Since 1964 the Central Bank of Jordan has played a crucial role distributing currency, maintaining national reserves of gold and foreign currencies, supporting economic development and ensuring the stability of the country’s financial system.

For the bank, maintaining the most robust, up-to-date standards of security is not just mission critical, it’s a matter of national importance. IDIS technology is now trusted to provide full video protection. IDIS Solution Suite video management software (VMS) is at the heart of the Central Bank’s new video system, with the first phase encompassing 425-plus cameras upgrading its headquarters and protecting three branches.

Cost-efficient remote firmware updates

The 8300 series also benefits from the industry’s lowest hard disk drive (HDD) failure rate

IDIS Solution Suite’s hybrid capability not only enabled seamless switchover from the bank’s legacy analogue cameras, it is easier to operate than competitive systems and will allow cost-efficient remote firmware updates and system maintenance.

Ametrad implemented powerful IDIS DR-8364D 64-channel NVRs, with a super-fast 900Mbps throughput to ensure high performance and simultaneous live view and playback with no degradation of image quality or latency. The 8300 series also benefits from the industry’s lowest hard disk drive (HDD) failure rate, while supporting RAID 1, 5 and 10 and uses IDIS’s iBank file structure to deliver an unprecedented level of resilience.

Multi-layered protection against video data loss

The NVRs also offer the advantage of flexible H.265 and H.264 dual codec performance allowing the Central Bank to reap the benefits of high-definition H.265 recording, while viewing in H.264. IDIS Intelligent Codec offers further storage and bandwidth savings of up to 90% when combined with Motion Adaptive Transmission (MAT).

IDIS Solution Suite further optimises network bandwidth through dynamic multi-stream control

IDIS Solution Suite further optimises network bandwidth through dynamic multi-stream control by detecting overloads to prevent network strain. And, importantly, it improves the control room operator’s quality of experience in the face of varying network bandwidth. IDIS Critical Failover technology provides multi-layered protection against video data loss due to a wide range of potential fault conditions, such as network instability or power failure.

Improving maintenance standards

This ensures that recordings are automatically updated without the need for engineer callouts and with no risk of gaps in recordings. Testing at project handover confirmed that the Failover metrics fully met the client’s expectations. The IDIS solution was also selected because of its IDIS Ultimate Warranty, and ease of future expansion with guaranteed forward and backward combability.

Security directors at the Central Bank wanted to replace their existing video system with the best new generation and futureproof solution that would deliver simultaneously high performance live view and recording. The bank identified the need to improve maintenance standards, eradicate system failures and ensure a low total cost of ownership. They also wanted to mitigate against video data loss, protect against cyber threats, and have a solution that would be easier for operators to use, with faster footage search and retrieval.

Mission-critical projects

Integrator Ametrad Technology Services won a hard-fought tender process against top competitors

The control room at the bank’s headquarters needed a complete upgrade with the ability to centrally manage and control surveillance across all its branches. It was essential for the entire project to be delivered with minimum disruption that ensured no loss of video coverage during the phased implementation.

Following a competitive proof of concept demonstration with the latest IDIS technology, integrator Ametrad Technology Services won a hard-fought tender process against top competitors, including the long-established previous contract holder. The successful partnership between Ametrad Technology Services and IDIS resulted in efficient project delivery, on time as promised, and has put the two companies a lead position for other mission-critical projects across the Levant region.

Password breaches and cyber security loopholes

In operation the bank’s new system has lower bandwidth requirements and faster recording retrieval time, making the security operation both more effective and more economical. The bank’s central monitoring team can now work more efficiently, with their new IDIS VMS providing event forwarding, acknowledgements, notifications, live pop-ups and other valuable functions.

IDIS’s true plug-and-play technology is also less vulnerable to password breaches and cyber security loopholes, as installation engineers don’t need to manage IP addresses or manually enter passwords for each device. And IDIS’s Linux based servers and proprietary protocols ensure the highest level of resistance to hacking.

Highest standard of video surveillance

As the system expands FEN will act as force multiplier by reducing installation costs

IDIS’s For Every Network (FEN) capability, which uses peer-to-peer technology, also allowed Ametrad engineers to quickly name each branch and connect the system to IDIS Solution Suite. As the system expands FEN will act as force multiplier by reducing installation costs, speeding up implementation time and protecting against human error by eliminating the complexity and cyber challenges associated with multi-site surveillance.

"Working in close partnership with IDIS we were able to deliver a smooth, staged technology migration at these critical security sites, with no delays, problems or interruptions to recording," said Ahmad Shanawani, Managing Director of Ametrad Technology Services.

