The recent incident at London Gatwick airport caused major travel disruption for more than a day after drones were spotted flying over this sensitive area. This incident once again highlighted the need for anti-drone technologies to address this evolving threat and secure the safety of airplanes. Following the episode, the US Federal Aviation Administration was instructed to develop a strategy to allow wider use of counter drone technologies across airports. Detecting drones, and any UAV threat...
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all o...
MedixSafe, a pioneer in the access control cabinet market, is pleased to introduce its new GS1 Gun Safe. Initially custom-built to accommodate a request from a police department looking to secure firearms, the GS1 electronically controlled cabinet is an access control solution that law enforcement, airport security staff and private gun owners alike can count on to restrict access to their firearms. Easy to manage from any computer, the MedixSafe GS1 is equipped with a stand-alone networkable T...
Security and Safety Things GmbH (SAST) will be presenting innovative use cases for security cameras at CES 2019 from January 8 to 11, 2019. These are the first to be developed on the basis of SAST’s open IoT ecosystem for the security industry. The use cases show the potential of the ecosystem for restaurants, airports and events. Within the food services sector, restaurateurs can run multiple apps and solutions on the same camera, which allows the system to count visitors and personalise...
The use of facial recognition has become a highly debated topic recently, and has increasingly and misleadingly been criticised by some for being an unethical tool used to spy on the public. The reason for such criticism is however largely due to lack of information and regulation around the technology. Used proportionately and responsibly, facial recognition can and should be a force for good. It has the ability to do a lot more to increase security in the future – from street crime to...
Qognify - the trusted advisor and technology solution provider for physical security and enterprise incident management - announced that it has completed the acquisition of the IP video management software (VMS) company - On-Net Surveillance Systems (OnSSI), including the pioneer of IP video technology - SeeTec GmbH. Backed by the global investment firm Battery Ventures, Qognify announced the agreement on December 22, 2018 and the deal closed on December 28, 2018. Expanding geographic reach Wi...
As a provider of facial recognition and other biometric, as well as information and communications technologies, NEC Corporation welcomes greater industry collaboration and effective discussion for the future of facial recognition technology and business. As a point of background, NEC produces face, iris, fingerprint, palm print, finger vein, voice and ear acoustic recognition technologies, and has over 700 biometric recognition installations in over 70 countries around the world. In recent weeks, the company has seen renewed calls for government regulation and discussions about how they as an industry can build a foundation of responsibility to protect people against discrimination, invasions of privacy and violations of human rights. NEC Corporation welcomes this debate as they believe it will lead to solutions that can make our world a better place. Furthermore, they are eager to move the discussions forward. Identifying travellers using facial recognition The Department of Homeland Security is using facial recognition technology at more than a dozen airports to positively identify travellers As more companies come forward to add their voices to this dialogue, Takashi Niino, President and CEO, NEC Corporation, believes the company will start to see new and different roles that these technologies can play in protecting and improving our global communities. In the United States, for example, the Department of Homeland Security is today using facial recognition technology at more than a dozen airports to positively identify travellers entering and exiting the United States. Three days after the technology was introduced at Dulles International Airport, an imposter was stopped using a fake document. As recently as late November, the lead architect of this system from U.S. Customs and Border Protection (CBP) reported that it had identified at least 36 imposters so far. Additionally, the first curb-to-gate biometric experience in the U.S. just launched at a major international airport terminal to a positive customer response, potentially changing the future of travel. Protecting society and securing borders NEC, therefore, supports various governments' considerations for reasonable policy, setting privacy standards for personal information and preventing unlawful discrimination related to this technology. Businesses, consumers, and the government should work together to help balance the need for privacy with the benefits of protecting our society, securing our borders and providing consumer convenience without the fear of negative consequences. NEC has a decade-long leadership position and pedigree where NIST evaluations of our facial recognition technologies are concernedAccuracy is vitally important to the effectiveness of biometric technologies. NEC is committed to the National Institute of Standards and Technology (NIST) and their evaluations. NEC has a nearly decade-long leadership position and pedigree where NIST evaluations of our facial recognition technologies are concerned, and you can read more about it on our global website. Digital Trust Business Strategy Division In addition, NEC has established a ‘Digital Trust Business Strategy Division’ to create and promote a strategy based on ‘Human Rights by Design’, considering the impact of the adoption of artificial intelligence (AI) on society and the utilisation of biometric information on human rights and privacy. NEC seeks an adoption path for these technologies that is in line with the worldwide principals of freedom, justice, rights to privacy, transparency and continuous improvement. NEC strongly believes that facial recognition can add significant value to our lives.
Pelco is pleased to announce four new combination IR/white light illuminator models to the award-winning Esprit Enhanced PTZ camera product line. These new models provide IR-only and white light/deterrent modes of operation to give you the ability to overtly capture clear full colour images when using white light direct illumination or covertly with clear black and white images when in IR-only mode. The new models are ideal for performance-oriented 24 by 7 operations as well as extreme temperature environments where fast PTZ responsiveness, wide dynamic range with variable overt and covert lighting options are key requirements. Enhancing surveillance experience The IR and white light illuminator modes enhance your surveillance experience with: The ability to switch between IR and white light as needed (manually, programmed, or via alarm). Optimised security detail with colour even in the dark, and where white light counter-acts colour distortion from light sources such as high-pressure sodium lamps. A visual white light deterrent (can be configured to come on when motion is detected, VMS is required). Applications include Public transit and cities where lighting pollution is prevalent (IR option) and the risk of vandalism is greater (white light option). Perimeter of a border. Airports, seaports, and refineries that cannot afford down time. Oil and gas operations. The four new models are offered with wiper, with wiper and pressurised unit, in both 48VDC and 100-240VAC power versions.
