Two separate divisions of VPS (UK) Ltd are combining to operate under a new banner of VPS Security Services. Their Property division, providing protection for people, property and assets for over 25 years, will merge with their Site Security unit, which specialises in securing construction sites, utilities and assets in remote, challenging environments. Bluetooth-enabled Smart Door and Smart Alarms "We have the widest range of security options in the business, combining the highest qual...
Bold Communications, a developer of alarm communications and management systems, has announced a new technology partnership with Openview Security Solutions, the UK’S largest privately-owned independent security company and provider of integrated control room systems. The two companies already have a proven track record of working together on a number of high-profile public sector projects including Loughborough University, Stockport Homes and the City of Cardiff. This new partnership wil...
CHeKT announces a partnership with OPTEX, the supplier of outdoor sensors for intrusion security. CHeKT delivers a visual-monitoring platform for alarm monitoring centres. This partnership with Optex will significantly advance the protection capabilities of security integrators globally. The solution relies on ‘The CHeKT Bridge’, the first product brought to market by CHeKT. With years of development, the CHeKT Bridge premiered in April 2018 at the ISC West trade show. The vision of...
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all o...
GJD has hit the ground running in 2019 with the appointment of Jason Hill as the company’s Commercial Director. Mark Tibbenham, Managing Director of GJD has big plans for the British manufacturer of external motion detectors and LED illuminators, and has recruited Jason Hill to help deliver on his aspirations. GJD expands in the US Commenting on the new appointment, Mark said: “Even though we were 2017 recipients of the Queens Award for Enterprise, International Trade there are a s...
OpenView Security Solutions, the UK’S largest privately-owned independent security company and a national supplier of fire, electrical and mechanical services, has announced the appointment of Richard Stanley as Group Commercial Director. Supporting high value contracts Richard joined OpenView in 2002 in a project management role and has subsequently held key contract and commercial positions within the business. In this new role, he will be responsible for building the company’s c...
SeeTec, provider of video management software solutions in Europe, launches the second release of its products in 2018. The recent version R13 of the video management software SeeTec Cayuga comes with a new interface to unleash the software’s full potential in integrated security ecosystems, generating significant added value for corporate and enterprise customers. SeeTec BVI, the customisable video solution to support business processes, undergoes a paradigm shift towards real-time operations. One of the key benefits of SeeTec Cayuga has always been its flexibility to hook up to security ecosystems via interfaces and integrations. With its latest release R13, SeeTec now unveils an innovative tool, which makes it even easier to create comprehensive environments consisting of multiple systems and applications communicating with each other. The extension of the SeeTec Analysis Interface supports the integration of any edge or server-based license plate recognition solutionThe SeeTec Event Interface (SEI) breaks new ground to connect the SeeTec Cayuga video management software to third-party security products using a flexible, driver-based approach. All events from third-party applications such as access control, burglar alarm and many more can now be visualised within the VMS, for example by displaying them in maps and floor plans or opening the relevant camera streams. Implementation of integrated security systems This gives system operators a much better overview, reducing the reaction time in case of critical incidents significantly. Andreas Conrad, Marketing Director at SeeTec, explains a further benefit of the new interface: “As the SEI is a well-documented and open interface, technology and solution partners are now able to easily develop plugins by themselves to connect SeeTec Cayuga with their product portfolios. “This facilitates the implementation of integrated security systems, providing added value especially for corporate and enterprise customers. Furthermore, it underlines the solution-based approach of SeeTec.” Another essential move into this direction is the extension of the SeeTec Analysis Interface, which now also supports the integration of any edge or server-based license plate recognition solution on the market. Improved video backup, failover and performance An improved notification system provides full transparency about the status of scheduled and ongoing backupsAmongst the usability features implemented in R13, the video backup functionality within SeeTec Cayuga received a major revamp. It allows the automatic backup of video recordings based on time schedules or – which is new – on event triggers. If a backup operation is interrupted (e.g. when using Wi-Fi connections to offload data from mobile units such as trains or trams), it can be resumed automatically. An improved notification system provides full transparency about the status of scheduled and ongoing backups. In addition, many smaller improvements and functionalities are part of the release, providing added value and improved usability. Especially in critical infrastructure projects, continuous recording even in case of a server breakdown is crucial. To keep recording gaps at an absolute minimum, SeeTec Cayuga R13 now supports mirrored recording, which means that the video streams coming from the cameras can be recorded simultaneously on two servers. Furthermore, the playback of archive footage has been optimised, now allowing a more precise timeline navigation as well as seamless and smooth reverse playback. Last but not least, the average CPU load on server side could be reduced by up to 50% through optimisations in communication between internal components. Live monitoring of scans and transactions Security guard can now at once monitor multiple cash desks and mark suspicious activities directly within SeeTec BVISeeTec BVI, the second SeeTec software product that will be published as R13, also sees various improvements. With especially the logistics and retail industry in mind, SeeTec BVI is shifting its paradigm, because the software can – for the very first time – be used for the live monitoring of scans, transactions or other events. For the application in retail that means, e.g., that a security guard can now at once monitor multiple cash desks and mark suspicious activities directly within SeeTec BVI, whereas for a logistics scenario this new functionality can be used for the surveillance of the picking process of an order. In addition, SeeTec BVI provides numerous further improvements, e.g. a more precise timeline handling in the video archive, which give users palpable advantages in everyday use. Customers with a valid Software Maintenance Agreement (SMA) can already download and install the update to SeeTec Cayuga R13, whereas SeeTec BVI R13 will become available in late January 2019. For both applications, the installation can be done either manually or if updated from an installed base via the built-in Auto Updater.