Meanwhile, the Central Bank’s engineering department confirms that the IDIS solution now provides the uncompromising standard of protection they need, with lower ongoing costs, easier operation and the assurance that they will continue with the highest standard of video surveillance going forward.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version

In case you missed it

Embracing digital transformation in the security industry
Embracing digital transformation in the security industry

Many industries are, to a greater or lesser extent, in the throes of digital transformation. As with any change programme, digital transformation efforts often under-perform against expectations. Yet, the number of digital transformation programmes continue to increase, as commercial pressures intensify. As security professionals we need to embrace our role in digital transformation, as security is everybody’s business. For all those people weary of hearing about digital transformation and believe it’s a business fad, consider your own behaviours. If you use a smartphone to search, find, order, buy, message, watch, learn, play, bank, pay, enter, exit, navigate, communicate and more then you are part of the reason that digital transformation is a commercial necessity. The way we live our lives has changed significantly over the past twenty years and this needs to be reflected into how we rethink the way we do business. Digital transformation is about more than technology, it allows people to solve their traditional problems in new and better ways than before. Better can mean faster, at lower cost, using fewer resources, easier to maintain, more compliant and/or easier to report insights. IoT, criminal activity and security  The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billion. Internet of Things (IoT) means digital transformation converges physical and digital for security professionals. Criminals use smarter digital tools such as malware, drones, key cloners, signal readers and more, which impact both physical and cybersecurity. To counter this, digital transformation provides security professionals with access As security professionals we need to embrace our role in digital transformation, as security is everybody’s businessto valuable actionable insights to identify and deter threats to people and assets. All transformation starts with an idea generated by people and ends with people experiencing the output. Therefore, digital transformation starts and ends with people. To ensure a solid foundation to any digital transformation agenda, people need to have a clear purpose to engage. This is where security leaders can inspire their colleagues with a laudable purpose of embracing disruption at the same time as focusing on safeguarding people and assets. Non-security colleagues should understand that security risks are advancing at a faster pace than enterprises can adapt. As a security leader, you are advocating a movement where your colleagues adopt relevant enterprise security risk management practices in their daily thinking and working. The message is clear that digital transformation presents abundant opportunities and these need to be evaluated alongside the proliferating security threats that can become a business continuity failure. Security professionals and digital influence  The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billionSecurity professionals can influence digital transformation success by translating an enterprise’s strategy into secure operational reality. The security narrative should emphasise the people side of digital transformation and how technology can act as an enabler of a safe and secure experience, both for employees and customers. Operationally, digital transformation is about agility, adaptability and navigating uncertainty. Old ways of thinking and working will be blockers to transformation, so security leaders ought to identify the rapid enablers of a ‘secure’ digital transformation. Better people, processes and overall technology People generally don’t want more in their lives, they want better. Better people. Better data. Better technology. Better processes. Digital transformation creates significant ‘better’ benefits for security: For example, connected (IoT) sensors, video analytics at the edge and machine learning identify threats faster; workflow technologies and automation detect, investigate and remediate routine responses; cloud provides many benefits such as agility, scale and mobility; and, smartphones/digital devices provide real-time communication and collaboration. Tackling all the ‘better’ needs within a security approach is necessary – focusing on the prioritised commercial needs first. Think about how to drive radical simplification into digital transformation agendas to ensure complexity doesn’t create too many unmanageable risks. Designing enterprise security risk management into the business operating model will facilitate colleagues to be empowered for safe and secure change. Communicating security successes and breaches with commercial impact insights in a timely and concise manner across the enterprise will prove the value of active security engagement throughout digital transformation programmes. Transforming the world Digital technology is transforming the world around us, in a way that impacts every area of security. Security professionals are now businesspeople and technologists, in addition to their traditional security remits. Embracing this impacts security recruitment, training and employee engagement, within the security team and with non-security colleagues. Without a doubt, security professionals are integral to digital transformation programmes.

What are the security challenges of protecting utilities?
What are the security challenges of protecting utilities?

Utilities are an important element of critical infrastructure and, as such, must be protected to ensure that the daily lives of millions of people continue without disruption. Protecting utilities presents a unique range of challenges, whether one considers the electrical grid or telecommunications networks, the local water supply or oil and gas lines. Security technologies contribute to protecting these diverse components, but it’s not an easy job. We asked this week’s Expert Panel Roundtable: What are the security challenges of protecting utilities?

Q&A: how the ‘secret service of Hollywood’ protects celebrities
Q&A: how the ‘secret service of Hollywood’ protects celebrities