CeComunica, a Professional Mobile Radio (PMR) operator in Panama, is slated to launch in December a Digital Mobile Radio (DMR) Tier III trunking network supplied by Hytera, global provider of innovative PMR solutions. This new nationwide network will provide advanced and reliable mission and business critical communications services to a large number of users from sectors such as ports, airports, ground transportations, hospitality, retailing and security companies in Panama. DMR Tier III trunking network The DMR Tier III trunking network has been set up with 15 sites of Hytera DS-6210 base station and multiple models of industry-leading digital two-way radios from Hytera DMR portfolio, including PD6, PD7, PD9, X1, MD6, MD7 and its flagship Multi-mode Advanced Radio PDC760 which can provide high quality narrowband voice under DMR protocol and fast data transmission in LTE broadband. To realise the full capability and maximise the productivity, this network can interoperate with other communications systems of different technologies by adopting Hytera SmartOne solution. “We are excited to supply our DMR trunking system and facilitate CeComunica’s further penetration into the PMR operator business, and we have been looking forward to introducing more cutting-edge products and technologies for Panamanian users to increase productivity and security of their daily operation, as well as unexpected scenarios,” said Fernando Camelo, Regional Sales Director of Hytera.
Professionals visiting Airport IT & Security 2018 are invited to attend a seminar on how to optimise data from disparate systems in order to boost efficiency, improve passenger experience, and maximise investment in technology. In line with airport digitisation and unified operational centre trends, the session (14:10, Wednesday 5th December, Hilton Amsterdam Airport Schiphol) will look at how command and control software can be used to integrate and contextualise data from a wide range of systems, sensors, and devices, to deliver airport-wide situational intelligence. Learning automation software capabilities Delegates will learn how interoperability and automation software capabilities can be used to action intelligence more efficientlyDuring the ‘Keeping Pace with the Challenges of Security and Operational Efficiency’ seminar, delegates will also learn how interoperability and automation software capabilities can be used to action intelligence more efficiently. Leading the seminar will be Greg Alcorn, Divisional Director, Transport & Infrastructure at Synectics ‒ the global surveillance business responsible for developing integrated solutions such as the award-nominated security management platform employed by Terminal 3 at Jakarta’s Soekarno-Hatta International Airport. Trialling and implementing new technologies He commented: “Airports have always been pioneers when it comes to trialling and implementing new technologies, from biometrics, video analytics, and security scanning, to automated check-in, and passenger information solutions. But these systems and devices are usually deployed and managed in isolation. “The problem with this approach is that it creates benefit gaps; data from individual systems that could potentially provide greater context and insight simply falls through the cracks. Ultimately, this means airports aren’t getting maximum benefit from the data generated from the technologies they invest in and could be missing out on the opportunity to improve processes key to safety, security KPIs, and ultimately passenger satisfaction. “It is an issue that can be solved by bringing everything together into an integrated and interoperable command and control environment ‒ that’s what this session will explore.” Synergy 3 command and control solution In most cases, what’s actually meant is IA (Intelligent Automation), which is good news, because this is being fully deployed right now"Synectics (Stand 14) will also be delivering live demonstrations of its Synergy 3 command and control solution. These will show how estate-wide insight gained from unifying data can be paired with software features such as dynamic workflows in order to help airports implement digitisation and automation strategies, though not necessarily artificial intelligence. Alcorn explained: “There’s a lot of talk about how AI can and should be adopted by airports to improve specific operational aspects – especially around security – and it is becoming a valuable tool for operational support. In most cases, however, what’s actually meant is IA (Intelligent Automation), which is good news, because this is being fully deployed right now. Auto-search video footage using analytics “For instance, by integrating live data sources – including responses from operators prompted using questions based on the specific circumstances detected – an interoperable command and control solution knows to automatically dispatch additional staff to check-in because queues are exceeding specific lengths and a nearby traffic accident is likely to result in a lot of last-minute arrivals. Automated procedures can be initiated to override access control doors and initiate area lockdowns" “In an alternative scenario where a child has been reported missing, the solution can recognise the distinguishing factors ‒ such as the colour of a jumper or backpack ‒ to auto-search video footage using analytics. It can then simultaneously present the live footage to control room operators for visual verification, alert the nearest security staff, and push the relevant footage and location to their mobile device.” Securing authorised personnel-only zone “From a security perspective, automated procedures can be initiated to override access control doors and initiate area lockdowns when facial recognition and ID used don’t match in an authorised personnel-only zone. This kind of intelligent automation is what’s possible when the right integration, interoperability, and rules are applied to unified data.” Visitors to the Synectics stand will also discover how platforms such as Synergy 3 can be used to help airports collaborate more closely with third parties, for example by supporting secure, real-time evidence sharing and automated communications with emergency services, government agencies, customs units, police, local authorities, and connecting transport providers.
Ava Group, a provider of risk management services and technologies, announces new enhancements to its FFT Aura Ai-2 advanced fibre optic detection controller, which offers superior intrusion detection location accuracy together with extended range performance. The system is perfect for monitoring pipelines, perimeters and communications networks. Mark Horton, Global Sales and Marketing Director at Ava Group comments, “The Aura Ai-2 is our next generation controller and was released to industry acclaim last year, being recognised for its ground-breaking performance. However, the system has had further performance upgrades and now offers monitoring of optical distances of 80km for perimeter fence detection or 110km for pipeline or covert buried detection.” Fence mounted application “Accuracy has also been enhanced, the system can now pinpoint an intrusion location down to within +/- 2m metres on a fence mounted application. The controller is also able to cover different applications simultaneously, for example, fence mounted and covert buried detection. This essentially offers two units in one, saving on both procurement and operational costs.” The Aura Ai-2 controller works by pulsing laser light along optical fibre cables connected to each of its two detection channels The Aura Ai-2 controller works by pulsing laser light along optical fibre cables connected to each of its two detection channels. Dependent on the application these cables are either: laid adjacent to a pipeline, attached to a perimeter fence or buried along a perimeter boundary. Minute disturbances cause changes in the scattered light and the Aura Ai-2 controller automatically analyses this reflected light to detect, locate and report disturbances. Reduces nuisance alarms Advanced optical signal processing algorithms, combined with artificial intelligence, accurately and reliably analyse the reflected light to discriminate between intrusions and other causes of disturbance. This significantly reduces nuisance alarms whilst maintaining full awareness of any situation. When wired in a redundant loop configuration the two-channel controller provides cut resilience and continues to provide detection in the event of a deliberate or accidental cable cut. Dr Jim Katsifolis, CTO at Ava Group Technology Division comments, “As is the case with any fibre optic system, the key to increasing performance over distance is to maximise its optical power budget, that is, the maximum allowable optical signal loss the system can tolerate while still maintaining proper operation. We have enhanced our Aura Ai-2 platform by designing new ultra low-noise detection electronics that significantly increase its dynamic range (and consequently its optical power budget).” Protection solution for critical infrastructures “When combined with other design improvements that