Verisure, Europe’s renowned provider of monitored security solutions and smart alarms, has announced a partnership with Victim Support, an independent charity group in England and Wales working for people affected by crime and major incidents. The partnership aims to raise awareness of burglary risks and educate the public about ways to prevent this type of crime. Verisure - Victim Support partnership Horacio Perez, Operations Director at Verisure UK commented: “At Verisure, we believe that feeling safe and protected is a basic human right. As Victim Support’s goal of supporting victims of crime aligns with our vision of people protecting people, we felt the partnership was crucial in helping burglary victims while increasing crime prevention awareness.” Burglary can also rob people of their sense of security at home, a place where everyone should feel most safe" “Burglary not only robs victims of their physical possessions - it can also rob people of their sense of security at home, a place where everyone should feel most safe. The impact can last not only for the first few days, but months after the burglary has taken place,” said Tanya Richardson, Community and Events Manager, Victim Support. Special assistance to customers She further added, “Every year burglary affects over 435,000 households across England and Wales and, even if nothing is stolen, most people feel anxious and less secure in their home afterwards. Verisure’s generous support of our work will help us to ensure that more victims are aware of the support available and get the practical and emotional support they deserve.” Furthermore, in addition to the agreed donations, Verisure is offering special assistance to customers seeking help from Victim Support, as well as offering them special pricing and priority service. Likewise, Verisure’s customers will benefit from the help provided by Victim Support’s team of specialists.
OpenView Security Solutions, the privately owned independent security company in the UK and a national supplier of fire, electrical and mechanical services, has announced the award of one Lot of the new national police and emergency services framework agreement for electronic security, control room Systems and audio visual systems. This new four-year framework agreement, which has a Metropolitan Police Service estimated spend of £26m, enables central and local government, NHS and public safety organisations to procure a wide range of Building Technology Systems and Services from OpenView. Access to CCTV, access control systems OpenView has a track record of successful deployments with government and public safety organisations including police, fire and ambulanceAccording to Richard Stanley, Group Commercial Director of OpenView Security Solutions Ltd: “We are delighted to have been awarded a place on this strategically important framework which provides access to our comprehensive range of CCTV, security, access control and maintenance services. “OpenView has a longstanding track record of successful deployments with government and public safety organisations including police, fire and ambulance. Winning a place on this framework will consolidate our leading position in this key market sector.” Lot 1: Building Technology Systems and Services This multi-supplier Lot comprises seven suppliers to undertake the design, supply, installation, support and maintenance of all systems in scope. It can be used to procure against specific project requirements that include Building Technology Systems and Services. Systems in scope include: Analogue, Digital and Internet Protocol (IP) Building Security Systems Closed Circuit Television (CCTV) Systems both for Security and Evidential Purposes Access Control Systems, including Ironmongery Intercom Systems Intruder and Perimeter Alarm Systems Custody Suite Systems Recorded Interview Systems Public Address Systems Bespoke Supply and Maintenance of non-specialist off-the shelf Audio and Video Systems Internet Protocol Television (IPTV) Systems (off-the shelf systems)
From towers and moats to modern walls and wire mesh, physical perimeter fortifications have been around for millennia. Today’s technology brings us various types of electronic perimeter protection systems, mainly detecting or possibly preventing would-be intruders from crossing over into protected areas. Now, most traditional perimeter protection systems use active infrared detection. However, this type of detection method falls short in stability and reliability. Just before an intrusion happens, or while it is happening, traditional IR cannot make accurate predictions, and, lacking video data, it can be rather difficult to locate key alarm points. Furthermore, terrain, environment, and other factors often cause underreporting, false alarms, or other inaccurate results. Camera with built-in PIR detector The Turbo HD PIR Camera uses advanced video surveillance technologies to improve alarm accuracy and prevent intrusionsIn order to resolve these problems, Hikvision’s Turbo HD Passive Infrared (PIR) Camera uses advanced video surveillance technologies to improve alarm accuracy and prevent intrusions. As a result, perimeter protection jumps to a whole new level for residential areas, around factories, warehouses, schools and other settings. The most striking features of this camera are the rapid response rate and alarm accuracy when suspicious people cross established perimeters. The camera has a built-in PIR detector that captures infrared light given off by human bodies and distinguishes it from other visual ‘noise’. It can be equipped with Hikvision’s Turbo HD K series DVR’s motion detection to filter false alarms caused by moving targets without human body IR emission. This way, filtering false alarms reduces storage space and costs, and it also means more efficient post-event footage search. Intrusion detection and crime prevention Hikvision’s Turbo HD PIR Camera can be used with the Hikvision’s Turbo HD K-Series DVRs for perimeter protectionIn addition, the camera features a strong and immediate deterrent by producing a flashing white strobe light that serves as a warning signal to stop intruders. And with ultra low-light technology, the white light serves as supplemental lighting, enabling the camera to capture clear images of suspects as evidence when the alarm is triggered, even in extremely dark environments. Hikvision’s Turbo HD PIR Camera can be used with the Hikvision’s Turbo HD K-Series DVRs for perimeter protection, with both the intrusion warning function and its ability to keep an eye on monitoring areas in real-time with front-end devices. When an intrusion occurs, it can issue a warning immediately and notify security personnel to go right to the scene. In some cases, intruders will be deterred and leave – thus crime can be prevented, not just detected. The camera can support a broad range of perimeter protection and security system processes for pre-warning, warning in process, and evidence collection after an event. It has truly improved monitoring functions, surpassing the traditional ‘post-event investigation’ approach, and helps change perimeter protection from passive monitoring to active deterrence, protecting people and assets.
