Transportation security applications
The cloud-based access control and video management system was recently installed at the city’s marina where it has integrated with their booking system, Harba. Harba booking system There are 750 members with boats in the Vejle marina, and through the Harba booking system; they are issued a 6-digit personal PIN code or a tag. With this PIN code, they can then access and use the facilities of the marina, such as the toilets, showers, laundry rooms, and kitchen. The PIN is inputted into t...
Dahua Technology, a globally renowned video-centric smart IoT solutions and service provider, will hold its 2nd online Dahua Technology Partner Day, from October 13 - 14, 2021, with the theme - ‘Building a digital future’. Dahua Technology Partner Day Adhering to its strategy of open cooperation, Dahua Technology is committed to creating a win-win ecosystem, with major technology partners around the world. This year, Dahua Technology will join hands with its 22 global partners, in...
Founded in 2010, Avolon is the third-largest aircraft leasing company in the world with 824 aircraft and 145 customers in 62 countries. Its new global headquarters in Dublin is comprised of 6,967 sq m (75,000 sq ft) of secure office space across six floors that houses its IT, catering, legal, and communications departments. Need for a centralised monitoring solution Avolon’s new premises in the upmarket Ballsbridge area of Dublin provided an opportunity for the company to rethink its app...
As the need for counter terrorist devices grew, Delta Scientific Corporation (Delta Scientific) answered the call and began building and crash testing barriers that would stop an attacking vehicle, allowing no infiltration to the premises. Over the years, Delta Scientific has designed, patented and crash tested numerous barriers, to meet the needs of specific government agencies and facilities. Collaboration with US agencies Over the last few decades, Delta Scientific has worked with many bran...
The Spitalfields Estate in East London uses Genetec Security Centre to modernise CCTV security and build a platform for future service innovation. Business challenge The Spitalfields Estate is a 1.9m ft2, mixed-use development in East London managed by CBRE. It includes corporate offices, retail and residential units, public spaces, and a market independent of its famous neighbour, the Old Spitalfields market. The estate has 16,000 tenants and runs several cultural and entertainment events to...
From airports to embassies, from warehouses to depots, Delta crash-rated gates stop unauthorised pedestrians and vehicles from entering places that they don't belong. Some models operate without contact with the ground across the opening, one is a manually operated swing gate and others operate with rack and pinion drives across V-groove wheel ground tracks while incorporating IR safety beam and safety edges. Swing versions are also available. The clear openings range from 12 to 30 feet (3,657...
Scenario: One needs to install a camera in the lobby of a building to capture the entrance area. Problem: The area has a lot of windows which overexposes the image, making it difficult to capture the people coming in and out of the premises. Solution: A security camera with a good Wide Dynamic Range (WDR). What WDR does? Dynamic range refers to the ratio between the largest and smallest measurable quantities of something. In the case of video surveillance, the dynamic range measures the ratio between the lightest and darkest elements of the image. WDR technology is great for high contrast scenes, balancing the brightness and shaded areas simultaneously so an image neither appears blown out or too dark. IHS defines WDR at 60 dB or greater, though it’s not uncommon to see WDR cameras with capabilities of 120 dB or more Decibels (dB) are the value with which dynamic range is measured. IHS defines WDR at 60 dB or greater, though it’s not uncommon to see WDR cameras with capabilities of 120 dB or more. However, keep in mind that each manufacturer has its own method of determining a camera’s dB. Therefore, when comparing product datasheets, it is possible that a camera with a lower ratio outperforms a competitor with a higher dB ratio. How WDR works? Security cameras with WDR technology (e.g. Dahua HDCVI 6.0 PLUS) are using either Digital WDR (DWDR) or True WDR. True WDR uses image sensors and a Digital Signal Processor (DSP) to provide even illumination to all areas of an image. A True WDR-enabled video surveillance camera has sensors that take two scans of each video frame. The first, at low speed (to capture more light), shows the image in normal light conditions. The second scan is taken at high speed to capture less light overall and get an image with strong light in the background. The DSP combines the two scans to form a single, balanced, well-illuminated image. DWDR uses algorithms instead of sensors to digitally brighten too-dark areas and dim too-bright areas. DWDR relies on the DSP chip instead of the image sensor to provide WDR. It adjusts each individual pixel of the image and calculates exposure accordingly. This technique has some limitations: the intense manipulation of pixels leads to the overall image being grainier. On the other hand, DWDR doesn’t need costly image sensors, so DWDR can be a more economical option when WDR is a necessity. When one doesn’t have WDR? Backlight Compensation (BLC) brightens the image so one can see darker details better There are two options for improving the exposure of an image without using WDR. In a high-contrast scene with heavy, broad, backlighting, the camera will adjust to the average illumination, which will darken the image. If no WDR is available, Backlight Compensation (BLC) brightens the image so one can see darker details better. BLC is a legacy technique that uses DSPs to increase the level of exposure for the entire image. Rather than balancing brightness on overexposed and underexposed areas of an image like WDR does, it brightens the entire image. Highlight Compensation (HLC) is a technology where image sensors detect strong light within the image and reduce exposure on those areas to enhance the overall image quality. In a dimly lit scene with bright lighting caused by hot spots (e.g. headlights, street lights), the overall image may become too dark. If no WDR is available, use HLC. The camera automatically suppresses bright light sources, allowing proper exposure of adjacent areas. Conclusion Regardless of the dB value specified, image results will vary depending on the complexity and amount of movement in a scene. To determine the best camera for an application, it is always best to test that it meets the needs and expectations of the customer.
A time attendance system can help to keep a close eye on an employee’s working hours, prevent time theft by accurately tracking and recording employees’ time and attendance. A biometric time attendance system allows employees to clock in quickly and easier compare to the standard system and eliminate “buddy punching” in advance to the traditional time card system. A complete biometric time attendance system includes both hardware and software. Include the electronic divide that scans an employee’s fingerprint or iris and software that stores all the data about time and shifts. Hardware and software can be purchased separately, but it’s best to find a vendor that provides both of them as a complete package. Price of the biometric software Small companies can purchase a basic system that includes hardware and software for about $1,000 to $1,500 Biometric time and attendance systems aren’t as expensive as one might think. Small companies can purchase a basic system that includes hardware and software for about $1,000 to $1,500. Some companies' solution, which works for companies with up to 50 employees, retails for $995 to $1,300. The price includes one fingerprint scanner and software that tracks arrivals and departures, calculates hours for payroll, and tracks vacation time and sick days. Large corporations with many hundreds or thousands of employees should expect to spend at least $10,000 on a biometric time and attendance system. For a complex system serving thousands of employees and multiple locations, the cost could rise as high as $100,000. In addition to a basic software and hardware package, one may need to purchase additional features, services, or accessories. Additional biometric scanners begin at about $1,000 to $1,300 each. Training begins at about $300 to $500 for smaller businesses and can run thousands for larger companies. Accessories like scanner covers, which protect the equipment when it is not in use, begin at about $30 to $50 each. CrossChex Cloud CrossChex Cloud's features include face recognition attendance, temperature, and mask identification Because there are so many options, it helps to talk to vendors about the products they provide. Some will charge an upfront fee for a set number of traditional software licenses; others will charge a monthly fee for web-hosted software. Although the market and advanced technology decrease the price of time and attendance system, some small companies or workshops still can’t afford extra spend besides salaries. Anviz introduces a new solution for those business owners - CrossChex Cloud. One can set up a new account and get only one hardware connected to be a lifetime free subscriber of CrossChex Cloud. Start at $500 only, one can get hardware that is suitable for CrossChex Cloud with advanced features includes: face recognition attendance, temperature, and mask identification, and get records of almost everything one wants to take control of.