minimise noise while increasing detected signal strength, the Aura Ai-2 now has an industry leading power budget of 13.5 dB. We’ve achieved higher signal-to-noise ratios across the whole sensor, maximising the signals detected from both the near and far ends of the sensing fibre.” Aura Ai-2 is the ideal protection solution for critical infrastructures such as high-risk oil & gas pipelines, chemical or water pipelines As it utilises the sensitivity of fibre optic technology, Aura Ai-2 is also perfect for monitoring fibre optic communications networks. The system can monitor for tapping and tampering by connecting spare (dark) fibres inside each network cable to Aura Ai-2. Network cable disturbances, including removal of protective layers, attempted tapping or cable movement, will be instantly detected and generate an alarm indicating the location. Aura Ai-2 is the ideal protection solution for critical infrastructures such as high-risk oil & gas pipelines, chemical or water pipelines as they traverse often remote and inhospitable locations. It is also perfect for protecting long boundary perimeters alongside railway lines, airports and ports. Perimeter fence project Mark Horton added, “In the key terms of distance and accuracy, Aura Ai-2 easily outperforms its competitors and has already proven to be highly popular in the market. The system has already been chosen for a large Middle East pipeline and perimeter fence project, with the protection of both assets conveniently controlled from just one controller. In another project, the system has also been employed to monitor and alert of any rockfalls or landslides near a rail line that could endanger people or rolling stock.” Since its launch, Aura Ai-2 has already won awards including at the Securex Poland International Security Fair Awards in relation to its perimeter protection capabilities. With a combination of performance, reliability and flexibility, Aura Ai-2 is finding new and innovative uses as Mark Horton concludes, “This powerful solution has many potential uses and is already being utilised to protect the security of vital government facilities, military installations, critical infrastructure and custodial facilities.”
Evolv Technology announced Evolv Edge, its people screening system that detects weapons and bombs, has achieved the U.S. Department of Homeland Security (DHS) SAFETY Act Designation. Following a rigorous application and due diligence process by DHS, the Evolv Edge is now a Qualified Anti-Terrorism Technology (QATT). As part of the Homeland Security Act of 2002, Congress enacted the Support Anti-Terrorism by Fostering Effective Technologies Act (SAFETY Act) to provide incentives for the development and deployment of anti-terrorism technologies. The purpose of the Act is to ensure that the threat of liability does not deter potential manufacturers or sellers of effective anti-terrorism technologies from developing and commercializing technologies that could save lives. The process to obtain the SAFETY Act Designation involves extensive review of the product, its use and experience – including a review of test results; operational, manufacturing and quality assurance practices and effectiveness; and feedback from customers. Security teams look for technology, such as the Evolv Edge, that is validated by the SAFETY Act to provide peace of mind" Preventing physical security threats “The SAFETY Act Designation mitigates the impact of terrorism-related lawsuits, allowing our customers to focus on what’s most important: providing a seamless experience for their visitors and employees that help keep them safe,” said Mike Ellenbogen, CEO at Evolv Technology. “This Designation provides further validation and reassurance for Evolv Edge customers that the technology can be used effectively for its intended purpose of detecting and preventing physical security threats – ultimately helping people feel safer in places they visit.” “Venues like sports stadiums need to employ a comprehensive, multi-layered plan to ensure the safety and security of their fans, players and staff,” said Mark Sullivan, a member of the Evolv Technology Board of Directors and former director of the United States Secret Service. “Part of this effort includes carefully evaluating security technology to help protect against the kinds of threats we’re increasingly seeing in our world today. Security teams look for technology, such as the Evolv Edge, that is validated by the SAFETY Act to provide peace of mind that their technologies are working as they should, enabling them to be proactive before an event happens, and provide the safest visitor experience possible.” Hassle-free people screening Evolv Edge takes the hassle out of people screening by consistently scanning for bombs and weapons Evolv Edge takes the hassle out of people screening by consistently scanning for bombs and weapons without the need to empty pockets. The result is a positive experience for both employees and visitors. The systems have screened millions of people at many different types of venues globally including performing arts venues, sports stadiums, transportation hubs and government institutions. For example, Oakland International Airport (OAK) installed the Evolv Edge earlier this year to enhance its employee screening program; and an iconic tourist attraction with peak traffic of 13,000 visitors per day is using Evolv Edge for daily visitor screening. Evolv Edge also recently completed operational testing and evaluation by Safe Skies and was successfully tested by TNO, an internationally recognised detection and testing facility, among other certifications and awards.
Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2018. Looking back at the top articles of the year provides a decent summary of how our industry evolved this year, and even offers clues to where we’re headed in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2018 that generated the most page views. They are listed in order here with a brief excerpt. 1. U.S. President Signs Government Ban on Hikvision and Dahua Video Surveillance The ban on government uses, which takes effect ‘not later than one year after … enactment,’ applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. The bill calls for an assessment of the current presence of the banned technologies and development of a ‘phase-out plan’ to eliminate the equipment from government uses. 2. Motorola Makes a Splash with Avigilon Video Surveillance Acquisition Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as ‘a natural extension to global public safety and U.S. federal and military’ applications, according to the company. 3. Impact of Data-Driven Smart Cities on Video Surveillance One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyse data on large crowds at sporting events The IoT already accounts for swaths of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency 4. CES 2018: Security Technologies Influencing the Consumer Electronics Market Familiar players at security shows also have a presence at the Consumer Electronics Show (CES). For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? 5. SIA Predicts Top Physical Security Trends for 2018 Traditional security providers will focus more on deepening the customer experience and enhancing convenience and service. The rise of IoT also places an emphasis on cybersecurity, and security dealers will react by seeking manufacturers and technology partners with cyber-hardened network-connected devices. 6. High-Speed Visitor Screening Systems Will Improve Soft Target Security The system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. 7. How to Prevent ATM Jackpotting with Physical and Cyber Security A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and, in the last several months, the United States. Rough estimates place the total amount of global losses at up to $60 million. The safety and security world bring a complex problem to solve- how to pick out a face in a moving and changing environment and compare it to several faces of interest 8. Why We Need to Look Beyond Technology for Smart City Security Solutions Although technology is necessary for an urban area to transition in to a safe and smart city, technology alone isn’t sufficient. Truly smart cities are savvy cities and that includes how they employ software, sensing, communications and other technologies to meet their needs. 9. How New Video Surveillance Technology Boosts Airport Security and Operations Employing airport security solutions is a complex situation with myriad government, state and local rules and regulations that need to be addressed while ensuring the comfort needs of passengers. Airport security is further challenged with improving and increasing operational efficiencies, as budgets are always an issue. As an example, security and operational data must be easily shared with other airport departments and local agencies such as police, customs, emergency response and airport operations to drive a more proactive approach across the organisation. 10. The Evolution of Facial Recognition from Body-Cams to Video Surveillance The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve.