STANLEY Security is delighted to announce that it is the first security company to achieve BIM Level 2 accreditation in the UK. Building Information Modelling (BIM) is a shared knowledge resource, providing all the information about every component of a building, in one easy to access place. It enables construction professionals to digitally model a building and use the BIM data to reduce the risk of mistakes or discrepancies at an early stage, making for more cost-effective, safe construction, improved carbon performance and predictable planning. As one of UK’s premier security companies, STANLEY Security’s customer base extends from small businesses with a single intruder alarm system through to large integrated security systems operating across multiple sites in the commercial and public sectors. STANLEY Security is a proactive company that has its finger on the pulse of the security sector to identify where the market is going"Achieving BIM Level 2 accreditation has become increasingly important not only for full participation in public sector projects – construction suppliers tendering for centrally procured government projects must be working at BIM Level 2 – but for organisations in the commercial sector looking to reap the benefits of this advanced approach to construction. Aligned with the BIM philosophy Jason Wescombe, Design Manager – GB at STANLEY Security, explains: “From early in 2017 we noticed increasing customer enquiries relating to BIM services, ranging from design and construction, including COBie, to the provision of BIM Object Libraries. There was also increased Pre-Qualification Questionnaires relating to BIM Level 2, which was very much a new turn of events. “STANLEY Security is a proactive company that has its finger on the pulse of the security sector to identify where the market is going. We very much focus on identifying technology solutions that minimise financial outlay for a client; in this sense, we are very much aligned with the BIM philosophy. “We went out to the market to actively engage customers on the subject of BIM and it quickly became clear that BIM Level 2 capabilities had to be developed to meet future client requirements, and not just in the public sector.” BIM Level 2 Accreditation GAP Analysis BIM Level 2 facilitates well-informed decision making for greater clarity, better communications and better efficiencySTANLEY Security worked with Excitech, a technology solutions and services provider to the construction sector, to undertake a BIM Level 2 Accreditation GAP Analysis and provide consultancy and training in BIM Level 2. The transition to BIM Level 2 processes was achieved over a period of 18 months, following a full Lloyds Register BIM Level 2 Assessment to ensure all processes were in place, understood and adopted, culminated in full accreditation. According to the BSI, BIM Level 2 facilitates well-informed decision making for greater clarity, better communications and better efficiency. Cost savings of around 33% across CAPEX and OPEX are possible by following a Level 2 BIM process. As the cost of operating and maintaining buildings and facilities can represent up to 85% of the whole-life cost, savings can pay back any upfront premium in construction expenses in just a few years.
The total UK electronic security market, comprising of products - electronic access controls, intruder alarms and closed-circuit television (CCTV) - and associated services, was estimated at approximately £2.35 bn in 2017. This was an increase of around 5% during the year and followed two years of strong growth in 2015 and 2016. Growth was driven by technological advancements boosting replacement demand and improving new build and RMI expenditure across key market sectors. Expansion of CCTV product distribution CCTV accounts for the majority of the market in value terms, with a 52% share CCTV accounts for the majority of the market in value terms, with a 52% share. This sector has seen the greatest levels of innovation and new product development, and the recent shift in focus by major Chinese manufacturers from cost to technological development has eased the level of price competition over the last year or two. Technology has also become more affordable, leading to a continued shift away from analogue to digital products. In the access control sector, product development and wider availability of products have been a key driver of growth as has the performance of the UK construction sector, particularly in commercial offices and housebuilding. In addition, access control products have not been subject to price deflation experienced in other sectors, thereby enabling relatively consistent value growth. Intruder alarm market The intruder alarm market experiences long replacement cycles and a high level of competition in relation to other security options, particularly in the non-residential sector. However, in the residential sector, growth has remained positive in line with increased housebuilding and product development focused on ease of installation. Value growth is likely to come from increasing adoption of new technologies in both the new and replacement sectors Integration has continued as a key theme, both between products within the electronic security sector, and also beyond with wider business enterprise systems within Smart Buildings and home products within Smart Homes. The development of smart home products and integration with other security products and home management systems should offer significant opportunities for value growth going forward. Smart Home technology integration “Increasing competition remains a key feature of the market, with many established competitors struggling to maintain market share, due to intense competition from Chinese companies at all levels of the market” said Hayley Thornley, Head of Research at AMA Research. “This in turn has led to significant merger and acquisition activity in the market since 2015, with companies aiming to achieve scale and provide end-to-end solutions.” The prospects for the electronic security sector overall are reasonably good. Value growth is likely to come from increasing adoption of new technologies in both the new and replacement sectors. While construction output growth is expected to ease over the next 2-3 years, output remains relatively high by historical standards and this should continue to provide opportunities for manufacturers and installers of electronic security equipment. Electronic security installations Housebuilding has grown considerably between 2015 and 2017, with output increasing by 33% Government capital spending levels are also set to increase, particularly in infrastructure and also in local government and health. These are all potential opportunities for electronic security, particularly with the recognition that some of the public sector installed base has become outdated and fallen behind in technology terms due to spending cuts and austerity. Housebuilding has also grown considerably between 2015 and 2017, with output increasing by 33%, and there remains considerable scope to expand the level of electronic security installations in homes. Intruder alarm installations are estimated at around a third of homes, and the improved range and availability of CCTV products/ and smart locks etc., should support their wider installation in the residential market. Analytics and cloud-based solutions While industry sources report that price pressures have eased somewhat in the last couple of years, the focus on service packages and securing longer term revenue is expected to continue. Specifiers will also continue to focus on the whole life cost of the electronic security system, including replacements, add-ons and management costs, which will influence their choice of products and operating systems. These factors should drive the wider uptake of IP, wireless technology, analytics and cloud-based services.