From asphalt to apps, Bosch has implemented a connected security solution for the Frechen truck stop near the A1 to protect people and freight from assaults. The modern parking area near Cologne now has around 40 parking spaces that meet the high-security standards of the Transported Asset Protection Association’s (TAPA) according to the Level 2 certificate and are therefore particularly secured. From now on, forwarding companies can book these via the Bosch Secure Truck Parking app. The fully connected solution ensures maximum security: more than 20 security cameras with intelligent video analytics by Bosch monitor the four-gated entrances and exits as well as the parking area. In addition, a pedestrian interlock ensures that only authorised persons can enter the area. The reason for this solution is a shortage of some 400.000 secured truck parking spaces in Europe. This has serious consequences for the safety of drivers, goods manufacturers, freight forwarders as well as other road users, as trucks often have to park in an unsafe manner contrary to traffic regulations. Secure truck parking "The truck parking shortage along German roads is, unfortunately, a daily occurrence. Everyone has seen the lines of unsafely parked trucks along the highways. The fact that thieves, in particular, take advantage of the precarious situation is felt by companies like us that transport goods throughout Europe," explains Rein de Vries, Senior Manager Security from Samsung SDS. In close coordination with Samsung SDS, Bosch has developed the solution that has now been implemented. "Secured truck parking lots, just like the one in Frechen, are important for our transport of goods. That's why we were happy to contribute with our know-how and experience to this project." A loss of 8.2 billion a year With AI-based video analytics, the security cameras immediately detect risks, unwanted movements and sound A recent study by TAPA illustrates the urgency of the situation: The organisation estimates the financial damage caused by stolen freight across Europe at around 8.2 billion euros annually. Alongside the United Kingdom, Germany is one of the countries most affected by cargo theft. Thieves usually take advantage of the situation at night, when the truck is parked unprotected and the driver is asleep. Consumer goods or car parts are among the most sought-after goods, as are jewelry, precious metals, or food products. Bundled know-how "On behalf of the site operator, we acted as general contractor to implement a certified complete solution for the Frechen truck stop that protects drivers and freight alike," explains Uwe B. Herrmann, project manager at Bosch Building Technologies. "The parking lot is now securely enclosed, gated, illuminated in a way that saves energy and equipped with intelligent technology." AI ensures safety and comfort With the help of AI-based video analytics, the security cameras immediately detect risks and unwanted movements and sound the alarm at the Bosch video control centre. Audio technology built-in video cameras allow control center staff to immediately contact people on the premises and notify security forces or police if necessary. Regular virtual guard tours round off the security concept. Booking parking spaces also work efficiently and digitally: Parking spaces can be booked via the Bosch Secure Truck Parking web portal or app. Truck drivers can pass through the barrier and drive onto the premises with digital license plate recognition.
Heras, an end-to-end supplier of permanent and mobile perimeter protection solutions – has launched Saros, a new electro-mechanical traffic barrier. Reliable and affordable barrier Suitable for sites with controlled vehicle entry (such as commercial car parks and industrial site entrances), Saros is a best-in-class product that has been designed and developed by Heras to meet all market-led functionality and safety requirements and thus offers a highly functional, reliable, and affordable barrier option. Suitable for harsh conditions Saros can withstand harsh external conditions, making it especially suitable for coastal regions or prone to strong winds Saros can withstand harsh external conditions, making it especially suitable for areas such as coastal regions or other places that are prone to strong winds, as rigorous testing, analysis, and calculations have confirmed. The 4m model - even with the arm in a raised position - can withstand wind class 3, which is categorised as a violent storm with wind speeds more than 70mph. And, the 6m version can withstand wind class 2, which is categorised as a storm with wind speeds approaching 60mph. Fast and efficient barrier Saros is an electro-mechanical barrier with a fast and efficient operation, making it a great addition to the current offering of electro-hydraulic traffic barriers B411, B420, and 94x Series. This further adds to the portfolio of entrance control products manufactured and produced by Heras, which has its UK head office in Doncaster. Plug and play solution Heras Product Manager Jonathan Broughton said that the Saros traffic control system has demonstrable longevity, operating reliably over long periods, meaning there is no limitation to the number of operations it can perform. This makes it an ideal barrier for busy locations. Also complying with the latest safety standards, the barrier can provide a plug-and-play solution that is safe, robust, and reliable. Integrated systems “Saros is a unique product to Heras and was developed after extensive research, investigation, design, development, and testing. The product came alive because of the work of Heras’ own Product and Development department.” The introduction of Saros further strengthens the company’s product offering across its five core areas of expertise: demarcation products, entrance control products, detection products, integrated systems, and service and maintenance. Perimeter protection solutions Heras is constantly innovating – both in terms of its existing product ranges and also bringing new developments to market to provide a holistic portfolio of perimeter protection solutions, and Saros marks another step forward for the company and comes hot on the heels of its launch of the next generation of perimeter intrusion detection systems (PIDs). Simplified portfolio Heras has built on the first generation of PIDs with significant innovations that have resulted in a new, simplified portfolio Heras has built on the first generation of PIDs with significant innovations that have resulted in a new, simplified portfolio with next-generation capabilities to provide even greater levels of perimeter protection. They can be used on sites with specific security and perimeter protection requirements – such as warehouses and distribution centres with high-value stockholding. Increases effectiveness Its new GeoMic and GeoPoint systems, which both have pro versions are designed to complement and greatly increase the overall effectiveness of both existing and newly specified perimeter protection fence and gate lines.
The Boson® camera core represents the best in FLIR high-performance uncooled thermal imaging technology within a small, lightweight, and low-power package, and FLIR partners and customers will have the option to purchase radiometric versions that can capture the temperature data of every pixel in the scene. Camera configurations The new Boson radiometric camera core comes in two versions, 640 x 512 or 320 x 256 resolutions with multiple lens configurations and the ability to capture temperature data for quantitative assessment. The camera core is meant for use in systems across a variety of applications including firefighting, surveillance, security, unmanned systems, industrial inspection, and fixed-asset monitoring. Assessing temperature accuracy The Boson SDK feature provides guidance across five confidence grades offering in-the-moment assessment Featuring radiometric accuracy provides ±5 °C (±8 °F) or ±5% temperature measurement accuracy, the Boson Radiometric cameras include a Spot Meter Accuracy software feature that provides an assessment of how accurate a given temperature measurement appears in the scene. Available as telemetry data accessed through the Boson SDK or the Boson graphical user interface (GUI), this feature provides guidance across five confidence grades offering in-the-moment assessment to help improve temperature measurement confidence. Spot meter accuracy In addition, the Spot Meter Accuracy software feature gives operators the ability to account for dynamic ambient temperatures, along with the ability to configure measurements prior to operation, including adjusting emissivity and thermal gain settings. These functions are crucial for outdoor environments and the swift movements of unmanned aerial drones and automated ground vehicles. The software also offers inspection and assessment features, including spot meters and windows that pinpoint temperature measurement in the scene that the camera is focused on, and atmospheric correction capabilities during post-processing analysis. 40 years of thermal imaging expertise The Boson family of thermal imaging cores is an important part of the 40 plus years of thermal imaging expertise that FLIR offers. As a result of this expertise, the Boson thermal imaging cores utilise a high sensitivity 12-micron pixel pitch detector that provides high-resolution thermal imaging in a small, low-power, lightweight, and turnkey package. All Boson cores feature FLIR infrared video processing architecture, noise reduction filters, and local-area contrast. The imaging processing capabilities accommodate industry-standard communication interfaces, including visible CMOS and USB.
Body temperature measurement, detection of face masks and the counting of visitor flows - Geutebrück has expanded its portfolio to enable the retail trade, public authorities and operators of public transport and industry to adjust their protective measures to the current situation. Without having to resort to biometric data, the intelligent and highly available video security systems process images in real time. This way, both customers and personnel are being protected, and compliance with official regulations or prescribed hygiene measures is being controlled and documented. Contactless measurement of body temperature When measuring body temperature people are automatically screened. Fields of application are where many people come together, e.g. in companies, manufacturing plants, train stations, at airports, in public or private institutions. The automated face mask detection verifies compliance with such precautions and can - when connected to an access control system - allow or block entry to a building. Suitable for any facility with public access. Visitor management for restricting number of visitors Visitor counting and routing is of particular interest to shop owners, who need to ensure that the number of customers in their premises is kept below the maximum. As with all Geutebrück solutions, the most recent developments are GDPR-compliant and protect the privacy and personal rights of all those involved. "Our clients are facing unknown challenges in the current situation. Our solutions can help in many fields to overcome such challenges by means of visualisation and automatisation - yet without reaching capacity limits", says Christine Heger-Essig, Chief Technology Officer.
