Whoever honours the homeland Switzerland visits this museum: The Landesmuseum Zurich. A huge medieval castle, it lies in the turbulent heart of the city. The values and history of the country that are preserved by the museum deserve the utmost protection. This is ensured by the security personnel at the front desk.

The renovation of the museum (from 2013 to 2016) included a new security loggia. The goal was to ease the control and monitoring of all security systems and building technology from two desk positions, each with four / ten monitors, using a single multifunctional keyboard per desk. The solution integrated some seven different functions: Access control, management systems, video surveillance with 130 cameras, a legacy workplace from the old security counter, some pre-existing WEYTEC components and two IT system rooms. The goal was to enable the security staff to provide enhanced security in a more effective and intuitive manner.

A turnkey solution and a migration plan without interruption to ongoing operations were further requirements.

WEY Distribution Platform bundles and distributes KVM signals

A WEY Distribution Platform bundles and distributes KVM signals between the equipment in the system rooms and the security desk. The staff, located at the security desk, controls and steers all the networked sources and monitoring functions using WEYTEC SMARTtouch keyboards. Video images and other information can be switched to and displayed on the monitors with the touch of a button. The security staff has a 24/7 view of the entire museum in real time. They also manage access control, alarms and much more.

Non-disruptive migration to new systemWEY Technology assured the Landesmuseum of a seamless migration of security management to the new security loggia

One of the biggest challenges was to ensure a non-disruptive migration to the new system. The Landesmuseum remained open and was monitored continuously during the renovation and installation work. After weeks of preparation and meticulous coordination between installation technicians, the change over was completed within one day. The old security counter remained fully functional at first. Meanwhile, the two security desks in the new loggia were configured, linked to existing and new systems and finally put into operation.

WEYTEC solutions do not require any software or driver installations. They use KVM signal transmission that connects computer interfaces to KVM switches and works independently of hardware platforms and operating systems. The concept is compatible with almost any established IT infrastructure and can be implemented during ongoing operations. Thus, WEY Technology assured the Landesmuseum of a seamless migration of security management to the new security loggia.

Security operator responsibilities

Security operators at the Landesmuseum are responsible for a multitude of tasks. Among other things, they track images from 130 video cameras that monitor 6,100 sqm of exhibition space. They oversee movement and intrusion sensors, fire detectors and elevators. They control lighting, window shades and air-conditioning systems. All alarms must be processed immediately. The operators are also responsible for access control. They issue badges when someone needs to enter secure rooms. They keep track of the opening and closing of doors.

The WEYTEC SMARTtouch keyboards facilitate multitasking. They store central functions, workflows and alarm processes that are immediately available per click. Screen layouts can be arranged and re-arranged efficiently. The security personnel always have the overview of surveillance cameras, management systems and all other sources, data and applications.

Remote system rooms eliminate computers under desks

Remote system rooms eliminate computers under desks. WEYTEC recommends this solution for every control room, including the security desk in the Landesmusuem. System rooms provide a protected, air-conditioned and easy-to-maintain environment as well as room for growth. With the WEY Distribution Platform, remote computers are operated latency-free over long distances, while a single keyboard operates any number of machines. The KVM signals are transmitted via Ethernet.

The Landesmuseum maintains two system rooms. One hosts security systems and video system clients, the other facilities management, access control and office IT systems. WEYTEC seamlessly integrates new and existing equipment in both rooms into the solution infrastructure. The systems are connected to the KVM switch matrix via IP Remote transmitters located in one of the system rooms. From there, the signals are routed via IP Remote receivers to the desks and screens.