As the world continues to become more connected, it’s becoming increasingly important to adjust security and safety procedures in the workplace. But today’s ever-evolving office environment can present unique safety and preparedness challenges. No two businesses are exactly alike, with some located in numerous buildings or spread out across campuses, while others have employees that frequently journey from different locations, work remotely or travel internationally. With this shifting environment, Rave Mobile Safety’s recent Workplace Safety and Preparedness survey asked over 500 full-time employees in various industries across the United States about their views on safety at work and emergency preparedness. Preferred safety measures Only 57 percent of respondents indicated that their workplace currently had preparedness drills in place for critical situationsThe survey looked at how employees and companies respond to various workplace emergencies: workplace violence, active shooter, medical emergency, fire, hazmat incidents, weather events and cyberattacks/system outages. Respondents provided insight on the current state of safety in their workplace, as well as how they want to be contacted when an emergency occurs. Though opinions on the preferred safety measures differed between generations and also between on-site and offsite workers, one fact remains consistent: there is much to be done to instil a better sense of safety in the workplace. While the findings show that employees feel safe in their workplace, only 57 percent of respondents indicated that their workplace currently had preparedness drills in place for critical situations. Quick thinking Of the plans currently in place, excluding fire, 57 percent of the other major emergency plans were rarely or never tested. With so few drills in place, employees are left not knowing the best ways to respond to emergencies like weather events or hazmat incidents or if their employer recommends a certain response to situations like medical emergencies. Testing these plans is essential so that all employees, whether they are new to the company or not Even if plans are in place to begin with, not ensuring your employees understand and are comfortable with how to react to certain situations, can put the organisation in harm’s way. Testing these plans is essential so that all employees, whether they are new to the company or not, have the appropriate response top of mind and their actions become second nature during a situation that will likely require quick thinking. Workplace violence Instilling regular practices will only further ensure that responses will happen seamlessly, regardless of the emergency. Beyond the general awareness of drills and practices, most surprising in the responses was the fact that 34 percent of female respondents were unaware of workplace violence emergency plans. This is particularly shocking because workplace violence is the second leading cause of death for women in the workplace, according to the U.S. Bureau of Labour Statistics. This shows an obvious lack of preparedness from organisations. It’s immensely important that employees to understand the relevant dangers of the workplace, especially when alternative could have a fatal result. The differences between baby boomers and millennials in the workplace is a common barometer showing how the workplace is continuing to change. Emergency plans Workplace violence is the second leading cause of death for women in the workplace, according to the U.S. Bureau of Labour StatisticsWhat may have worked for previous generations must be reworked and adjusted so every generation is made aware of and understands the plans and procedures in place. These changes can help make workplace safety plans fresh and continuously relevant. With that in mind, millennials currently represent the largest segment of employees unaware of emergency plans for major workplace emergencies. 38 percent of this age group are unaware of existing emergency plans, compared to just a 28 percent average of employees over the age of 35. This could be associated with the fact that some organisations are not communicating plans with newer employees or even that organisations that employ a significant number of millennials might not have plans in place at all. Affecting everyday work If the newest generation is unaware of these plans, then it is only a matter of time before Generation Z enters the workforce and is in even worse position when it comes to emergency awareness. The survey results showed that on average, workplaces use two methods of communication for emergencies Feeling safe and secure at work should not be something that workers need to focus on, however more than a quarter of respondents that work remotely said that worrying about safety is exactly what is affecting their everyday work. With that in mind, it’s even more concerning to see that there seems to be a clear divide between current methods and preferred methods of communication during an emergency. The survey results showed that on average, workplaces use two methods of communication for emergencies, with the top two being intercom system announcement/building alarm (27 percent) and email (22 percent). Mass text messages At first, these methods seem to cover both remote and in-office employees, but survey results actually showed that both groups preferred and would be better reached during other methods. While email is the second most common emergency method currently in place by organisations, it actually ranks as the fourth most preferred method at a mere 11 percent. Even with a clear preference towards communication via mass text messages by respondents (39 percent of remote workers prefer this method), less than 20 percent of companies actually take advantage of this technology. This clear disconnect shows that organisations must find what works best for their employees instead of using methods that were previously established or that are just currently being used. Preparedness plans What remains important for organisations, regardless of size or industry, is to keep emergency preparedness plans ever evolving Communication can not only be essential to alert employees to everyday situations, like office closures, but it is also imperative in preventing emergencies to escalate when they do occur. Although this survey discusses the current state of safety in the workplace, it’s that the disconnect between employee perceptions and employer polices that’s the most concerning. Companies need to take steps to understand how their employees would like to be reached during an emergency, as well as how employees would also like to reach out to management to report their own concerns. What remains important for organisations, regardless of size or industry, is to keep emergency preparedness plans ever evolving and well communicated, so your employees are confident in the emergency plans in place. By proactively planning and practicing for emergency events through table top exercises and drills, employers can demonstrate their commitment to employee safety and preparedness and build employee confidence.
Small business owners work hard. They are often the first ones there in the morning and the last to leave at night. Even then, they likely bring their work home with them. During that time, everything they do is aimed at making their business as successful as possible. Because of this, many business owners don’t take vacations, and if they do, they spend a lot of time worrying about their business while they’re away. In both cases, the potential for burnout is tremendously high. The primary concern for these individuals is loss, whether from theft, waste, vandalism or other causes. Depending on the degree of the loss, it can have a devastating effect on small business. Therefore, professional security solutions must be top of mind for these businesses. Small business owners can take advantage of advanced technology that can help them work smarter, not harder Video surveillance for small businesses One technology that can address loss, the feeling of helplessness that comes from not being on site and more is video surveillance. Sadly, it’s not always on the radar for small business owners, many of whom think video surveillance is very expensive and out of reach. But that couldn’t be farther from the truth. There are high-quality, relatively inexpensive solutions that don’t require much, if any, configuration, allowing an installer to place cameras, run cable, plug cameras into the recorder and use software to get end users up to speed on remote access. Best of all, almost all of these solutions come with a mobile app or other means of accessing video—both live and recorded—remotely from a smartphone or tablet. In a world where our phones have become our lifeline to