Consolidation persisted in the physical security industry in 2018, and big companies such as Motorola, Canon and UTC continued to make moves. Also among the mergers and acquisitions (M&A) news in 2018 was a high-profile bankruptcy (that ended well), continuing consolidation in the integrator market, and the creation of a new entity called “LenelS2.” Here’s a look at the Top 10 M&A stories in 2018: 1. Motorola acquires Avigilon Motorola Solutions announced in February that it had entered into a definitive agreement to acquire video surveillance provider Avigilon in an all-cash transaction that enhances Motorola Solutions’ portfolio of mission-critical communications technologies. Avigilon products are used by a range of commercial and government customers including critical infrastructure, airports, government facilities, public venues, healthcare centers and retail. The company holds more than 750 U.S. and international patents. 2. UTC Climate, Control & Security buys S2 Security UTC Climate, Controls & Security agreed in September to acquire S2 Security, a developer of unified security and video management solutions. UTC subsequently combined S2 with its Lenel brand to create LenelS2, “a global leader in advanced access control systems and services” with “complementary strengths.” 3. Costar Technologies acquires Arecont Vision after bankruptcy Arecont Vision, the provider of IP-based megapixel camera and video surveillance solutions, announced in July that the acquisition by Costar Technologies, Inc. of its assets had been approved by the bankruptcy court. After the closing of the sale, the company began operating as Arecont Vision Costar, LLC and is part of Costar, a U.S. corporation that designs, develops, manufactures, and distributes a range of products for the video surveillance and machine vision markets. 4. Allegion acquires access control company ISONAS Allegion plc, a security products and solutions provider, agreed in June to acquire ISONAS through one of its subsidiaries. ISONAS’ edge-computing technology provides access control solutions for non-residential markets. ISONAS' devices – like its integrated reader-controllers – utilise power over ethernet, making them easy to install and cost effective as they utilise existing customer infrastructures. The company is based in Boulder, Colo. 5. HID buys Crossmatch for Biometrics HID Global announced that it had acquired Crossmatch, a provider of biometric identity management and secure authentication solutions, from Francisco Partners. Crossmatch’s portfolio of products includes biometric identity management hardware and software that complement HID’s broad portfolio of trusted identity products and services. 6. BriefCam announces acquisition by Canon BriefCam, a global provider of video synopsis and deep learning solutions, announced its acquisition in May by Canon Inc., a global digital imaging solutions company. The addition of BriefCam to Canon’s network video solutions products portfolio complements the Canon Group’s previous acquisitions of Axis Communications and Milestone Systems. 7. Allied Universal acquires U.S. Security Associates Allied Universal, a security and facility services company, finalised its acquisition of U.S. Security Associates (USSA) in October, further building on its position in the security services industry. This acquisition includes Andrews International (including its Government Services Division and Consulting and Investigations and International Division) and Staff Pro. 8. Johnson Controls acquires Smartvue Corp. Johnson Controls announced in April that it had acquired Smartvue, a global IoT and video provider that empowers cloud video surveillance and IoT video services. The addition of the Smartvue cloud-based video platform will enhance Johnson Controls’ offering of an end-to-end, smart cloud-based solution that can provide superior business data and intelligence to customers and added value to partners. 9. ADT acquires Red Hawk Fire & Security (and others) ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., was the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so. 10. Convergint Technologies continues to acquire Convergint Technologies announced in August the acquisition of New Jersey-based Access Control Technologies (ACT), bringing further electronic security systems experience to Convergint's service capabilities. Convergint has strategically grown its service footprint across the United States, Canada, Europe and Asia Pacific through strong organic growth and the completion of 18 acquisitions since early 2016. And it continues: Convergint announced acquisition of SI Technologies, Albany, N.Y., in November and Firstline Security Integration (FSI), Anaheim, Calif., in December. (And Convergint itself was acquired in February by private equity group Ares Management.)