How AI and humans can work together is a longstanding debate. As society progresses technologically, there’s always the worry of robots taking over jobs. Self-checkout tills, automated factory machines, and video analytics are all improving efficiency and productivity, but they can still work in tandem with humans, and in most cases, they need to. Video analytics in particular is one impressively intelligent piece of technology that security guards can utilise. How can video analytics help with certain security scenarios? Video analytics tools Before video analytics or even CCTV in general, if a child went missing in a shopping centre, we could only rely on humans. Take a crowded Saturday shopping centre, a complex one with a multitude of shops and eateries, you’d have to alert the security personnel, rely on a tannoy and search party, and hope for a lockdown to find a lost or kidnapped child. With video analytics, how would this scenario play out? It’s pretty mind-blowing. As soon as security is alerted, they can work with the video analytics tools to instruct it precisely With the same scenario, you now have the help of many different cameras, but then there’s the task of searching through all the CCTV resources and footage. That’s where complex search functions come in. As soon as security is alerted, they can work with the video analytics tools to instruct it precisely on what footage to narrow down, and there’s a lot of filters and functions to use. Expected movement direction For instance, they can tick a ‘human’ field, so the AI can track and filter out vehicles, objects etc., and then they can input height, clothing colours, time the child went missing, and last known location. There’s a complex event to check too, under ‘child kidnap’. For a more accurate search, security guards can then add in a searching criterion by drawing the child’s expected movement direction using a visual query function. A unique function like this enables visual criteria-based searches rather than text-based ones. The tech will then narrow down to the images/videos showing the criteria they’ve inputted, showing the object/child that matches the data and filter input. Detecting facial data There are illegal demonstrations and troublesome interferences that police have to deal with A white-list face recognition function is then used to track the child’s route which means the AI can detect facial data that has not been previously saved in the database, allowing it to track the route of a target entity, all in real time. Then, security guards can confirm the child’s route and current location. All up-to-date info can then be transferred to an onsite guard’s mobile phone for them to confirm the missing child’s movement route, face, and current location, helping to find them as quickly as possible. Often, there are illegal demonstrations and troublesome interferences that police have to deal with. Video analytics and surveillance can not only capture these, but they can be used to predict when they may happen, providing a more efficient process in dealing with these types of situations and gathering resources. Event processing functions Picture a public square with a number of entries into the main area, and at each entry point or path, there is CCTV. Those in the control room can set two events for each camera: a grouping event and a path-passing event. These are pretty self-explanatory. A grouping event covers images of seeing people gathering in close proximity and a path-passing event will show when people are passing through or entering. The video analytics tool can look out for large gatherings and increased footfall to alert security By setting these two events, the video analytics tool can look out for large gatherings and increased footfall to alert security or whoever is monitoring to be cautious of protests, demonstrations or any commotion. Using complex event processing functions, over-detection of alarms can also be prevented, especially if there’s a busy day with many passing through. Reducing false alarms By combining the two events, that filters down the triggers for alarms for better accuracy to predict certain situations, like a demonstration. The AI can also be set to only trigger an alarm when the two events are happening simultaneously on all the cameras of each entry to reduce false alarms. There are so many situations and events that video analytics can be programmed to monitor. You can tick fields to monitor any objects that have appeared, disappeared, or been abandoned. You can also check events like path-passing to monitor traffic, as well as loitering, fighting, grouping, a sudden scene change, smoke, flames, falling, unsafe crossing, traffic jams and car accidents etc. Preventing unsafe situations Complex events can include violations of one-way systems, blacklist-detected vehicles Complex events can include violations of one-way systems, blacklist-detected vehicles, person and vehicle tracking, child kidnaps, waste collection, over-speed vehicles, and demonstration detections. The use of video analytics expands our capabilities tremendously, working in real time to detect and help predict security-related situations. Together with security agents, guards and operatives, AI in CCTV means resources can be better prepared, and that the likelihood of preventing unsafe situations can be greatly improved. It’s a winning team, as AI won’t always get it right but it’s there to be the advanced eyes we need to help keep businesses, premises and areas safer.
Recent cyber-attacks have disabled and even shut down physical assets. Robust foundational security and training staff, able to recognise an attack can help mitigate the threat, as ABB’s Rob Putman explains. Edge devices and data analytics As cyber security specialists, we must navigate an ever-changing threat landscape, one that is made even more complex by the increased interconnectivity between Operational Technology (OT) and Information Technology (IT), as companies look to leverage edge devices and data analytics, as well as remote connectivity, in the wake of the COVID-19 pandemic. As the threat surface evolves, the industry must guard against attacks on key physical infrastructure, carried out by a range of malicious actors, including nation states and criminals intent on blackmail. The chemicals sector, a high-value target for cyber-criminals Cyber-criminals view the chemicals sector, as a high-value target, because of the potential cost In 2017, not long after a ransomware attack that targeted Maersk, the world’s largest shipping firm, made the news around the world. Another cyber-attack, this time targeting physical industrial assets, generated fewer headlines, and yet could have resulted in both real, as well as financial, damage. Cyber-criminals view the chemicals sector, as a high-value target, because of the potential cost, both financial and reputational, to the operator, should production be interrupted or stopped entirely. Cyber security vulnerabilities put physical assets at risk The attack in question, a ‘Triton’ custom malware attack on a petro-chemical facility in Saudi Arabia, targeted a safety system, taking over system controllers. Bugs in the code triggered an emergency shutdown, but could have led to the release of toxic and explosive gases. It was a vivid reminder of how cyber security vulnerabilities are increasingly putting companies’ key physical assets at risk. Two more-recent high-profile incidents illustrate my point. In February, a Florida water treatment plant was hacked. The malicious actor remotely accessed the system for three to five minutes, during which time they opened various functions on the screen, including one that controls the amount of sodium hydroxide (NaOH) in the water. The hacker changed the NaOH from about 100 parts per million to 11,100 parts per million, which could have resulted in a mass poisoning event. Colonial Pipeline cyber-attack incident Then, in May, the Colonial Pipeline system that originates in Houston, Texas and carries gasoline, and jet fuel, suffered a ransomware attack. Using a VPN, hackers targeted back-office IT systems, forcing Colonial to shut down IT hosts and network infrastructure, severing communication with those OT systems that are responsible for communicating ‘transactional data’ associated with fuel delivery. In this instance, a single compromised password disrupted Colonial’s ability to invoice its customers. This dependency on OT data stopped pipeline and business operations, and the company was elected to pay the hackers an initial ransom of US$ 4.4 million, in order to restore operations. The Colonial attack was multi-dimensional, in that it not only impacted Colonial’s business, but also the wider US economy and national security, since the pipeline transports nearly half of the east coast's fuel supplies. Outdated IT system elevates physical risk The increased interconnectivity between IT and OT can also create vulnerabilit Attacks such as these prove that, armed with little more than a laptop, an email account and access to the dark web, determined hackers can cause disproportionate damage to physical infrastructure. As mentioned at the outset, the increased interconnectivity between IT and OT can