At a major music festival, a fan in the crowd aggressively leapt over a barricade to approach a famous artist. Personnel from Force Protection Agency immediately implemented extrication protocol to shield the artist from physical harm, quickly reversed course and calmly led the client away from the threat. Force Protection Agency (FPA) personnel intentionally did not engage the threatening fan in any way, as local venue security personnel were present and tasked with apprehending the rogue fan. FPA’s efforts were directed expressly toward the protection of the client, avoiding unnecessary escalation or complications and minimising physical, visual, and legal exposure. Dedicated to the safety of clients Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation Specialising in protecting celebrities and high-net-worth individuals, Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation, and dedicated to the safety and success of clients. The agency was formed in 2017 by Russell Stuart, a California State Guard officer and security and entertainment industry veteran. The agency is the culmination of 20 years of experience in the fields of security, military, emergency management, logistics and technology, media and entertainment, and celebrity management. We interviewed Russell Stuart, Founder and CEO of Force Protection Agency (FPA), which has been called “the Secret Service of Hollywood,” for his insights into providing security for celebrities. Q: What unique need in the marketplace do you seek to serve, and how are you qualified to serve it? Stuart: The needs of celebrity and high-net-worth clients are complex and constantly changing. When dealing with a high-profile individual, discretion is paramount, extensive communication is required, and adaptation is ongoing. A critical objective is anticipating and planning for all types of potential negative scenarios and preventing them from even starting, all while not disrupting the normal course of operation of the client's day or their business. Force Protection Agency is poised to serve these needs by innovating and intelligently managing the planning, procedures, and personnel used in every facet of protecting the client’s interests and achieving their objectives. Q: What is the typical level of "professionalism" among bodyguards and security professionals that protect celebrities? Why does professionalism matter, and how do you differentiate yourself on this point? Stuart: Professionalism is an overall way of approaching everything to do with the business, from recruiting, to training, to making sure the right agent is with the right client. Nothing matters more; polish and precision are not only critical to mission success, but also support the comprehensive best interest of the client while preventing costly collateral damage and additional negative consequences. True “professional protective services" is intelligent strength and proper execution, not emotional or reactionary violence. Unfortunately, the latter is frequent among many celebrity bodyguards, and often incurs extremely expensive and even dangerous repercussions. Q: Your company has been described as "the Secret Service of Hollywood." How true is that comparison, and how does your work differ from (e.g.) protecting the President? Force Protection Agency prides itself on providing its services with discretion, precision, and poise Stuart: Totally true, and for this reason: the keys to success in protection are prioritization, and planning. Most people fail to even recognise the first, negating any level of effort given to the second. Establishing the true needs and the correct priority of objectives for each individual client and situation, and firmly committing to these without deviation, are what distinguishes both government secret services and Force Protection Agency from the vast majority of general security firms. Also, the term “secret service” implies an inconspicuous yet professional approach, and Force Protection Agency prides itself on providing its services with discretion, precision, and poise. Q: What is the biggest challenge of protecting celebrities? Stuart: The very nature of celebrity is visibility and access, which always increases risk. The challenge of protecting a high-profile individual is facilitating that accessibility in a strategic and controlled manner while mitigating risk factors. A client’s personal desires and preferences can often conflict with a lowest risk scenario, so careful consideration and thorough preparation are essential, along with continual communication. Q: How does the approach to protection change from one celebrity (client) to another? What variables impact how you do your job? Stuart: The approach is largely determined by the client’s specific needs, requests and objectives. The circumstances of a client's activities, location, and other associated entities can vastly disrupt operation activities. A client may prefer a more or less obvious security presence, which can impact the quantity and proximity of personnel. Force Protection Agency coordinates extensively with numerous federal, state, and municipal government agencies, which also have a variety of influence depending on the particular locations involved and the specific client activities being engaged in.  Q: Are all your clients celebrities or what other types of "executives" do you protect – and, if so, how are those jobs different? Stuart: Force Protection Agency provides protective services for a wide range of clients, from the world’s most notable superstars to corporate executives and government representatives. We also provide private investigation services for a vast variety of clientele. Force Protection Agency creates customised solutions that surpass each individual client’s needs and circumstances. The differences between protecting a major celebrity or top business executive can be quite different or exactly the same. Although potentially not as well known in popular culture, some top CEOs have a net worth well above many famous celebrities and their security needs must reflect their success. Q: What is the role of technology in protecting famous people (including drones)? Technology is crucial to the success of security operations Stuart: Technology is crucial to the success of security operations and brings a tremendous advantage to those equipped with the best technological resources and the skills required to maximise their capabilities. It affects equipment such as communication and surveillance devices like drones, cameras, radios, detection/tracking devices, GPS, defensive weapons, protective equipment, and more. Technology also brings immense capabilities to strategic planning and logistical operations through the power of data management and is another aspect of Force Protection Agency operation that sets us apart from the competition. Q: What additional technology tools would be helpful in your work (i.e., a “technology wish list”)? Stuart: The rapidly growing and evolving realm of social media is a massive digital battlefield littered with current and potential future threats and adversaries. Most mass shooters as of late have left a trail of disturbing posts and comments across social media platforms and chat rooms that telegraphed their disturbing mindset and future attacks. A tool that could manage an intelligent search for such threats and generate additional intel through a continuous scan of all available relevant data from social media sources would be extremely useful and could potentially save many lives. Q: Anything you wish to add? Stuart: Delivering consistent excellence in protection and security is both a vital need and a tremendous responsibility. Force Protection Agency is proud of their unwavering commitment to “Defend, Enforce, Assist” and stands ready to secure and satisfy each and every client, and to preserve the life and liberty of our nation and the world.