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology overview and early adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations at critical infrastructure sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation and advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New market opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-sensor thermal solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
Several recent terrorist and mass violence attacks have been directed at soft targets, or relatively unprotected locations where people gather such as outside a music venue or in the unscreened passenger areas at airports. Attacks in public areas have led to the development of new security technologies aimed at protecting soft targets. One company addressing the challenges is Evolv Technology and its Edge automated high-speed personnel screening solution. The system integrates walkthrough firearm and explosive detection for high-throughput protection of events and soft targets.The Edge system has multiple detection sensitivity settings to respond to various threat scenarios Enhanced visitor experience The system seeks to increase security without compromising the ‘customer experience’. People simply walk through single-file – between two 5-foot-tall stanchions. One lane can screen up to 800 people per hour, and the system detects explosives or metallic objects without the need for pat-downs or wands or other invasive procedures. Any personal belongings can remain in visitors’ pockets. A single security guard is needed for each lane to verify any detected threats. “The system combines an improved security posture with a better visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. “We need to fly and have been trained to be screened at the airport, but we don’t expect to be screened going to see a ball game or a Mozart concert. Evolv recognised a need for a new way to inspect people before they enter these types of facilities. It’s a seamless system that pulls various technologies together. We want to feel safe but without having to sacrifice the quality of the experience.”Screening analytics provide data on the numbers of people screened by time of day and by result The system combines millimetre wave and magnetic field sensors, along with artificial intelligence (AI)/ machine learning and can incorporate additional data such as biometrics. Known bad actors can be identified using facial recognition. The system has multiple detection sensitivity settings to respond to various threat scenarios. Expanding perimeter protection A security guard provides the human touch by verifying any threats detected by the system. The locations of concealed items are displayed on a photo of the individual using a color-coded box overlay. Screening analytics provide data on the numbers of people screened by time of day and by result. Ellenbogen says the company is working to have the system adopted at entertainment venues, performing arts centres, sports centres, for air and rail transportation, and to protect high-profile government buildings. The Edge system can expand the protected perimeter to a wider area that was previously unprotected. The Edge system can expand the protected perimeter to a wider area that was previously unprotected For example, concert-goers exited the arena of an Ariana Grande concert May 22, 2017, in Manchester, U.K., and entered the surrounding area that was unscreened and unsecured. Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack.Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack Threat mitigation with soft target approach Likewise, a 2016 bombing at the Brussels Airport occurred in the departure hall outside the passenger screening areas. Securing a wider perimeter – for example, screening customers discreetly as they enter the airport building from a parking area – could have provided additional security against such an attack. Ellenbogen confirms Evolv has sold a number of systems to major European airports to screen visitors and passengers as they enter the front door. “Addressing the threat to an airport or train system is different than screening passengers; we are looking for different types of objects and different types of materials. The idea is to be able to detect threats to a venue before they get into the venue.” The soft target approach can also be applied to public buildings, such as courthouses, and used in lieu of more invasive metal detectors and x-ray machines. The portability of the Edge system enables a ‘pop-up’ approach to security – i.e., to relocate the system to address specific or changing security threats easily. The self-contained system only requires a wall plug. Labour reduction (because of faster throughput) can help offset the system costs but it’s difficult to quantify the improvement in the visitor experienceImproving security posture at event venues “It’s surprising the level of importance [venue owners] put on the visitor experience,” says Ellenbogen. “They see that their brand starts at the front door. They are eager to find alternative security solutions that come across as more inviting, less imposing, less closed down, less invasive than the solutions they have been using,” he says. “They are driven by a desire to improve the visitor experience as they improve the security posture.” He says current events, including terrorist attacks and mass shootings, drive awareness among venue owners to improve the security of soft targets. “The level of interest is high, and it spikes somewhat when there is a big headline,” Ellenbogen says. He notes that the system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labour reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” Ellenbogen says.
There’s a new big player – and familiar household name – coming into the security marketplace with the announcement of Motorola’s intent to acquire Canadian video manufacturer Avigilon Corporation, provider of video surveillance and analytics. Motorola Solutions points to an “avalanche of video in public and private sectors” as a motivation for the acquisition. Motorola Solutions’ dominance in the public safety market – where the Chicago company supplies police technologies, radios and other products – will provide new opportunities for Avigilon in a realm where it previously has not been dominant. Avigilon has millions of cameras deployed across airports, rail, streets, and public and private buildings. Meanwhile, Avigilon will “bring [its] advanced video surveillance and analytics platform to [Motorola’s] rapidly evolving public safety workflow,” according to Motorola, and enhance the larger company’s portfolio of “mission-critical communications technologies.” Avigilon’s end-to-end security and video surveillance platform includes cameras, analytics, video management and video storage. Avigilon has millions of cameras deployed across airports, rail, streets, and public and private buildings The broader solution Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as “a natural extension to global public safety and U.S. federal and military” applications, according to the company. The all-cash deal pays CAD$27.00 per share of Avigilon, and totals approximately $1 billion including Avigilon’s net debt. Not a bad price considering Avigilon’s stock price has traded as low as $13 a share in the last year. Avigilon has 1,200 employees with locations in Vancouver and Richmond, British Columbia, and Dallas and Plano, Texas. Revenue was $354 million in 2016. The transaction is expected to be completed in Q2 of 2018. Deploying pre-engineered solutions As an innovator in the security market, Avigilon has spearheaded an end-to-end solutions approach. Their success has even prompted some component manufacturers to expand their proposition into a broader “solutions” sale. Led largely by Avigilon, the industry pendulum has swung toward the simplicity of deploying pre-engineered end-to-end solutions. Open systems integrated using best-in-breed components from several manufacturers still have their devotees, and are needed in some situations, but Avigilon has made a strong case for the end-to-end alternative. Others have followed. The all-cash deal pays CAD$27.00 per share of Avigilon, and totals approximately $1 billion including Avigilon’s net debt Avigilon has also lately been a leader in implementing artificial intelligence and deep learning, including Appearance Search technology that can locate a vehicle or person from video across a site. Avigilon’s video surveillance platform seeks to transform video from reactive – looking back at what has taken place – to proactive, issuing alerts in real time. Avigilon also recently introduced Avigilon Blue cloud service platform to enable video system users to manage more sites with fewer resources. Investing and building Motorola is not a completely new name to the security market. Old-timers will remember Motorola Indala, a previous presence in the RFID access control market that was sold to HID Corp. in 2001. More recently, Motorola Solutions has invested in Vidsys, a provider of converged security and information management (CSIM) software and has implemented Vidsys CSIM through its Protect Series unified platform that aggregates and analyses information from multiple inputs for military and federal government properties. Motorola is also known as the inventor of the Six Sigma quality improvement process - and commitment to quality plays well among security integrators and end users. Motorola would presumably continue Avigilon’s licensing program, but rules-based video analytics patents’ importance may fade Avigilon owns 750 U.S. and international patents, including some covering basic underlying principles of video analytics, for which several video companies currently pay licence fees. Motorola would presumably continue the licensing program, although the importance of rules-based video analytics patents may fade as new deep learning and artificial intelligence (AI) approaches to video analytics emerge. Channel conflict A possible concern surrounding the acquisition is the issue of channel conflict. When it comes to larger end user customers, Motorola has embraced a direct-to-user approach that could be problematic in the eyes of Avigilon’s 2,000 resellers. Among the benefits Motorola says they bring to the table is the ability to “leverage [their] direct enterprise safes force for large deals.” They also say they “complement Avigilon’s channel with [Motorola’s] channel network.” The security industry has a spotty history of larger companies entering the market to buy existing businesses. Some have been a good fit, while others have not. The entrepreneurial spirit of more than one successful security company has suffered under larger corporate ownership, sometimes withering as new corporate overlords cut costs and stifle R&D. The more successful recent large acquisitions in our market – notably Canon’s acquisition of Milestone Systems and Axis Communications – have worked well because the acquired companies have retained some degree of independence and preserved the existing corporate culture. In the case of Motorola and Avigilon, obviously, time will tell.