also create vulnerability. Producers often want to know: Is it risky to connect a production asset or their operational environment to the Cloud? My answer is, if you do so without having done any risk audits around people, processes and technology, or without enhancing and maintaining that environment, then yes, that is risky. For example, we often observe that the life cycle of a production asset far outlasts the IT systems that are used to run it. Take a cement kiln. Several generations of plant operators may have come and gone, but that asset may still run, using legacy software, such as Windows XP and why not? Need to replace aging distributed control systems Well, that’s fine, if you are not concerned about having that asset compromised, and all that entails. A ‘flat’ IT network, an aging distributed control system, and machines with legacy versions of Microsoft Windows, all these elements, which are still commonplace in many industries, make it much easier for attackers to find and infiltrate a company, without needing sophisticated tools. The age-old mantra of not interfering with a piece of equipment or software that appears to be working, often applies to the individual assets. For example that cement kiln that are still controlled by the same Windows XP-based control software. However, if we’re honest, things have changed quite a bit, not because something was broken, but because innovation came in. That same kiln control system is most likely connected to other systems, than when first commissioned and that opens it to exposure to threats that it was never designed for. The human element There is a misconception that IoT-connected devices can open companies to risk There is a misconception that IoT-connected devices can open companies to risk, but many recent, high-profile cyber-attacks have been conducted from a laptop, by hacking someone’s VPN, or are a simple phishing/malware attack. In all these cases, the human element is partly to blame. Take the Florida attack. The compromised computer at the water treatment facility was reportedly running an outdated Windows 7 operating system and staff all used the same password, in order to gain remote access via the Teamviewer app, which the hacker was then able to use. Physical and human assets, key to robust cyber security Discussion on the best way to mitigate the threat is often framed solely around specific technical solutions and ignores the fact that robust foundational cyber security is really driven by two very different, but equally important, types of capital: physical assets (e.g. production machinery), and human assets. The truth is that smart digital software and industry-renowned cyber security applications, while critical, are in many cases, only as good as the weakest human link in the chain. Industry would, therefore, do well to ask itself the following question: Do we have a security problem, or a complacency problem? At this juncture, it is important to point out that the majority of companies that ABB works with, are at least aware of the threat posed by cyber attackers, and the potential impact of an attack, on their revenues, reputation and bottom line. User error and human-generated exposures Making sure staff are aware of the threat and training them to respond properly, if they are targeted, is vital However, user error and human-generated exposures are where most of these attacks occur. Those human failures are mostly not due to malicious intent from employees, but to the lack of training of the employees on secure behavior. Making sure staff are aware of the threat and training them to respond properly, if they are targeted, is vital. However, there are also age demographics at play here. Much of the operations employee base is heading towards retirement and often, there is no plan or ability to backfill these people. Need to invest in new digital and automated technologies If you think you don't have enough people now, in order to stay on top of basic care and feeding of the OT environment, with regards to security, what is that going to be like in 20 years? For this reason, there must be a major industry reset, when it comes to its workforce. Companies must invest in new digital and automated technologies, not only to ensure that they stay ahead of the curve and mitigate risk, but also to attract the next generation of digitally literate talent. Robust cyber security is built on solid foundations When we talk about foundational cyber security, we mean fundamentals, such as patching, malware protection, high-fidelity system backups, an up-to-date anti-virus system, and other options, such as application allow-listing and asset inventory. These basic controls can help companies understand their system setup and the potential threats, identify vulnerabilities, and assess their risk exposure. The Pareto principle states that around 80% of consequences come from 20% of the causes. In the context of cyber security, that means 80% of exposure to risk comes from 20% of the lack of security. If companies do the foundational things right, they can manage out a significant amount of this risk. Importance of maintaining and upgrading security controls However, having basic security controls, such as anti-virus software in place, is just the first step on that journey. Equally important is having someone within the organisation, with the requisite skill set, or the extra labour bandwidth, to operate, maintain and update those security controls, as they evolve. Educating, training and recruiting existing employees, and the next generation of talent, along with forging partnerships with trusted technology providers, will ensure that industry can leverage the latest digital technologies, in order to drive business value, and secure physical assets against cyber-attacks.
The COVID-19 pandemic is only accelerating the expansion of Automation, Robotics, Machine Learning (ML) and Artificial Intelligence (AI), and changing how people live their daily lives. This expansion leads the way with technologies that are developed to solve problems, improve operations, streamline processes and assist people, to focus on learning new skills, creativity, and imagination. Transformation of the physical security industry One of the latest industries to be permanently transformed is physical security. The era of utilising security cameras is slowly changing into more advanced and more efficient technological applications - security robotic solutions. SMP Robotics is a California-based company, which is a pioneer in developing robotic technologies, powered by AI, to assist, improve and deliver on new expectations in today’s world. One of their services is smart surveillance systems. This represents a proactive approach to security. The company, SMP Robotics’ Founder and Chief Executive Officer (CEO), Leo Ryzhenko, stated “Autonomous robotic technologies will become a driving force in future security solutions.” Robotics and AI in autonomous security solutions The robots can patrol 24/7, counteracting intrusion and communicating via voice message with guards The company uses robotics and AI technology to implement autonomous security solutions, which reduce liability and overhead, as well as improving the quality of services. Robotic guards are capable of patrolling all types of facilities, in both urban and rural contexts. The robots can patrol 24/7, counteracting intrusion and communicating via voice message with guards. The inspection robots, deployed by SMP Robotics, are easily integrated with many existing security technologies, armed with obstacle avoidance and anti-collision measures, automatically recharge, and can recognise faces up to 50 metres. As the world grows increasingly complex, technology like this is essential to ensure safety for all. AI-enabled autonomous video monitoring ground vehicles The advancements in technological breakthroughs of SMP Robotics position the company and its AI-powered, autonomous video monitoring ground vehicles, to be the most adaptable to any industry, cost-effective for clients’ business needs, in providing various types of services from public safety, crime prevention, to asset protection and physical security. SMP Robotics continues to implement new innovative solutions and groundbreaking technologies in its latest generation of autonomous models. Currently, many were already deployed or in a process to be delivered to a number of key clients, in various industries throughout the globe, from oil & gas, nuclear power plants to data centers, healthcare facilities, and amusement parks. Smart security robots Tal Turner, the Vice President (VP) of Business Development and Partnerships, SMP Robotics, said “We provide autonomous, artificial intelligence, all-weather, all-surface, smart security robots that are turnkey and operate independently on their own, using real-time obstacle avoidance, face recognition, and other cutting-edge technological advancements.” According to Coherent Market Insights, the Robots as a Service (RaaS) market direction will grow by 15.9% by 2028 and reach the threshold of 41.3 billion dollars. SMP Robotics stands at the forefront of the security robotic revolution, making an impactful change to make the world a safer place.