Landesmseum Zürich, Château de Prangins, Swiss History Schwyz united under Swiss National Museum

Three museums, the Landesmseum Zürich, the Château de Prangins and the Forum of Swiss History Schwyz are united under the Swiss National Museum umbrella organisation. The museums present Swiss history from its beginnings to the present day, and explore Swiss identity and the diversity of the country's history and culture.Using a single keyboard to operate all seven of our systems simplifies our work enormously"

The Landesmuseum is located in the heart of Zurich. The museum management describes the building as an "ensemble of a fine old historical building and a new sculptural wing". The edifice was first built in 1898 by the architect Gustav Gull, a pupil of Gottfried Semper. Gull drew upon a variety of historical architectural elements from the late Middle Ages to modern times and brought them together to form a whole.Everything runs more efficiently, faster and we have a better overview"

Due to a shortage of space, the Landesmuseum was expanded for the first time from 2013 to 2016. The new wing, designed by the Swiss architects Christ & Gantenbein and opened in 2016, complements Gustav Gull's building. It houses flexible exhibition halls, a modern library and an auditorium for public events. Equipped by WEY Technology, the museum's new security loggia is located at the juncture between the old and new buildings.

Operating seven security systems

Using a single keyboard to operate all seven of our systems simplifies our work enormously. Everything runs more efficiently, faster and we have a better overview. We are very satisfied", said Heinz Baumann, Head of the Security Loggia Landesmuseum Zürich. Mr. Baumann also confirms: A decisive advantage of the WEYTEC solution was its trouble-free implementation with the existing security systems. The head of the security desk at the Landesmuseum Zurich recommends that other museums use WEY Technology control room solutions.

Download PDF version

In case you missed it

Artificial intelligence is changing intrusion detection dynamics in the security industry
Artificial intelligence is changing intrusion detection dynamics in the security industry