a lot of information, including email, banking, inventory management and more, a security system simply has to provide this type of access. Given the availability of cost-effective video surveillance solutions and their ease of use, small business owners can take advantage of advanced technology that can help them work smarter, not harder in a few key areas. Video surveillance solutions come with a mobile app for accessing video remotely from a smartphone or tablet Efficient incident monitoring Having a high-quality video surveillance system with proper coverage means that any time an incident or loss occurs, a small business owner can go back and find it on the video and identify exactly what happened. For example, if something goes missing from a retail store, reviewing the video will reveal exactly what happened, when it happened, how it happened and—depending on lighting, camera resolution and field of view—possibly who took it. Video systems can also be valuable from a liability perspective. Slip-and-fall claims are not uncommon, but in many cases they turn out to be false. Thankfully, cameras can provide video that will support or refute a claim. Without video, such incidents could be costly for small businesses. A simple review of recorded videos will solve any mystery and eliminate the potential for a long argument with no evidence Video recording for incident verification Another example would be a customer who claims they were shorted on the change they received from a cashier. Rather than taking the time to count the money in the drawer and reconcile that with receipts, a small business owner could simply review video from a camera placed above the point of sale to determine if the customer’s claim is correct or if they may have been mistaken. This feature can also help alleviate or avoid a potentially awkward or difficult situation when there’s a difference of opinion with a supplier. Say for instance a delivery driver claims he or she brought three cases of product to the back door, but there are only two cases in the stockroom. A simple review of the video that’s been recorded will solve the mystery once and for all and eliminate the potential for a long, drawn-out argument with no evidence one way or the other. Smartphones for remote monitoring It’s natural for small business owners to feel stressed when they’re not at their physical location. After all, they’re the ones who have invested in the business and are responsible for making sure it runs smoothly and profitably from day to day. For small business owners with surveillance systems, vacations can become not only a reality but also the relaxing time they are supposed to be. For small business owners with surveillance systems, vacations can become not only a reality but also the relaxing time Rather than sitting on a beach and worrying about whether the store opened on time or if employees are doing what they’re supposed to be doing, an owner can pull out his or her smartphone, log in to remotely to the video system and know for sure. That peace of mind is invaluable for small business owners. This is also helpful for business owners with multiple locations. Because no one can be in two—or more—places at once, a video surveillance system can provide eyes and in some cases ears at a location, which can be accessed at the click of a button. Video surveillance for training For a small business, it’s imperative that employees follow established policies and that staffing levels are maintained at the most efficient level possible. These are two other areas where video surveillance can help. If a small business owner sees that something isn’t being done properly, whether by a single employee or if the problem is more widespread, he or she can use video for training purposes. They can sit down with the employee or employees to review the video and explain the proper policies and procedures. Conversely, video can be used to demonstrate proper techniques or even to recognise employees for a job well done. From a staffing standpoint, reviewing video could reveal unexpectedly busy or down times Maintaining staffing levels From a staffing standpoint, reviewing video could reveal unexpectedly busy or down times. A business owner can review video from 3 p.m. on a Saturday to see how many customers are in a location and determine the ratio of employees to customers. Looking at a variety of times over a period of weeks or months could help determine optimal staffing levels, which may lead to the decision to increase staffing on Saturday afternoons when a store is busy. This will help improve customer experience and potentially increase sales. Motion detection for accurate access control Cameras can be deployed with motion-detection sensors to alert business owners when someone enters a certain area, whether during or after business hours. In many cases, detected motion can trigger an alert and/or a video clip to be sent to the business owner’s smartphone so they can review and verify whether something is out of the ordinary. These deployments could be set up to monitor a variety of locations, such as an office, safe, doors and other sensitive areas at all times or just during specific hours. If motion is detected during off hours, the business owner can view video and alert police that an unauthorised individual is at their business. Surveillance videos can be used to demonstrate proper techniques or even to recognise employees for a job well done Cybersecure video surveillance systems From a cybersecurity perspective, manufacturers are constantly releasing firmware updates to protect cameras from malware and/or unauthorised intrusion. Once someone has accessed any device, all systems and devices connected to the same network become vulnerable. Updating these devices tends to be an afterthought for small business owners, who may either forget or simply not have the time to do it. So it should come as no surprise that these important updates often go uninstalled. Today’s advanced video systems overcome this obstacle with easy updating, which can be performed by small business owners or installers to ensure constant protection. Other systems are available with auto-updating capabilities, which remove the onus from small business owners completely. Today’s advanced video systems overcome cyberthreats with easy updating Cost-effective surveillance solutions These are just a few of the many benefits video surveillance systems offer small business owners. What’s important to note is that for each to be successful requires having to have the right camera for the right environment. For instance, a camera positioned at the back door of a business has to have wide dynamic range to deal with changing light levels throughout the day. A camera used to monitor transactions must offer high enough resolution to identify bill denominations. Today’s solutions are cost-effective, easy to use and offer the flexibility to monitor operations from anywhere at any time – giving small business owners the power to work smarter, not harder to grow their bottom line.
There was a time when one of our biggest challenges was securing our physical assets, whether that was our people or our property from crime. We researched and deployed the very latest in video solutions, intrusion systems, fire alarms and access control devices, all in an effort to keep the bad guys out and the good guys safe, along with protecting our facilities from break-ins, robberies and countless other crimes. However, times are changing. No longer must we only be concerned about keeping intruders out of our buildings but now—off our networks. It should come as no surprise that cybercrime is one of the biggest threats organisations of all shapes and sizes face today. While attacks on major brands and Fortune 500 companies make headlines, there were purportedly 918 reported data breaches, compromising nearly 2 billion data records in just the first six months of 2017. Of those 918 breaches, 500 of them had an unknown number of compromised records. Some in the industry referred to not locating cyberattacks in a swift manner as a breach detection gap or dwell time Reducing breach detection gap Depending on your organisation, these cybercrimes and the investigation into them, may be handled by your IT department. However, considering the magnitude of these crimes, it now falls on the entire organisation, including the traditional security or loss prevention executives, to band together to combat these threats. One of the biggest challenges cyberattacks pose is timing. Often cyberattacks can go undetected for weeks, months or even years. Some in the industry referred to this timing as a breach detection gap or dwell time and is defined as the time elapsed between the initial breach of a network by an attacker and the discovery