The trend of video customers moving to the cloud has reached a tipping point. At the same time, artificial intelligence (AI) is being adopted on a massive scale. Combining the two trends adds a higher level of value than either component individually. Merging the power of AI and the cloud is a driving force behind cloud surveillance company Eagle Eye Networks’ acquisition of Uncanny Vision, an AI and video analytics company headquartered in Bangalore, India. Expensive AI resources Cloud systems empower customers to leverage AI without having to install and program complicated and expensive hardware, in effect stripping away the barriers to entry that customers face when seeking to embrace AI. The cloud also enables customers to share expensive AI resources. One of the key components is ease of deployment – click, click and turn on the AI for any camera" Simplicity of implementation is crucial to the combined value proposition of Eagle Eye Networks and Uncanny Vision. “One of the key components is ease of deployment – click, click and turn on the AI for any camera (in a cloud system),” says Dean Drako, Eagle Eye Networks CEO. There is also a benefit of having AI systems networked, enabling 25 banks to perform facial recognition of customers from a single cloud-based system, he adds. A transition is also under way in the perception of AI. Video surveillance applications While previously it was seen as an add-on to surveillance systems, now it is seen as a very desirable feature on any system. “Centralised management of the cloud benefits the AI database,” says Drako. “In a project built around licence plate recognition (LPR), for example, all the data goes up to the cloud into a single database, and the customer can get a mobile view of everything going on across the world. You can’t do that without the cloud. And AI for LPR is more accurate.” Uncanny Vision’s targeted focus on AI for video surveillance applications was one factor that attracted Eagle Eye Networks to make the acquisition, says Drako. In contrast, some other companies have embraced broader applications of video AI. Uncanny Vision also has more customers using their system in real-world applications than competitors. Finally, the acquisition will help to expand Eagle Eye Networks’ presence in the LPR market, where Uncanny Vision is especially strong. Improving business operations The 60 employees at Uncanny Vision are mostly engineers and programmers Uncanny Vision’s deep learning algorithms enable recognition, identification, and prediction, improving business operations, customer service, and site safety. Applications include smart parking, retail, smart cities, ATM monitoring, worker safety and perimeter security. The 60 employees at Uncanny Vision are mostly engineers and programmers. “These guys understand how to translate AI algorithms to run very efficiently on various types of hardware,” says Drako. “They optimise how they get the code to run so we can implement in the cloud cost-effectively. They do it at a modest cost to make it more accessible. They understand how to deploy software for high performance on low-cost hardware.” For Uncanny Vision, the new ownership provides more reach. “We have a huge channel and a huge brand,” says Drako. “They are strong technical guys who need a sales and solution channel.” Video analytics solutions Even in light of the acquisition, Eagle Eye Networks will continue to provide a selection of third-party AI and video analytics solutions to customers. Use of AI and video analytics is specific to the application and business needs of each customer. Use of AI and video analytics is specific to the application and business needs of each customer In addition to AI functionality, systems need a ‘business logic’ component that drives how that capability is integrated into a system. System needs vary widely by vertical market, and many third-party vendors are focused on a specific vertical and how AI can benefit that market. Recurring monthly revenue “Third parties can provide analytics and the business logic, which is different for a factory, an office building or for a drive-thru restaurant,” says Drako. “The market is looking for many solutions, and one company couldn’t own a majority of them.” To ensure flexibility, Eagle Eye Networks will accommodate third party solutions, deploy their own analytics, or leverage analytics embedded in cameras. For Eagle Eye Networks’ dealer and integrator customers, the expansion into AI presents a new opportunity for recurring monthly revenue (RMR) and provides greater value to customers. Drako says the impact of the acquisition will be global as AI applications grow in popularity worldwide.
Video is an enormous wellspring of unstructured data in the enterprise environment. Finding new ways to use video data requires easy access for analysis. Gone are the days when video was recorded just to be played back later. New computer capabilities can analyse video to provide business intelligence and trends, all of which requires that a lot of unstructured data be captured, stored and kept immediately accessible. It's a driving force for companies specialising in video storage such as Quantum, which is focused on storing and managing unstructured data, including video, photos, music and sound. Managing various analytics “Unstructured data is driving the massive growth in storage today, and video surveillance fits right in there,” says Jamie Lerner, CEO and President, Quantum. As data multiplies in business, matters of storing and accessing the data take on a larger profile. Especially challenging is meeting the need to store and access expanding amounts of unstructured data, such as video. Video is also part of a changing end-to-end architecture in the enterpriseWhereas 10 years ago, video surveillance was all about recording and playback, now the emphasis is much more on an end-to-end approach. In addition to capturing and playing back video, systems have to manage various analytics, archival and data retention aspects as well as recording. Video is also part of a changing end-to-end architecture in the enterprise, including hybrid, cloud and on-premise storage. Video surveillance industry Historically, structured data, such as financial information, was stored to allow future analytics. The same trend extends to unstructured data, such as video analytics. Quantum has expanded its video storage capabilities with acquisition this year of the video surveillance business of Pivot3, provider of a hyperconverged system that provides recording, analysis and seamlessly archives data on a converged platform that is less expensive and easier to manage. In acquiring Pivot3, Quantum is refocusing the smaller company on the video surveillance industry. “We are now focused 100% on surveillance and having the highest quality while being very cost-effective,” says Lerner. “The industry is ready for an IT-forward solution that is totally focused on surveillance. You can’t make a platform all things to all people.” Traditional security customers There is overlap in large stadiums and theme parks, where Lerner sees even more opportunity to expand Pivot3 will also help to expand Quantum’s customer base. The larger company has a history of serving customers in entertainment, movies, television and sports production. The addition of Pivot3’s 500 new customers in large surveillance, transportation and critical infrastructure markets will expand the mix. There is overlap in large stadiums and theme parks, where Lerner sees even more opportunity to expand. Pivot3 also helps to bridge the gap between traditional security customers and the information technology (IT) department. “Pivot3 has a reputation as simple to use,” says Lerner. “My belief is that physical security can run separately [from IT] until you reach a certain size, then IT has to be involved. Pivot3 gives IT people in the security space a product that is well formed and fits into an IT strategy. They are not undertaking a piece of equipment that will be a burden.” Physical security presence Customers expect their infrastructure vendors to provide systems that allow them to “Set it and forget it,” says Lerner. It’s one of the big advantages of cloud computing and also central to Quantum’s approach with their traditional products. “At the end of the day, you want to run a hospital, for example, so you want your systems to be easy to use,” says Lerner. The Pivot3 acquisition will also allow Quantum to expand their physical security presence more broadly and globally. Previously, the geographic reach of Pivot3 was limited by the high cost of placing personnel in diverse locations. Under Quantum, which has been serving global companies for 40 years, the problem disappears. “Quantum has global support on all continents and in more countries,” says Lerner. “It’s a higher level of support, given size and legacy of our organisation.”
A new generation of video cameras is poised to boost capabilities dramatically at the edge of the IP network, including more powerful artificial intelligence (AI) and higher resolutions, and paving the way for new applications that would have previously been too expensive or complex. Technologies at the heart of the coming new generation of video cameras are Ambarella’s newest systems on chips (SoCs). Ambarella’s CV5S and CV52S product families are bringing a new level of on-camera AI performance and integration to multi-imager and single-imager IP cameras. Both of these SoCs are manufactured in the ‘5 nm’ manufacturing process, bringing performance improvements and power savings, compared to the previous generation of SoCs manufactured at ‘10nm’. CV5S and CV52S AI-powered SoCs The CV5S, designed for multi-imager cameras, is able to process, encode and perform advanced AI on up to four imagers at 4Kp30 resolution, simultaneously and at less than 5 watts. This enables multi-headed camera designs with up to four 4K imagers looking at different portions of a scene, as well as very high-resolution, single-imager cameras of up to 32 MP resolution and beyond. The CV52S, designed for single-imager cameras with very powerful onboard AI, is the next-generation of the company’s successful CV22S mainstream 4K camera AI chip. This new SoC family quadruples the AI processing performance, while keeping the same low power consumption of less than 3 watts for 4Kp60 encoding with advanced AI processing. Faster and ubiquitous AI capabilities Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions" “Security system designers desire higher resolutions, increasing channel counts, and ever faster and more ubiquitous AI capabilities,” explains John Lorenz, Senior Technology and Market Analyst, Computing, at Yole Développement (Yole), a French market research firm. John Lorenz adds, “Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions for meeting the growing demands of the security IC (integrated circuit) sector, which our latest report forecasts to exceed US$ 4 billion by 2025, with two-thirds of that being chips with AI capabilities.” Edge AI vision processors Ambarella’s new CV5S and CV52S edge AI vision processors enable new classes of cameras that would not have been possible in the past, with a single SoC architecture. For example, implementing a 4x 4K multi-imager with AI would have traditionally required at least two SoCs (at least one for encoding and one for AI), and the overall power consumption would have made those designs bulky and prohibitively expensive. By reducing the number of required SoCs, the CV5S enables advanced camera designs such as AI-enabled 4x 4K imagers at price points much lower than would have previously been possible. “What we are usually trying to do with our SoCs is to keep the price points similar to the previous generations, given that camera retail prices tend to be fairly fixed,” said Jerome Gigot, Ambarella's Senior Director of Marketing. 