By Paul Sun, CEO of IronYun, and Mai Truong, Marketing Manager of IronYun With the ever-growing availability of video data thanks to the low cost of high-resolution video cameras and storage, artificial intelligence (AI) and deep learning analytics now have become a necessity for the physical security industry, including access control and intrusion detection. Minimising human error and false positives are the key motivations for applying AI technologies in the security industry. What is artificial intelligence? Artificial intelligence is the ability of machines to learn from experience using a multi-layer neural network, which mimics the human brain, in order to recognise items and patterns and make decisions without human interference. The human brain is estimated to have 86 billion neurons; in comparison, the newest Nvidia GPU Volta has 21 billion transistors (the equivalence of a neuron), which offers the performance of hundreds of CPUs for deep learning.AI can learn continuously 24 hours per day every day, constantly acquiring, retaining and improving its knowledge In addition, unlike humans, AI can learn continuously 24 hours per day every day, constantly acquiring, retaining and improving its knowledge. With such enormous processing power, machines using Nvidia GPU and similar chips can now distinguish faces, animals, vehicles, languages, parts of speech, etc. Depending on the required complexity, level of details, acceptable error margin, and learning data quality, AI can learn new objects within as fast as a few seconds using Spiking Neural Network (SNN) to a few weeks using Convolution Neural Network (CNN). While both SNN and CNN offer advantages and drawbacks, they outperform tradition security systems without AI in terms of efficiency and accuracy. According to the research reports of MarketsandMarkets, the market size of perimeter intrusion detection systems is projected to increase from 4.12 billion USD in 2016 to 5.82 billion USD in 2021 at a Compound Annual Growth Rate (CAGR) of 7.1%. Meanwhile, the predicted market of AI in security (both cyber security and physical security) will grow from 3.92 billion USD in 2017 to 34.81 billion USD by 2025, i.e., with an impressive CAGR of 31.38%. Legacy perimeter intrusion detection systems Legacy perimeter intrusion detection systems (PIDSs) are typically set up with the following considerations: Geographical conditions: landscape, flora, fauna, climate (sunrise, sunset, weather conditions, etc.), whether there are undulations in the terrain that would block the field of view of cameras Presence or lack of other layers of physical protection or barriers Integration with other systems in the security network: camera, storage, other defensive lines (door, lock, alarm, etc.) Types of alarm triggers and responses System complexity: intrusion detection with various types of sensors, e.g., microwave sensors, radar sensors, vibration sensors, acoustic sensors, etc. Length of deployment Local regulations: privacy protection, whether the cameras/sensors must be visible/hidden/buried, etc., electromagnetic interferences that may affect other systems such as oil rigs or power plants Human involvement: on-site personnel arrangement, human monitoring, human action in response to alarms AI object detection can easily distinguish different types of people and objects Pain points and benefits of AI The conditions listed above correspond to certain requirements of an intrusion detection systems: minimal false alarm, easy setup and maintenance, easy integration, and stable performance.AI by nature is designed to learn, adapt itself and evolve to work in multiple conditions: it should be integrated with existing video recording systems  Minimal false alarms: False alarms lead to increased cost and inefficiency but are the main problem of PIDSs without AI technology, where animals, trees, shadows, and weather conditions may trigger the sensors. AI object detection can easily distinguish different types of people and objects, e.g., in a region set up to detect people, a car driving by, a cat walking by, or a person’s shadow will not trigger the alarm. Therefore, the amount of false alarms can be reduced by 70% to orders of magnitude. Easy setup and maintenance: Legacy PIDSs without AI must account for terrain, line of sight of cameras, sensor locations; any changes to the system would require manual effort to recalculate such factors and may disturb other components in the system. In contrast, AI PIDSs enable the system administrator to access the entire system or individual cameras from the control room, configure the region and object of interest in the field of view of cameras within minutes, and adjust with ease as often as necessary. Computing knowledge and even specific security training are not required to set up a secured PIDS with AI because AI PIDS is designed to relieve humans from knowing the inner working of machines. Easy integration with complementary technologies: Legacy PIDS without AI relies on physical technology, which are often proprietary and require complete overhaul of systems to function smoothly. On the other hand, AI by nature is designed to learn, adapt itself and evolve to work in multiple conditions, so AI PIDS is easily integrated with existing video recording (camera) and storage (NVR) systems. AI also eliminates the need for physical wireless or fiber-based sensors; instead, it functions based on the videos captured by cameras. Furthermore, AI enables easy and instantaneous combinations of multiple layers of defense, e.g., automatic triggering of door lock, camera movement focusing and access control as soon as a specified object is detected in the region of interest, all set up with a click of a button.  Stable performance and durability: Legacy PIDSs without AI requires complicated setup with multiple components in order to increase detection accuracy. More components mean a higher probability of malfunction in the system, including exposure to damages (e.g., sensors can be destroyed) and delay in detection, while human monitoring is inconsistent due to human fatigue (studies have shown that a person can concentrate in mundane tasks for only up to 20 minutes, and the attention span decreases even more rapidly when humans are faced with multiple items at once, e.g., multiple camera monitoring screens). AI significantly reduces, if not completely eliminates the need for human involvement in the intrusion detection system once it is set up. In addition, AI reduces the risk of system malfunction by simplifying the hardware sensors needed. Minimising human error and false positives are the key motivations for applying AI technologies in the security industry Additional benefits of AI in intrusion detection Artificial Intelligence is undeniably reshaping every business and weaving into every aspect of daily lifeMaximal detection capability: The most advanced AI intrusion detection system today provides an all-in-one solution to distinguish any combination of alarm-triggering criteria beyond perimeter protection. Using AI, the system administrator can configure as many zones with different settings and object of interests as necessary, which include detections for specific colors or attributes (e.g., person not wearing the required uniform or carrying food/drink), numbers and dwell time (e.g., group of more than 5 people loitering), or movements (e.g., cars moving faster than the speed limit). In addition, AI can accurately pinpoint the location of event occurrence by displaying the camera that records the event in near real time, i.e., with few-second delays. Lower security operation cost: By minimising the number of false positives and human involvement while maximising ease of use and stability, AI intrusion detection systems significantly decrease the total cost of ownership. Companies can reduce the large security personnel overhead and cost of complicated and expensive legacy PIDSs systems. McKinsey Global report in June 2017 shows that proactive AI adopters can realize up to 15% increase in profit margin across various industries. Artificial Intelligence is undeniably reshaping every business and weaving into every aspect of daily life. In security, legacy systems are giving way to AI-based systems, and the first enterprises to adopt AI-based systems will soon, if not immediately, benefit from such investment.

How successful was ISC West for exhibitors and visitors?
How successful was ISC West for exhibitors and visitors?