of that breach by the victim. To put that into perspective, the most recent Ponemon report on the cost of a data breach showed dwell time for malicious attacks has stretched to an average of 229 days—a long time for bad actors to be lurking around your networks. Many companies rely on heritage-based services offered by managed security service providers (MSSPs) Traditional cybersecurity measures We are familiar with traditional cyber lines of defence against these attacks like firewalls and anti-virus software. While these solutions are effective at identifying and potentially stopping known forms of malware and viruses that are attacking companies every day, they are blind to signatureless and zero-day malicious activity. Unfortunately, this trend does not show signs of letting up as internal security processes are having trouble keeping up with increasingly sophisticated land pervasive threats. Many companies rely on heritage-based services offered by managed security service providers (MSSPs) that use security information and event management (SIEM) software, or intrusion detection systems/intrusion prevention systems (IDS or IPS respectively) to monitor networks for malicious activities on a continuous basis. However, these activities are based on known threats where a valid signature of the cyberattack or system logs are available and used to analyse activity. They then provide security alerts to the client and generate reports for compliance purposes. This form of alerting often generates an overwhelming number of notifications causing what is coined in the industry as ‘alert fatigue’ making it hard to weed out what is important from what is not. Managed detection response uses a combination of advanced technology and expert human analysis to combat cybercrime Managed detection and response The Ponemon Institute found that companies spend an average of 21,000 hours each year analysing false negative/false positive alerts trying to detect and contain cyberattacks. This translates to approximately 17,000 security alerts in a week of which only 4% were deemed reliable and investigated. This can potentially waste nearly $1.3 million per year on investigating and managing inaccurate data. Based on this overwhelming challenge, it’s time for organisations to look at improving real-time threat detection and incident response capabilities beyond standard security screening and compliance requirements. In addition to the services provided by an MSSP, it would be wise to add or layer a managed detection and response (MDR) service to your arsenal of cyber defence weapons. An MDR analyst can replay the event allowing him to dig deeper into the incident and determine remediation steps Identifying real threats with MDR services MDR services use a unique combination of advanced technology and expert human analysis. Equating MDR services to traditional physical security devices, it is more like having a DVR, where an analyst can go back and replay the incident on the network via packet capture technology. Event logs and signatures by themselves don’t provide visibility and detail. Traditional cyber defences act like a conventional alarm system. The alarm sounds and a notification is sent, but there is no context or detail about the incident and it is up to the recipient to determine if the alarm is valid, what exactly happened and what to do about it. With packet capture on the network, an MDR analyst can replay the event allowing him to dig deeper into the incident and determine remediation steps. This approach helps quickly identify real threats to the business, provides remediation specifics for timely resolution, and significantly cuts through the false positive noise so security teams can focus on the things that matter. Efficient incident management MDR services only notify clients after the incident is verified. The notifications provide granular detail of the scope and severity of an attack with recommendations for quick containment and response. MDR services offer 24/7/365 continuous monitoring of customer network data, provide analysis of the data to add context to the event and notify the customer of the incident. With MDR services, clients have direct communication with the security analyst and rely less on using an alert portal With MDR services, clients have direct communication with the security analyst and rely less on using a portal for alerting, investigations, case management and workflow activities. Because MDR services rely on advanced tools and human analysis, they are more apt to uncover malicious activity that has breached the first line of defence and can reduce the time from infection to detection to minutes rather than months. Combating cybercrime with secure networks To sum it all up, MSSPs focus on perimeter devices like firewalls, or IDS/IPS and SIEM and provide device management such as updating firewall rules, anti-virus software and compliance reporting. They are typically used to supplement internal IT or security teams. An MDR service concentrates on detecting threats that have penetrated the perimeter. MDRs deliver threat notification and remediation guidance. While both solutions provide value to their clients, their basic areas of focus are different. Cybercriminals are becoming more coordinated in their efforts to steal our data, disrupt our operations and damage our brands. It is time that we coordinate our efforts across the entire organisation to combat them.
Security is among the defining topics at the Consumer Electronics Show (CES) 2019 this week in Las Vegas. More than 4,500 exhibiting companies are participating, including some 1,200 startups, highlighting the next wave of innovation in consumer electronics – and security. Twenty-four product categories at CES feature solutions to transform how consumers live, work and play. Technologies being highlighted include 5G connectivity, artificial intelligence (AI), augmented and virtual reality, smart homes, smart cities, and machine intelligence. Video is an important element at CES. This year, the focus is on intelligent video. For example, Eyecloud.ai, Santa Clara, Calif., is displaying a home security camera with on-device face recognition that uses AI. Powered by a 12-core Intel Movidius VPU (video processing unit), the camera combines AI-on-the-edge with easy setup and wirefree operation for up to six months per battery charge. On-device artificial intelligence On-device AI is the next big trend in smart home surveillance, and deep neural networks will drive the future of do-it-yourself home automation SimCam, an Intel partner, demonstrates how the Intel Movidius VPU can turn a security camera into ‘the ultimate vision-based sensor’. On-device AI is the next big trend in smart home surveillance, and deep neural networks will drive the future of do-it-yourself home automation. A variety of other residential video systems are also on display at CES. For example, Swann Security is displaying 4K wired security systems featuring Google integration, a wireless smart security camera with True Detect heat-based PIR (photo infrared) motion detection, a video doorbell and chime with two-way talk, and indoor and outdoor wi-fi cameras with Alexa integrations. Intelligent automotive solutions Camera system-on-chip (SoC) company Ambarella is introducing the new CV25 camera SoC at CES. It combines advanced image processing, high-resolution video encoding and CVflow computer vision (video analytics) processing in a single, extremely low-power design. The CVflow architecture provides Deep Neural Network (DNN) processing required for a new generation of affordable and intelligent home monitoring, professional surveillance and aftermarket automotive solutions. CV25 offers half the performance of Ambarella’s previously released CV22 chip, but the new chip’s lower cost will bring intelligent cameras to a price point desirable for home systems. All Ambarella’s chips have hardware-based cybersecurity. A suite of advanced cybersecurity features protects against hacking, including secure boot, TrustZone, and I/O virtualisation. Based on 10nm ultra-low power processing technology, the CV25 chip is optimised for wirefree cameras applications that require long battery life and small form factors. Camera system-on-chip (SoC) company Ambarella is introducing the new CV25 camera SoC at CES Virtual security guards Elsewhere, the Deep Sentinel home security system applies video and AI to predict residential break-ins ‘before they happen’. The Pleasanton, Calif.