4K multi-imager cameras “However, higher-end 4K multi-imager cameras tend to retail for thousands of dollars, and so even though there will be a small premium on the SoC for the 2X improvement in performance, this will not make a significant impact to the final MSRP of the camera,” adds Jerome Gigot. In addition, the overall system cost might go down, Gigot notes, compared to what could be built today because there is no longer a need for external chips to perform AI, or extra components for power dissipation. The new chips will be available in the second half of 2021, and it typically takes about 12 to 18 months for Ambarella’s customers (camera manufacturers) to produce final cameras. Therefore, the first cameras, based on these new SoCs, should hit the market sometime in the second half of 2022. Reference boards for camera manufacturers The software on these new SoCs is an evolution of our unified Linux SDK" As with Ambarella’s previous generations of edge AI vision SoCs for security, the company will make available reference boards to camera manufacturers soon, allowing them to develop their cameras based on the new CV5S and CV52S SoC families. “The software on these new SoCs is an evolution of our unified Linux SDK that is already available on our previous generations SoCs, which makes the transition easy for our customers,” said Jerome Gigot. Better crime detection Detecting criminals in a crowd, using face recognition and/or licence plate recognition, has been a daunting challenge for security, and one the new chips will help to address. “Actually, these applications are one of the main reasons why Ambarella is introducing these two new SoC families,” said Jerome Gigot. Typically, resolutions of 4K and higher have been a smaller portion of the security market, given that they came at a premium price tag for the high-end optics, image sensor and SoC. Also, the cost and extra bandwidth of storing and streaming 4K video were not always worth it for the benefit of just viewing video at higher resolution. 4K AI processing on-camera The advent of on-camera AI at 4K changes the paradigm. By enabling 4K AI processing on-camera, smaller objects at longer distances can now be detected and analysed without having to go to a server, and with much higher detail and accuracy compared to what can be done on a 2 MP or 5 MP cameras. This means that fewer false alarms will be generated, and each camera will now be able to cover a longer distance and wider area, offering more meaningful insights without necessarily having to stream and store that 4K video to a back-end server. “This is valuable, for example, for traffic cameras mounted on top of high poles, which need to be able to see very far out and identify cars and licence plates that are hundreds of meters away,” said Jerome Gigot. The advent of on-camera AI at 4K changes the paradigm Enhanced video analytics and wider coverage “Ambarella’s new CV5S and CV52S SoCs truly allow the industry to take advantage of higher resolution on-camera for better analytics and wider coverage, but without all the costs typically incurred by having to stream high-quality 4K video out 24/7 to a remote server for offline analytics,” said Jerome Gigot. He adds, “So, next-generation cameras will now be able to identify more criminals, faces and licence plates, at longer distances, for an overall lower cost and with faster response times by doing it all locally on-camera.” Deployment in retail applications Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once Retail applications are another big selling point. Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once (e.g., in a mall), to provide not only security features, but also other business analytics, such as foot traffic and occupancy maps that can be used later to improve product placement. The higher resolution and higher AI performance, enabled by the new Ambarella SoCs, provide a leap forward in addressing those scenarios. In a store setup, a ceiling-mounted camera with four 4K imagers can simultaneously look at the cashier line on one side of the store, sending alerts when a line is getting too long and a new cashier needs to be deployed, while at the same time looking at the entrance on the other side of the store, to count the people coming in and out. This leaves two additional 4K imagers for monitoring specific product aisles and generating real-time business analytics. Use in cashier-less stores Another retail application is a cashier-less store. Here, a CV5S or CV52S-based camera mounted on the ceiling will have enough resolution and AI performance to track goods, while the customer grabs them and puts them in their cart, as well as to automatically track which customer is purchasing which item. In a warehouse scenario, items and boxes moving across the floor could also be followed locally, on a single ceiling-mounted camera that covers a wide area of the warehouse. Additionally, these items and boxes could be tracked across the different imagers in a multi-headed camera setup, without the video having to be sent to a server to perform the tracking. Updating on-camera AI networks Another feature of Ambarella’s SoCs is that their on-camera AI networks can be updated on-the-fly, without having to stop the video recording and without losing any video frames. So, for example in the case of a search for a missing vehicle, the characteristics of that missing vehicle (make, model, colour, licence plate) can be sent to a cluster of cameras in the general area, where the vehicle is thought to be missing, and all those cameras can be automatically updated to run a live search on that specific vehicle. If any of the cameras gets a match, a remote operator can be notified and receive a picture, or even a live video feed of the scene. Efficient traffic management With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself Relating to traffic congestion, most big cities have thousands of intersections that they need to monitor and manage. Trying to do this from one central location is costly and difficult, as there is so much video data to process and analyse, in order to make those traffic decisions (to control the traffic lights, reverse lanes, etc.). With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself. The camera would then take actions autonomously (for example, adjust traffic-light timing) and only report a status update to the main traffic control centre. So now, instead of having one central location trying to manage 1,000 intersections, a city can have 1,000 smart AI cameras, each managing its own location and providing updates and metadata to a central server. Superior privacy Privacy is always a concern with video. In this case, doing AI on-camera is inherently more private than streaming the video to a server for analysis. Less data transmission means fewer points of entry for a hacker trying to access the video. On Ambarella’s CV5S and CV52S SoCs, the video can be analysed locally and then discarded, with just a signature or metadata of the face being used to find a match. No actual video needs to be stored or transmitted, which ensures total privacy. In addition, the chips contain a very secure hardware cyber security block, including OTP memory, Arm TrustZones, DRAM scrambling and I/O virtualisation. This makes it very difficult for a hacker to replace the firmware on the camera, providing another level of security and privacy at the system level. Privacy Masking Another privacy feature is the concept of privacy masking. This feature enables portions of the video (say a door or a window) to be blocked out, before being encoded in the video stream. The blocked portions of the scene are not present in the recorded video, thus providing a privacy option for cameras that are facing private areas. “With on-camera AI, each device becomes its own smart endpoint, and can be reconfigured at will to serve the specific physical security needs of its installation,” said Jerome Gigot, adding “The possibilities are endless, and our mission as an SoC maker is really to provide a powerful and easy-to-use platform, complete with computer-vision tools, that enable our customers and their partners to easily deploy their own AI software on-camera.” Physical security in parking lots With a CV5S or CV52S AI-enabled camera, the camera will be able to cover a much wider portion of the parking lot One example is physical security in a parking lot. A camera today might be used to just record part of the parking lot, so that an operator can go back and look at the video if a car were broken into or some other incident occurred. With a CV5S or CV52S AI-enabled camera, first of all, the camera will be able to cover a much wider portion of the parking lot. Additionally, it will be able to detect the licence plates of all the cars going in and out, to automatically bill the owners. If there is a special event, the camera can be reprogrammed to identify VIP vehicles and automatically redirect them to the VIP portion of the lot, while reporting to the entrance station or sign how many parking spots are available. It can even tell the cars approaching the lot where to go. Advantages of using edge AI vision SoCs Jerome Gigot said, “The possibilities are endless and they span across many verticals. The market is primed to embrace these new capabilities. Recent advances in edge AI vision SoCs have brought about a period of change in the physical security space. Companies that would have, historically, only provided security cameras, are now getting into adjacent verticals such as smart retail, smart cities and smart buildings.” He adds, “These changes are providing a great opportunity for all the camera makers and software providers to really differentiate themselves by providing full systems that offer a new level of insights and efficiencies to, not only the physical security manager, but now also the store owner and the building manager.” He adds, “All of these new applications are extremely healthy for the industry, as they are growing the available market for cameras, while also increasing their value and the economies of scale they can provide. Ambarella is looking forward to seeing all the innovative products that our customers will build with this new generation of SoCs.”