A USB drive from Heathrow Airport, found on a London street in late October, contained confidential information about accessing restricted areas at the airport and security measures used to protect the Queen. The drive also contained a timetable for anti-terrorism patrols at the airport and documentation of the ultrasound system used by Heathrow security to check perimeter fences and runways for breaches. The data was not encrypted, and the London resident who found it turned it over to a newspaper reporter. How cybersecurity impacts physical security The incident highlights a number of issues for security professionals. One is the interrelated nature of cybersecurity and physical security, and how a failure of one can directly impact the other. Another is extending cybersecurity outside the firewall, considering the inherent risks of USB drives and the need to manage “endpoint security,” such as restricting access to a system’s USB ports. An important security failure in the case of the Heathrow incident was lack of encryption of the USB drive, says Ruben Lugo, Strategic Product Marketing Manager at Kingston Technology, which provides a line of USB drives with hardware-based encryption. “If you block out all the USB ports, it can restrict productivity, and employees are not as efficient as they should be,” says Lugo. He says companies should be using more encrypted USB drives to combine the productivity advantages of allowing USB access while protecting the information on the drives. Data protection regulations Protection of data – whether inside the firewall or outside – is increasingly important in an age of greater cybersecurity regulation. The European Union's General Data Protection Regulation (GDPR) creates new safeguards and requirements for protecting personal data, with a compliance deadline of May 25, 2018, after which noncompliance can result in expensive fines. A disgruntled employee used a USB drive to steal banking information for 30,000 people, as published by Tom Brant in: “Report: FDIC Employees Caused Repeated Security Breaches,” PC Magazine, July 15, 2016 Regulations also include New York State's 23NYCR500 cybersecurity requirements that financial services companies protect customer information and related IT systems. The New York regulation requires each company to assess its specific risk profile and design a programme to address its risks, ensuring the safety and soundness of the institution and protecting customers. Hardware-based encryption Providing a cybersecurity tool, Kingston highlighted its hardware-based encrypted USB drives at the recent ASIS show in Dallas. A USB drive with hardware-based encryption is self-contained and doesn’t require a software element on the host computer. No software vulnerability eliminates the possibility of brute-force, sniffing and memory hash attacks. Digitally signed firmware cannot be altered, and there is a physical layer of protection, too. The drives come in epoxy-dipped/filled cases that prevent access to the physical memory. In contrast, a USB drive with software encryption uses software that runs on the host computer and is vulnerable to attacks. The use of AES 256-bit encryption in XTS mode ensures that anyone who finds a USB drive, such as the man in London, cannot access the information. The drive wipes itself clean after 10 attempts of guessing the password. “Encrypted drives are not complicated,” says Lugo. “They are a simple solution that anyone can implement.” Kingston’s encrypted USB drives are priced between $40 and $600, depending on the capacity and covering needs ranging from a small business owner to military- and government-grade products. Kingston also provides products for use inside the firewall, including business and enterprise solid state drives (SSDs), offering high density and extreme performance, and their server premier DRAM memory products providing performance and flexibility. To learn more about Kingston, please visit www.kingston.com
The Eurofighter will be equipped with a new generation of radar which will enhance the aircraft’s capabilities and survivability. In the Euroradar consortium, the sensor solutions provider HENSOLDT is pressing ahead with the development of the Eurofighter’s new Captor-E radar system. Following the successful acceptance test, HENSOLDT has now delivered the second antenna ready for series production to Leonardo UK in Edinburgh. This means that the production of the so-called e-scan antenna can commence at the HENSOLDT site in Ulm/Germany according to plan. This paves the way for the delivery of the first radar systems as of mid-2019. Resource management As early as spring 2018, the radar has successfully completed two flight campaigns at British Aerospace Systems (BAES) in Warton and at Airbus Defence and Space in Manching and met the requirements of the Critical Design Review (CDR) exactly on schedule. The Captor-E radar is based on AESA (Active Electronically Scanned Array) technology and will significantly enhance the performance of the Eurofighter The Captor-E radar is based on AESA (Active Electronically Scanned Array) technology and will significantly enhance the performance of the Eurofighter. Electronic beam scanning combined with flexible radar resource management provide outstanding detection performance and ensure simultaneous multi-target tracking, missile guidance and perception of the situation. The Eurofighter’s nose is larger than that of all the comparable fighters, which means that the antenna is much larger and consequently more powerful than that of competing aircraft. Radio-frequency components This, together with the ability to mechanically rotate the antenna with a larger angle of view, increases both the detection area and the field of regard in comparison with the AESA radar systems used by the competitors. The further development of radar technology is one of the main focal points of the sensor specialist HENSOLDT. For this reason, HENSOLDT operates one of the largest cleanroom production lines for radio-frequency components in Europe. HENSOLDT’s radar systems are deployed worldwide by armed forces, including the US and German Navy, as well as at the bases of the Canadian, Australian and German Air Force. The Eurofighter radar is being developed by the Euroradar consortium comprising Leonardo (Great Britain, Italy), Indra (Spain) and HENSOLDT (Germany). The consortium has already developed and produced more than 400 Captor radars.
