Limitless integration possibilities of the Mirasys VMS offer the freedom to build the system that serves your needs. Mirasys also gives you the freedom and possibility to connect several sites into one logical entity. The centrally managed Mirasys system allows you to add or remove cameras and servers, set users’ rights, manage live and recorded video and export evidence with a few simple clicks. The system can have centralised, de-centralised or mixed topology configurations.
German supermarket REWE Group's new full-range national warehouse covers 53,000 square metres and is situated in the north of Berlin. About 350 employees ensure that more than 355 REWE, nahkauf, Karstadt and Coop supermarkets — along with Hit self-service stores — are supplied with around 10,000 different items. The building is protected by a CLIQ® locking system which was planned and installed by the specialist security company Guett-Dern GmbH, based in Cologne. The flexible locking system challenge Supermarkets between Sassnitz and Jüterborg will be supplied optimally with goods by the new logistics centre, in which REWE invested around €60 million. Six days a week approximately 100 trucks transport fruit and vegetables, frozen foods and fresh foods such as milk, as well as the entire range of dry goods. More than €600 million invested in optimising logistics, as part of a logistics offensive for the whole of Germany, made this expansion necessary.The goal is to make processes faster, more effective and more efficient and ecologically sustainable The goal is to make processes faster, more effective and more efficient and ecologically sustainable. The REWE Group was founded in 1927 and has built eleven new warehouses as part of this project, and has modernised three more. The Oranienburg location is viewed as the pilot project for all of REWE Group's logistics centres. REWE Group’s specifications in terms of security were defined accordingly: Entrances to the logistics centre's buildings were to be equipped with electronic locks to enable them to be managed centrally and to integrate internal doors according to their requirements. A flexible locking system was to be incorporated to manage all access entitlements and locking hierarchies reliably according to individual responsibilities — meaning it must be tailored precisely to each individual. The CLIQ® solution The choice was made in favour of the mechatronic locking system CLIQ®, which was installed by security specialists and ASSA ABLOY partner Guett-Dern. The CLIQ® system integrates advanced microelectronics into mechanical locking cylinders and their corresponding keys. Locking cylinders and keys can thus communicate with one another without the need for wiring or a network. This means that access and locking are doubly secured: via mechanical locking and electronic identity. The installation of the intelligent mechatronic CLIQ® locking system thus provides the building with an optimal level of protection.The programmable keys and cylinders of the CLIQ® locking system from ASSA ABLOY fulfil REWE's requirements The programmable keys and cylinders of the CLIQ® locking system from ASSA ABLOY not only fulfil REWE's requirements, but also win thanks to their price–performance ratio. “CLIQ® is easy to use and program,” says Dirk Müller-Steinhausen, Head of Technology and Sales at Guett-Dern GmbH. “For instance, because system administrators do not have to visit each locking cylinder separately in order to change the batteries.” Power is supplied exclusively via a standard battery in the keys and programming keys. Encrypted communication with the cylinder also takes place in this way. Each CLIQ® key has an integrated chip inside, making it unique. Keys can be programmed individually for each user. “This means that we have control of our keys. With CLIQ®, we have great flexibility in the event that a key is lost or if we want to make any changes. "We can revoke the key's access entitlements by reprogramming individually the approximately 400 locking cylinders in use,” explains Marc Haverkamp, Project Manager for the REWE Logistics Centre in Oranienburg. At the same time, access authorisations can be enabled temporarily, including for workmen, cleaners and external service providers. To learn more about CLIQ please visit https://campaigns.assaabloyopeningsolutions.eu/cliq
Round table discussion
When a fire or other emergency occurs in a building or facility, first responders depend on every available resource to ensure a safe and orderly evacuation and response. One element in any response plan is the facility’s physical security systems, including access control, video surveillance and intrusion detection. How can these systems contribute to an orderly response to a chaotic situation? We asked this week’s Expert Panel Roundtable: What is the role of security systems in the event of a fire or other emergency evacuation?
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
The new year is several weeks old, so it is safe to say that many of our New Year resolutions have fallen by the wayside. Despite the limited success of our personal resolutions, the new year is a great time to take stock, look ahead, and plan to make 2020 the best year yet. Thinking about our industry as a whole, we asked this week’s Expert Panel Roundtable: What should be the security industry’s “New Year’s resolution?”
RFID and smartphone readers in physical access controlDownload
Access control & intelligent vehicle screeningDownload
How plate reader technology increases your perimeter securityDownload
Genetec to host its first virtual tradeshow Connect’DX 2020 to connect with physical security professionals