Schools present unique challenges for security and access control. But what about a school that is also a heritage site of exceptional value? The Colegio Diocesano Santo Domingo in Orihuela, Spain, is more than just a school. Its historic buildings date to the 1500s, a heritage site as well as a place of learning — with a museum that requires the protection of the same access system. The college buildings are a Resource of Cultural Interest and on Spain’s heritage registry: They must not be damaged. Wire-free electronic locks were the obvious answer. A wireless solution SMARTair® wireless locking devices now control access through 300 doors around the school. Electronic escutcheons, knob cylinders, and wall readers (including lifts) are connected to intuitive SMARTair software by a network of 38 HUBs. The school chose SMARTair Wireless Online management for their new keyless access system. This powerful management option enables real-time control of access to and around the site, even if the school’s data network is down. Automated emails inform security staff of any incidents, keeping students, teachers, equipment, and precious heritage safe. Real-time key management “The main benefit is the ease of real-time key management — from any place and at any time — via the wireless online management system,” says the school’s IT Manager, Francisco Fernández Soriano. “This increases security for children and for staff because no unauthorised people can enter the school.” In addition to the main entrances and classrooms, access to private spaces is constantly monitored “In addition to the main entrances and classrooms, access to private spaces such as lifts, offices, staff rooms, the church, the museum, the library, and the IT room is constantly monitored.” Scalable modular system Installation of the school’s SMARTair system required minimal work. Some doors date to the 16th century, so major alterations were not possible. “The system was installed without a hitch and also without any disruption to classes,” he adds. Because SMARTair is a modular system, scalability is built in. They can extend or fine-tune their access system when they choose. Indeed, the school’s “SMARTair Phase II” is already under discussion.
Traffic management takes many forms. Traffic management can involve closing a roadway during a major city event such as a motion picture awards show or traffic management can simply entail a traffic arm that raises and lowers after a fee has been paid in a parking garage. Traffic management can include directing traffic in one direction during peak hours or closing a facility to vehicle traffic after hours. It can also prevent wrong-way entry or ensuring vehicles cannot encroach on pedestrian areas. Barriers for security In most cases, it is quite easy to breach the entrance to the parking lot. Once entered, the vehicle can pick up speed to crash through one of the gates or entrances to get within the stadium itself. To provide increased security, Delta Scientific DSC501 barriers are used at the Mercedes Benz Stadium in Atlanta at main entrances where players and VIPs, among others, enter with their cars. K54 certification The DSC501 protects against a “second hit” risk from a second vehicle The DSC501 is the only K54-certified retractable vehicle barricade in the world. Set in a foundation only 18 inches deep, it will survive and operate after a 5.4-million foot-pound impact. That’s equivalent to a 65,000-pound truck hitting it at 50 mph. Stopping the truck or car dead in its tracks, the DSC501 protects against a “second hit” risk from a second vehicle. Deployable vehicle crash barriers In another example, on May 22, 2020, an armed assailant attempted to drive through entryway gates at the Naval Air Station-Corpus Christi. The suspect was stopped almost instantaneously. A wounded sailor, a security team member, managed to raise a barricade despite her injuries. The shooter, the would-be trespasser, died in the incident, which could have been made much worse had the station not taken appropriate measures to keep intruders at bay. At this location, the totally self-contained Delta Scientific MP5000 mobile deployable vehicle crash barriers guarding that base carries an ASTM rating as high as M50, able to stop and disable a 15,000 lb (66.7 kN) G.V.W. vehicle moving at 50 mph (80.4 kph). The barricade tows into position to control vehicle access within 15 minutes. No excavation or sub-surface preparation is required. Once positioned, the mobile barricades unpack themselves by using hydraulics to raise and lower the barriers off their wheels. DC-powered pumps will then raise or lower the barriers. To remove, procedures are reversed and the barriers are towed away. Traffic control devices With so many traffic management scenarios, it is no wonder that Delta Scientific manufacturer’s more than fifty types of barriers and traffic control devices. Delta can assist any facility in controlling the flow of traffic through devices such as traffic arms, lights, spike teeth or even crash tested vehicle barricades.
With traffic levels constantly rising, cities around the world are looking for ways to manage the sheer number of traffic on their roads. The city of Chorzow in southern Poland wanted to go a step further and provide information to streamline their public transport on the roads, as well as regular vehicles. They approached Sprint, a systems integrator in Poland, who delivered an intelligent traffic management solution using Hikvision technology. City municipal Board of Streets and Bridges in Chorzów (MZUiM – Miejski Zarząd Ulic i Mostów) an organisational unit of the city is responsible for the management of public roads in Chorzów. Offering image stabilisation The Road Engineering Department within MZUiM is responsible for the city’s Traffic Management System. The department had extensive requirements for this complex system to truly meet its needs. Firstly, they needed to be able to recognise number plates efficiently, even at high speeds of up to 250 km/h. Further the system needed to be able to classify the vehicles. The Road Engineering Department within MZUiM is responsible for the city’s Traffic Management System Secondly, the cameras used needed to have a high image quality and also to have some aesthetic quality, as they would be mounted all over the city, sometimes in prominent places. The ability of the cameras to maintain a high image quality in low light conditions, and to offer image stabilisation were also important for this project. Traffic management system The system needed to effectively monitor traffic on major roads and intersections throughout the city. It would be used for a variety of activities – from verifying accidents to tracking truck routes. A high priority for the solution was to create a traffic management system in the city, taking into account relevant data submitted to the Traffic Control Centre. With this, the MZUiM could optimise signalling work and create priority for public transport vehicles. Chorzów’s Traffic Management System using Hikvision ANPR intelligent cameras other supporting CCTV was installed by Sprint in 2019. The system used the DarkFighter Network Speed Dome PTZ camera (DS-2DF6A236X-AEL) in key areas. This camera has high sensitivity in low light levels, image stabilisation and rapid focus, making it ideal for the position. Client-server system platform They also used 4-Directional Multi-sensor Network PanoVu cameras (DS-2CD6D24FWD) at key intersections They also used 4-Directional Multi-sensor Network PanoVu cameras (DS-2CD6D24FWD) at key intersections, to capture all the access roads to the intersection. These also come with lower infrastructure costs, since they combine four cameras into one. They also look pretty good! Footage from the cameras was recorded using 5 4K NVRs (DS-9632NI-I16) and it was all brought together using the HikCentral client-server system platform. But perhaps the real hero in the system was the ANPR technology. ANPR data from the ANPR Checkpoint Capture Unit (iDS-TCV300) provided key data to meet the project’s needs. This included recognition of registration numbers up to a speed of 250 km/h, recognition of overloaded vehicles, and vehicle classification. The system was also designed to integrate the information transmitted from induction loops embedded in the roads, which register a vehicle as it drives over them. Intelligent management software Łukasz Cysewski, Project Manager at Sprint, says: “Hikvision’s solutions in the field of intelligent ANPR cameras and CCTV best corresponded to the project requirements. Specifically, we were impressed with the scope of implemented functions and effectiveness of the ANPR cameras, image quality and overall management of the CCTV system. Hikvision also offered a high level of support to integrate the smart cameras with our intelligent management software.” The system gave Chorzów the ability to monitor their traffic in one place. This brought a raft of benefits, like automatic detection of road offenses, and allowing the department to prioritise public transport for a quicker journey. It also allowed Police to track suspicious vehicles, with integration into their Smart City platform.
Doncaster Culture and Leisure Trust (DCLT), The Dome, required a new solution that would protect several areas, including one of the largest gym’s in Doncaster, The Fitness Village. Vanderbilt ACT365 system DCLT had a specific brief for this project that specified enhancing the staff and customer experience, while simultaneously providing access control solutions to restricted areas from the general public, members, and staff alike. Oliver Law Security (OLS) Ltd. did not hesitate to recommend the Vanderbilt ACT365 system. ACT365 is not only a fully cloud-based solution, but also offers a flexible solution for installation and management that OLS identified as a key ingredient to meet DCLT’s project brief. API Integration In addition to DCLT’s security requirement, OLS also realised ACT365 as an ideal solution for this task, given the product’s very focused API integration. Thanks to the ACT365 interface, OLS was able to integrate DCLT’s gym management system to enable single-source data to be used to populate the access control system, keep records up-to-date, and enhance customer experience. For instance, previously, the older system had taken up to 3-5 seconds to validate members and open the entry turnstiles. Once the API interface had been achieved, this validation is now done instantly through ACT365 and allows members with active memberships through the entry points without any minimal delay. Game-changer security solution According to Oliver Law Security, using ACT365 and its API interface is a game-changer for this type of project The scope of this project, although not significant in the number of doors, was a very technical project with integration into SQL server and a third-party membership system with the potential for thousands of would-be users. According to Oliver Law Security, using ACT365 and its API interface is a game-changer for this type of project. With multiple updates per day, the access control system is always fully populated with the correct, validated members ensuring DCLT’s premier venue, The Dome, is protected against memberships that have lapsed. Cloud-based off-premise solution The system is entirely cloud-based offers an off-premise solution with no additional new servers required or PC’s running software. Through the ACT365 app, DCLT’s site administrators can manage the system for staff. The beauty of the interface is once the schedule runs, all information is autonomously sent to the ACT365 database, meaning adding new memberships, updating memberships, or revoking access is seamless, not tying up staff verifying and administering the membership/access control systems respectively. Commenting on the project, Oliver (Ollie) Law, Managing Director of Oliver Law Security (OLS) Ltd., stated “We didn’t hesitate to recommend the Vanderbilt ACT365 system. As a Vanderbilt Gold Integration Partner, this is our go-to product, and for Doncaster Culture and Leisure Trust, the flexibility and scalability of the product was best placed to grow with their business.” He adds, “We are fully committed to working and growing with Vanderbilt, and we look forward to other projects of this nature in the future.”