Apstec Systems announces that its Human Security Radar (HSR), the first fully automatic real-time mass people screening solution, has been selected by Esenboga Airport, Ankara, to significantly boost security in land side areas. Chosen following a rigorous selection process, including a pilot installation, HSR will be installed at the terminal entrances as part of ongoing security enhancement measures by the Turkish State Airports Authority. It will enable people screening without slowing down the flow of traffic, with each system capable of scanning up to 10,000 individuals per hour. The technology was deployed in partnership with local distributer AKBA. Cost-effective solution The devastating attacks on Ataturk Airport in Istanbul and Brussels Airport highlighted the vulnerability of the land side of airports to terrorism The devastating attacks on Ataturk Airport in Istanbul and Brussels Airport highlighted the vulnerability of the land side of airports to terrorism. Since these events there has been global interest in securing the land side of airports, but traditional aviation style security checkpoints or manual searches, which scan one individual at a time, are not suited to purpose and result in large queues of passengers, which are vulnerable to attack in their own right. With existing approaches to security screening providing impractical, inconvenient and expensive to operate, terminals have remained susceptible to attack, or are subject to intrusive and disruptive security screening regimes. HSR was designed to address this challenge, and offers a practical and cost-effective solution to security screening in such high footfall scenarios. Enhanced security measures The first fully automated, real-time mass screening solution, HSR provides seamless security to protect public places from terrorist attacks. The walkthrough system uniquely combines unparalleled high throughput, speed and accuracy, simultaneously screening multiple subjects in real-time for threats, without the need for an operator to inspect suspect materials. With 40,000 passengers traveling through Esenboga Airport every day, the deployment of HSR will be instrumental in improving security for millions of people. Through deploying HSR as part of its commitment to terminal safety and enhanced security measures" “HSR constitutes a major breakthrough in the way airports protect the land side of terminals,” commented Osman Aksoy & Sirzat Balin,Co-Founders, AKBA. “Through deploying HSR as part of its commitment to terminal safety and enhanced security measures, the Turkish Airport Authority has taken a major step to prevent the reoccurrence of terrorist attacks.” Mass transport hubs Esenboga Airport’s uptake of HSR is the latest major deployment of the technology, which is currently utilised by some of the world’s largest airports, as well as sports stadiums, entertainment venues, mass transport hubs and networks, places of worship, hotels and high-end retail and entertainment centres. “HSR is proven to dramatically improve safety in crowded public spaces, and enables venue owners to close a critical security capability gap,” added Gregory Labzovsky, CEO, Apstec. “We’re therefore delighted to be working with Esenboga Airport to enhance safety for millions of travellers. AKBA, our distributor in Turkey, were instrumental in helping the Turkish Authorities understand the potential of HSR.”
The Hong Kong-Zhuhai-Macao Bridge relies on customised security solutions from Bosch to ensure safe operations. The world’s largest sea-crossing bridge was opened by Chinese officials late October 2018. Spanning 55 kilometres in length, the Hong Kong-Zhuhai-Macao Bridge directly connects Hong Kong to Macao and then to the Chinese city of Zhuhai for the first time. At a total cost of USD 20 billion, it is a major boost for China’s Greater Bay Area, an emerging industrial and technological hotbed that is home to 68 million people and a showcase project for Bosch Building Technologies. Equipping critical infrastructures The large-scale project was built over the course of eight years using 400,000 tons of steel and includes underwater tunnels and two artificial islands that serve as customs ports. Ensuring the security of these two islands, where drivers need to present special permits to use the new bridge and pass customs checkpoints, was a priority from the start. Bosch Building Technologies won the contract to provide the artificial islands with video surveillance, intrusion alarms With a proven track record of equipping critical infrastructures such as airports, hotels, commercial buildings and underground metros, Bosch Building Technologies won the contract to provide the artificial islands with video surveillance, intrusion alarms, as well as public address and voice evacuation systems. On the island between Zhuhai and Macao, the Bosch partner Shanghai SAGA Electronic Technology Co., Ltd. installed more than 5,700 Bosch loudspeakers and over 260 amplifiers which are all managed via the PRAESIDEO Digital Public Address and Emergency Sound system. Custom-ordering solutions Fulfilling a key customer request, the installation incorporates 15 different models of ceiling, wall mount, and line array speakers to blend in with the facility’s modern interior. Furthermore, Bosch was able to match Macao’s local standards by custom-ordering solutions with British power cord, programmed with graphic interfaces in traditional Chinese lettering. On the island outside of Hong Kong, which is home to a customs clearance port, Bosch partner Pro-United Co., Ltd. installed 2,200 public address speakers of various models, including outdoor speakers for the travel inspection building. Experts also adjusted 200 vari-directional array loudspeakers to balance sound variations from different building materials. Live voice announcements “The Bosch technical team and partners used professional software to simulate the sound pressure level of a specific area and comprehensively simulate the entire project to ensure that the selected products can meet the requirements of different areas in the actual application,” said Lin Lizhi, Bosch Building Technologies. Bosch also covered the island with more than 2,000 HD cameras including the FLEXIDOME, DINION, and AUTODOME series. The PRAESIDEO systems on both islands enable security staff to broadcast live voice announcements via security call points Monitored from a security control center on the Hong Kong-side of the island, these cameras support 24/7 surveillance of the customs clearance port, travel inspection building, Immigration Department and Hong Kong Customs Office. The PRAESIDEO systems on both islands enable security staff to broadcast live voice announcements via security call points, while multiple sets of intrusion alarm systems protect personnel and property. Broad customisation options “We added the supporting intelligent call station PRAESIDEO, which is usually used for airport projects, in order to ensure that the staff can directly perform voice broadcasts throughout the call station during operation, thus making the security management more convenient,” said Wang Yiping, Deputy General Manager of Shanghai SAGA Electronic Technology Co., Ltd. The high-profile infrastructure project highlights the flexibility and broad customisation options offered by Bosch Building Technologies as a one-stop solutions provider. Now that it is fully operational, the Hong Kong-Zhuhai-Macao Bridge is already considered a key asset in the Greater Bay Area, also known as ‘China’s Silicon Valley’. The bridge reduces the travel time between Zhuhai and Hong Kong from four hours to a mere 30 minutes. It also creates a new gateway for travellers between vital transportation hubs such as Shenzhen and Hong Kong airports with the integrated Bosch security solutions ensuring a safe passage.