The reviews are in, and ISC West was another hit. Brisk attendance and a comprehensive lineup of the industry’s top companies and products contributed to another successful show for Reed Exhibitions. Our Expert Panel Roundtable, who have attended many such events, added their own reflections to the industry’s post-ISC glow. We asked this week’s Expert Panel Roundtable: How successful was ISC West 2018 for security industry exhibitors and visitors?

Live-streaming mobile surveillance takes cameras to the action
Live-streaming mobile surveillance takes cameras to the action

Video surveillance across the world is growing exponentially and its major application is in both public safety and law enforcement. Traditionally, it has been fixed surveillance where cameras provide live streams from fixed cameras situated in what is considered strategic locations. But they are limited in what they can see given by their very definition of being "fixed." The future of video surveillance includes the deployment of more mobile video surveillance with the benefits it offers. Instead of fixed cameras, this is the ability to live stream from mobile devices on the move such as body-worn cams, drones, motorbikes, cars, helicopters and in some cases, even dogs!Sending drones into the air, for example for missing people or rescue missions, is much more cost-effective than deploying helicopters Advantages of mobile surveillance The advantage of mobile surveillance is that the camera can go to where the action is, rather than relying on the action going to where the camera is. Also, sending drones into the air, for example for missing people or rescue missions, is much more cost-effective than deploying helicopters. The ability to live stream video from cars and helicopters in high-speed pursuits can be used to take some of the operational issues from the first responders on the ground and share that “life and death” responsibility with the operational team leaders back in the command centre. This allows the first responders in the pursuit vehicle to focus on minimising risk while staying in close proximity of the fleeing vehicle, with direction from a higher authority who can see for themselves in real time the issues that are being experienced, and direct accordingly. In addition to showing video live stream from a pursuit car or motorcycle, by using inbuilt GPS tracking, the video can be displayed on a map in real time, allowing a command chief to better utilise additional resource and where to deploy them, through the use of displaying mapping information with real time video feed. It allows police chiefs to make better informed decisions in highly-charged environments. The 4G phone network can now be used with compressed video to live stream cost effectively Application in emergency situations The same is true of first responders in many different emergency situations. Mobile surveillance opens up a new area of efficiencies that previously was impossible to achieve. For example, special operations can wear action body-worn cameras when doing raids, fire departments can live stream from emergency situations with both thermal and daylight cameras, and paramedics can send video streams back to hospitals allowing doctors to remotely diagnose and prepare themselves for when patients arrive at the hospital. How can special operations and emergency first responders live stream video from a mobile camera with the issues of weight, reliability and picture-quality being considered? H265 mobile video compression Law enforcement insists on secure transmissions, and it is possible to encrypt video to the highest level of security available in the public domain The 4G phone network can now be used with compressed video to live stream cost effectively. The issue of course is that 4G is not always reliable. Soliton Systems has mitigated this risk of low mobile quality in certain areas, by building an H265 mobile video compression device that can use multiple SIM cards from different cellular providers simultaneously. H265 is the latest compression technique for video, that is 50% more effective than conventional H264, and coupling this with using multiple “bonded” SIM cards provides a highly reliable connection for live-streaming high-quality HD video. The 400-gram device with an internal battery can be connected to a small action cam, and can live-stream simultaneously over at least three different cellular providers, back to a command centre. Latency is typically less than a second, and new advance improvements are looking to reduce that latency further. Encrypted video transmission What about security? Law enforcement insists on secure transmissions, and it is possible to encrypt video to the highest level of security available in the public domain, i.e. AES256.What about integration into existing video infrastructure at the command centre? It is not untypical for a police force to have an existing video management system (VMS) at their command centre such as Milestone System’s Xprotect. The Soliton range of products are ONVIF-compliant, a standard used by video surveillance cameras for interoperability, allowing cameras and video devices that are ONVIF-compliant to simply “plug&play” into existing video management systems. These mobile transmitters are deployed with law enforcement and first responders across the globe. Their ability to provide secure, full HD quality and highly-reliable video streaming within a small unit, and to enable it to be integrated into the current eco-system that is already installed at the receiving end, has made them a favourite choice with many companies and government agencies.