An important heritage site which played a key role in protecting the UK during World War II is itself being made safe and secure with the installation of a comprehensive and fully integrated security system, including more than 75 Dahua HD CCTV cameras. Battle of Britain Bunker The Battle of Britain Bunker is an underground operations room in Uxbridge, formerly used by No. 11 Group Fighter Command during the Second World War, most notably in the Battle of Britain and on D-Day. The operations room was one of the key parts of the world’s first integrated defence system, which linked Fighter Command with Anti-Aircraft Command, Barrage Balloon Command, the Observer Corps, radar, and the intelligence services. The site is run by Hillingdon Council as a heritage attraction with a museum and a visitor centre. Fully integrated security solution DSSL Group installed more than 75 Dahua HD CCTV cameras linked to a Genetec Security Centre VMS DSSL Group completed a full analysis of the existing CCTV and intruder alarm systems, with the aim of creating a fully integrated security solution, to enhance the security around the site, reduce manned security costs, and speed up remote security and police response times. Using the existing wireless network also designed by them across the borough, DSSL Group installed more than 75 Dahua HD CCTV cameras linked to a Genetec Security Centre video management system (VMS), as well as Axis IP PA speakers externally. All cameras are viewable by management and the security team on site, and also from Hillingdon Council’s main CCTV control room. Surveillance cameras with smart analytics using AI External cameras are equipped with smart analytics using AI, to help secure the perimeter of the site. In 2018, a state-of-the-art wireless CCTV system consisting of more than 1,000 Dahua HD cameras, along with Dahua NVRs, XVRs and control and viewing equipment, was installed across the borough by DSSL Group. More recently, an additional 1,000 Dahua HD cameras have been added to the council's network making it 2,000 in total. In addition to the cameras, DSSL Group installed a Honeywell Galaxy 62-zone intruder alarm system which feeds back to a central monitoring station and is also integrated with the VMS. Dahua CCTV system installed Cllr Richard Lewis, Hillingdon Council’s Cabinet Member for Cultural Services, Culture and Heritage, said “The Battle of Britain Bunker is one of Hillingdon’s treasured heritage sites. It played a pivotal role in the Second World War, and it’s important that we keep it protected. Dahua CCTV system will help us to do that with their state-of-the-art system and high performing cameras.”
ARST is a public transportation company in Cagliari, Italy. The company operates a massive fleet of about 800 public buses throughout the island of Sardinia. During the vehicle modernisation process, the company decided to deploy new centralised CCTV systems to enhance the security level of passengers and drivers. First of all, the low-definition images captured by the original surveillance equipment cannot meet the company’s advanced monitoring needs. Second, the bus driver could not achieve point-to-point communication with the command centre in real time. In addition, in case of an accident, there was no emergency button on the bus before to report the emergency to the command centre. Customised mobile solution To help ARST revamp its bus security system, a customised Dahua mobile solution consisting of more than 3,000 cameras and 750 MXVRs, Panic Buttons, DSS integrated platform as well as other accessories was employed. The data collected from the front-end cameras is integrated in the control room via DSS4004, where emergency calls, geo-localisation of vehicles and statistics can be managed. Each bus is equipped with a penta-hybrid video recorder MXVR6212, 4, 6 or 8 HAC-HDBW2241F cameras Each bus is equipped with a penta-hybrid video recorder MXVR6212, 4, 6 or 8 HAC-HDBW2241F cameras and panic buttons. The main features of the systems are: data encryption, people counting, hot spot, router 3G/4G, dynamic management of the LCD monitor on board and geo-localisation via DSS app. As the first mobile XVR adopting HDCVI/AHD/TVI/CVBS/IP signals, MXVR6212 can achieve 1080P high-definition real-time recording. High performance sensor It supports real-time vehicle location tracking and monitoring, and all information such as GPS and video can be uploaded via wireless network - 3G/4G/WIFI. In addition, the device can also support connection of various accessories, such as card readers, fuel sensors, and emergency buttons. Furthermore, it has passed EN50155/ISO16750 to meet the requirements for mobile use. Other than city bus, this device can be used in various applications, such as school bus, taxi, police car, train, truck, etc. The 2MP HAC-HDBW2241F-M-A mobile camera is designed with a shock-proof compact case, which makes it convenient to be installed and adaptable to various applications. Boasting the strengths of the Dahua self-developed HDCVI technology, the camera offers high quality images and ensures real-time transmission. Also, it adopts a high performance sensor to provide incomparable performance even under extreme lowlight environment. Manage mobile devices The Dahua mobile solution with high-definition monitoring performance reduces theft and robbery on buses The Starlight feature allows capturing of more details and recognising accurate colours at night or in scenes with limited illumination. At the control room, Dahua DSS platform was utilised to control and manage the mobile devices deployed on the bus. It displays real-time location, speed, direction of mobile device, playback device’s history location, and supports alarm for over-speeding, entering and leaving the E-FENCE. Aside from central management, the Business Intelligence feature of Dahua DSS platform also allows the user to export Heat Map reports and people counting statistics, helping operator companies to optimise driving route to generate more profit. High-definition monitoring With upgraded Dahua system, the command centre can communicate with every single vehicle of ARST Bus Company in real time, enabling them to deliver instructions to the driver, allowing the driver to report immediately to the command centre in case of an emergency through the panic button, and ensuring the safety of passengers and drivers. The Dahua mobile solution with high-definition monitoring performance reduces theft and robbery on buses, and enables bus companies to collect accurate information about traffic flows and automatically download data to assist efficient and profitable operation. The Dahua mobile solution mounted on board has been proven to be highly efficient and reliable, which were also applied in two other Italian bus companies: AMAT Bus Company in Taranto and AMTAB Bus Company in Bari.
Round table discussion
Air travel is returning to pre-pandemic levels. COVID and its aftermath have added new compliance and operational concerns for airport security, and social and political volatility around the world emphasises the need for constant vigilance. A range of new technologies are enhancing airport security, not to mention providing new tools to simplify processes throughout the airport. We asked our Expert Panel Roundtable: Which technologies are transforming airport security?
Keeping prisoners safely housed is among the biggest challenges the security industry faces. Correctional applications of security technology are often more extreme and require a specialised mix of technologies. We asked our Expert Panel Roundtable: What are the video security and surveillance needs in prisons, and how well do technologies meet those needs? Are there any ethical qualms about selling to prisons?
A new generation of security professional is waiting in the wings. They will be faced with unprecedented challenges, as they seek to transform the security marketplace to the ‘next level’. Technology changes ensure the market will be very different 10 years from now and the fresh labour pool will need to be able to meet the host of new challenges. We asked our Expert Panel Roundtable: What exciting career opportunities in the security industry await the next generation?
Protecting dormitory residents and assetsDownload
Protecting Critical Infrastructure through facial recognitionDownload
12 questions to ask your access control providerDownload
Providing frictionless cloud Video Storage as a Service (VSaaS)Download