-based tech startup uses ‘AI-infused security cameras’ to keep an eye on your home. Three wireless 1080p full HD cameras provide night vision and PIR motion sensing, connected by a smart hub. Using proprietary artificial intelligence, the cameras act as virtual guards, watching activity around a house and providing alerts to situations that may lead to burglaries, break-ins, package thefts and other dangers. My Safe Patrol is an AI-driven platform that analyses data aggregated from security personnel, citizen alert systems and IoT smart devices, and responds with geolocated alerts in real-time. My Safe Patrol effectively supports the security/safety ecosystem of a building, a campus, a city or a district through a dynamic dashboard that helps command and control operations manage and deploy security plans. AI-integrated devices Showcased solutions include Smart Living integration of video surveillance applications to enable real-time two-way audio and video streaming simultaneously MicroVision, Redmond, Wash., showcases an interactive display engine for AI-connected devices, providing an integrated solution for projected display and interactivity through multi-point touch and air gestures. MicroVision’s new consumer 3D LiDAR engine provides high-fidelity spatial awareness to smart home hubs, for input to smart devices such as lighting, security, entertainment, and thermostats. The Internet of Things (IoT) is another big topic at CES, and ThroughTek Co., Ltd., Taiwan, demonstrates IoT developments to transmit voice, video and data over both wide- and narrow-band channels in smart home applications. Showcased solutions include Smart Living integration of video surveillance applications combined with voice assistant to companion robots, wireless doorbells, and battery cameras to enable real-time two-way audio and video streaming simultaneously. Advanced Capacitive Touchscreen Decayeux Group, a European manufacturer of mailboxes and high security doors, is displaying MyColisBox, a secure and connected parcel box delivery system designed to provide online shoppers a secure pickup point accessible by a PIN code sent via SMS message to a smartphone. Walter is the new mobile app for MyColisBox. Kwikset, a division of Spectrum Brands, showcases its smart lock portfolio – including three new smart locks – in the CES Smart Home Marketplace. Kwikset is showing the SmartCode 888, Kwikset Convert, Obsidian, and new designs of the SmartCode 914 and SmartCode 916, as well as a new wi-fi lock. Baldwin, Kwikset’s ‘luxury lock’ sister company, is offering a preview of its new TouchScreen Collection, launching this summer, available in five styles and featuring Advanced Capacitive Touchscreen technology. The Internet of Things (IoT) is another big topic at CES, with many companies demonstrating IoT developments Cyber security standards Privacy is increasingly a concern in the consumer space, and Private Discuss, from PIMAN Security, is a premium, secure, white label communication solution. Their active AI-powered defense architecture provides encrypted audio and video calls, messaging and file sharing. It renders a confidential, secure messaging platform that adheres to the highest standards of cybersecurity. FLIR provides virtual reality demonstrations at their CES booth, allowing attendees to put on a virtual fire helmet and try out a FLIR camera in a real-world residential fire response scenario. Participants may also use a FLIR optical gas imaging camera virtually to stop fugitive emissions in a natural gas refinery. Booth visitors may also take “thermal selfies” to post on social media.
A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and, in the last several months, the United States. Rough estimates place the total amount of global losses at up to $60 million. What is jackpotting? ATM jackpotting is a combination of a physical crime and a cyberattack. Typically, a criminal with a fake ID enters a grocery shop or pharmacy posing as an ATM technician, then uses a crowbar to open the top of the ATM – the “top hat” – to gain access to the personal computer that operates the machine. If a legitimate customer approaches the machine in the meantime, it can operate as usual until activated otherwise by the malware Once he or she has access to the PC, they remove the hard drive, disable any anti-virus software, install a malware program, replace the hard drive and then reboot the computer. The whole operation takes about 30 seconds. The malware then enables the thief to remotely control the ATM and direct it to dispense all its cash on command. An accomplice – the “mule” – later approaches the ATM to collect the bounty, as the “technician” remotely directs the machine to dispense all its cash. If a legitimate customer approaches the machine in the meantime, it can operate as usual until activated otherwise by the malware. ATMs in supermarkets and pharmacies tend to be targeted because they may not be as well-protected, and store personnel likely would not know who is authorised to work on the ATM. In contrast, anyone approaching an ATM at a bank location would be more likely to be challenged. Emergence of criminal activity The crime first emerged in the United States several months ago, and the U.S. Secret Service, financial institutions and ATM manufacturers have been scrambling to find a solution. Older ATMs are particularly vulnerable. In some cases, financial institutions have not embraced the highest levels of security offered by ATM manufacturers because of costs, and because previously the crime was not common in the U.S. One estimate is that losses north of $10 million have occurred in the U.S. just in the last couple of months. “There are solutions, and then there are ways to get around the solutions,” says Samir Agarwal, Accelerite’s general manager for security. Hackers remove the hard drive, disable any anti-virus software, install a malware program, replace the hard drive and then reboot the computer ATM protection technology Accelerite is a California-based software company that focuses on the digital enterprise, including hybrid cloud infrastructure, endpoint security, Big Data analytics, and the Internet of Things. Accelerite’s solution to the ATM jackpotting problem is built on the company’s Sentient security framework. Accelerite’s approach to ATM jackpotting is to immediately stop the dispensing of cash when any sign of trouble is detected. The system can track alarms, such as when a “top hat” is opened, when a hard disk is removed, if the antivirus software has been tampered with, and so on. The system can send a notification within 20 seconds that the ATM is being hacked and then automatically shut down the machine. If the bad guy reboots the machine, the system can confirm there was a previous alert and shut it down over and over. “We create multiple lines of defense,” says Agarwal. “The criminal would decide it’s not worth his while and walk away.” The consequences of jackpotting impact every level of the industry, including ATM manufacturers and financial institutions Origins of ATM jackpotting ATM jackpotting originated back in 2010 when Barnaby Jack, a New Zealand hacker and computer expert, demonstrated how he could exploit two ATMs and make them dispense cash on the stage at the Black Hat computer security conference in Las Vegas. Since then, malware has been created and made available on the “Dark Web” that can instruct an ATM to dispense all its cash on demand. Previously ATM jackpotting attacks have focused on more cost-conscious global markets and those likely to use older-model ATMs with fewer security features. Strong U.S. law enforcement also likely prevented criminals from taking the risk – until now. Attacks in the United States have raised awareness. “There is more cognisance of the possibility of bad things happening,” says Agarwal. “This came out of nowhere and had not happened in the past in the United States. This crime is unlike what you hear about hacks or when data is stolen – there’s just money being stolen.” Best practices to prevent an attack However, the consequences impact every level of the industry, including ATM manufacturers and financial institutions. Also, the supermarket and grocery shops that are targeted face additional security challenges, and even consumers could lose confidence in ATMs if they think their personal information could be at risk. There are best practices that can also prevent an attack. For example, an ATM computer could have a “white list” of approved applications and not allow anything to be installed that is not on the list; for instance, no malware. Another approach is to encrypt the disk drive so that a key or certificate is needed in order to install new software. Agarwal notes that solving the challenge of ATM jackpotting illustrates the need to combine both physical and cybersecurity approaches to protect modern companies. “It’s the reality as we move into a more digital world,” he says. “Physical security at that level will be difficult to protect, and you will be depending more on cyber solutions. It’s the direction the world is moving into.”