Teleste Corporation reveals that its S-AWARE platform has been selected by Helsinki City Transport to drive improved situational awareness and safer travelling across the Helsinki metro system. The deployment of the platform will be started in 2019 and the project will be carried out in several phases and be completed at the end of the year 2020. The total value of the deployment will be more than two million euros. “We are delighted to expand our long-term cooperation with Helsinki City Transport on developing smart and safe public transport in the Helsinki metropolitan area. The rapidly growing urbanisation challenges public transport operators throughout the world to find solutions that can provide enhanced operational control and tools to increase safety in public places. Adding situational awareness through intelligent public transport systems is one of the key methods the operators can use to reach the target,” stated Esa Harju, Head of Teleste’s Video Security and Information Business unit. Prioritizing passenger safety Every year, over 80 million passengers and commuters enjoy travelling in the system, which forms the northernmost metro in the world During recent years, the Helsinki Metro has undergone several upgrades and major extensions. Today, it includes more than 20 stations in Helsinki and its neighbouring cities and serves the capital region of Finland with hundreds of thousands of daily rides. Every year, over 80 million passengers and commuters enjoy travelling in the system, which forms the northernmost metro in the world. Keeping the safety and security of the passengers and the entire metro system in mind, Helsinki City Transport is adopting Teleste’s S-AWARE platform to develop their response capabilities and to ensure a high service level, e.g., during possible security failures, alerts and states of emergency, as well as in other complex or critical situations. Safe and attractive travelling experience “Helsinki Metro is being developed to bring seamless mobility to the growing metropolitan area. At Helsinki City Transport, our mission is to continue building an increasingly effective and highly functional metro system that provides a safe and attractive travelling experience for our customers in their everyday life,“ told Ville Lehmuskoski, CEO, Helsinki City Transport. Teleste S-AWARE platform has been designed to help enhance efficiency, safety and security in public transportation, airports, critical infrastructure The Teleste S-AWARE platform has been designed to help enhance efficiency, safety and security in public transportation, airports, critical infrastructure and in the governmental sector. The platform works by collecting real-time information from various subsystems, data sources and sensory inputs, and it displays a unified and real-time view of the whole operational infrastructure. This provides for the improved understanding of what is happening in the surroundings and creates grounds for sharp and efficient decision-making. Smart incident management In addition, the platform can be used to pre-define automated operating procedures for efficient and smart incident management, hence ensuring that corrective action is immediately taken when unexpected incidents occur. The advanced reporting, debriefing and training tools ensure that the system can be used to project future events and be prepared for exceptional situations. Teleste’s deployment to Helsinki City Transport will also enable efficient use of the system for multiple other operators, including the police, fire and rescue forces, Helsinki Regional Transport Authority, and the cities of Helsinki and Espoo. Delivering the right information to the right people at the right time, the system is harnessed with high information and data security that guarantees protection from any unauthorised access.
Vega Systems Inc. has announced that their Redundancy Management Framework (RMF) software has begun operations at a prominent airport in the Middle East. The airport surveillance software plugin for Milestone XProtect enhances video security. Typically, without the software system, video surveillance down-times at critical infrastructure locations have the potential to create security loopholes. Vega Systems' RMF reduces live video disruption to milliseconds during server failure episodes while simultaneously providing uninterrupted access to all archived footage. This, along with other beneficial features, mitigates the impact of server failures on security. Vega Systems' RMF RMF is a novel, few-to-all approach towards enhancing XProtect Recording Server Redundancy through dual recording. A few redundant servers can handle concurrent failures of all primary servers. Offering a live view recovery almost instantaneously following the recording server failure, the system works two orders of magnitude faster than fail-over recording. RMF is a result of collaboration between Vega Systems Inc in San Jose, California, Sunjin Infotech based in Seoul, South Korea, and Milestone Systems' Middle East offices. The product is a plug-in framework for the Canon subsidiary Milestone Systems' XProtect software.
Dallmeier offers comprehensive security solutions for all areas of application around airports. Specifically, in the area of cameras a wide range of systems allow customers to tackle all of their safety and security challenges and be able to comply fully with operational and regulatory requirements. On top of that, Dallmeier supplies video management solutions that not only give operators an exhaustive overview of security-relevant events, but also allow the video data to be analysed with a view to optimising business processes such as ground handling operations. One of the paramount concerns for airports is perimeter protection; an issue, which was highlighted by a number of recent incidents involving unauthorised access onto airfields. It is important to be able to use video system to track an intruder, but the ultimate goal is to prevent an intrusion in the first place. IR cameras with integrated IR illumination With its range of high-performance IR cameras with integrated IR illumination, Dallmeier offers the right solution for every area of applications across airports IR cameras are a key component of any video security system that must provide around-the-clock monitoring capabilities, and the Dallmeier line of advanced IR cameras is ideally suited for that. With its range of high-performance IR cameras with integrated IR illumination, Dallmeier offers the right solution for every area of applications across airports. The IR cameras are designed specifically for applications requiring images with highest resolution in real-time at day and in the IR mode at night. Dimly lit areas on the apron or sections along the airport perimeter, which might only be lit in case lighting systems are triggered by movement, are among the many possible applications. Multi-focal sensor technology Panomera Airports typically encompass wide areas and stretch over long distances, which poses particular challenges for video monitoring system. In the past, in order to adequately monitor the entire area, it was necessary to use a number of cameras installed in a whole range of locations. Dallmeier’s multifocal sensor system Panomera, however, represents an entirely new technology and a fundamentally different approach to the issue of video security. The patented multi-focal sensor technology Panomera from Dallmeier is the ideal video solution for landside and airside safety and security. It was specially developed for the all-encompassing video surveillance of expansive areas. With Panomera, huge widths, as well as areas with large distances can be displayed with a completely new resolution quality, in real time and at high frame rates of up to 30 fps. With Panomera, a huge area can be surveyed from a single location and depending on the customer’s needs, the resolution can be scaled nearly limitlessly. For example, one Panomera system equipped with eight sensors is sufficient to replace up to 35 standard megapixel cameras. Optimising airport operations Panomera offers unique capabilities for optimising airport operations, such as aircraft turnaround time, as well as monitoring airfield traffic on both aprons and runways Moreover, in conjunction with intelligently designed video management and analysis systems, Panomera offers unique capabilities for optimising airport operations, such as aircraft turnaround time, as well as monitoring airfield traffic on both aprons and runways (e.g. ground support equipment on the way to restocking aircraft galleys). The fact security personnel are provided with a comprehensive overview of the entire airport, regardless of where their individual focus may at any given time, means that they can react quickly to any incidents. Video technology can therefore assist airports with the implementation of the Europe-wide optimisation concept of Airport Collaborative Decision Making (A-CDM), which is supported by a number of organisations including the European Organisations for the Safety of Air Navigation (EUROCONTROL) and the Airport Council International Europe. The latter represents over 500 airports from 45 European countries. A-CDM specifically aims to enhance the operational efficiency of airports, which opens up various application areas for video technology. Proactive video monitoring as is enabled by the Dallmeier video information systems, instead of passive surveillance, is the way forward across different industries - including airports.