ADT is looking to "bring the voice of the customer" into the continuing development and expansion of Z-Wave, the radio frequency (RF) communication and product-level interoperability technology that enables wireless networking of battery-powered devices in the home. ADT is the newest Principal Member of the Z-Wave Alliance consortium. Z-Wave is one of the enabling technologies of ADT’s Pulse security and home automation system, which enables a home's electronics to communicate with each other and with the user. Z-Wave unifies devices like door locks and lighting controls into an integrated network. ADT is the Z-Wave Alliance’s seventh and newest Principal Member, and also the first service-based company represented on the Z-Wave Board of Directors. The other Principal Members are original equipment manufacturers GE/Jasco, Ingersoll-Rand, Linear, Evolve, FAKRO and Sigma Designs. “As a service provider who touches the end user directly, we bring a different perspective that rounds out the Z-Wave board,” says Steve Shapiro, ADT’s Vice President of Industry Relations. ADT was previously a full-level member and has been active in the Z-Wave Alliance since implementing Z-Wave as part of ADT Pulse. Becoming a Principal Member “reaffirms [ADT’s] commitment to the technology going forward,” he adds. The Z-Wave Alliance oversees development and implementation of the technology. The Alliance is made up of member companies participating at various tiers in technology working groups and accessing the technology to develop products. The Z-Wave Alliance includes 160 full-level members involved in developing products and about 110 Affiliate members (mostly resellers and installers). At the top level of the Z-Wave Alliance are the companies that guide development and implementation of the technology, the Principal Members whose representatives make up the Alliance Board of Directors. Shapiro is joining the Z-Wave Alliance Board. Z-Wave technology is used throughout the security and home automation markets, enabling radio frequency (RF)communication and product-levelinteroperability among battery-powereddevices in the home Z-Wave technology is used throughout the security and home automation markets, enabling radio frequency (RF) communication and product-level interoperability among battery-powered devices in the home, including climate controls, door locks, security sensors, appliances and remote control. There are 1,000 or so products from 100 companies that are Z-Wave certified, which means they communicate within a 50-foot range using low power consumption that allows one- or two-year battery life. Mesh networks of these devices, each communicating and also relaying signals from other devices, can extend the operable range to cover an entire house or small commercial facility. Z-Wave enables greater wireless networking in the home and realization of home automation systems with more capabilities. “ADT adds a complementary view to the board based on their knowledge of customer needs,” says Mark Walters, Z-Wave Alliance chairman. “Having North America’s leader in residential security advising the Z-Wave Alliance at the Board level brings a focus to that market segment in terms of guiding the alliance in both marketing and technical development. Security companies now have someone representing them who understands and directly participates in their business.” Principal Members must be nominated by an existing Principal Member and then approved by the Board of Directors. “We are not just a security company, but a service provider for home and business automation,” Shapiro says. “Security is a great platform for automation, and it’s a natural combination.” He notes that 44 percent of ADT customers opt for the ADT Pulse service, and the number has been climbing quarter over quarter since 2010. “It confirms how the different kinds of systems make sense together,” he says.
Brazilian infrastructure company Companhia Energética de Pernambuco (CELPE) is the main supplier of electricity in the country’s Northeastern state of Pernambuco. Headquartered in the state capital Recife, one of the most important economic and urban hubs in the country, CELPE serves a population of more than 8.8 million inhabitants in the 184 municipalities of Pernambuco. As part of the Brazilian government’s commitment to clean energy, the CELPE grid also contains several hydropower plants at rivers across the state. Providing electricity to private customers and industrial clients in the expansive region requires a 136,762 kilometres distribution network and 4,386 kilometres of transmission lines. As critical parts of the power infrastructure, CELPE operates 240 substations across Pernambuco. But as most of these stations are located in remote areas, the last few years saw an alarming increase of vandalism and theft of expensive power cables. For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management SystemBosch’s Building Integration System Looking to safeguard its vital infrastructure, CELPE needed an integrated security solution that achieved three goals: firstly, keep out criminals and alert police upon security breaches. Secondly, provide seamless access control for the 300 maintenance teams in the field. And thirdly, connect fire alarm, communications, and voice evacuation on an integrated system that allows for remote management from CELPE headquarters. As a one-stop solutions provider, Bosch won the contract for equipping sixteen substations with video security systems, access control, communications, fire alarm and voice evacuation as well as intrusion alarm connected on the Building Integration System (BIS). For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS). The fire alarm revolves around smoke and heat detectors, while for voice alarm and evacuation, Plena Mixer Amplifiers are connected to driver loudspeakers. Cameras with built-in video analytics For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities All systems and cameras are monitored by security personnel at the company’s control centre in Recife. For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities. The system also fulfils the key customer requirement for remote management via the management system BIS (Building Integration System), including administration of user credentials and access rights for the 300 maintenance teams serving various substation sites. Successfully installed at sixteen stations in Pernambuco, the Bosch solution has proven to be an asset for CELPE and its personnel. Aside from safeguarding valuable infrastructure against criminals, the system has also streamlined communications among the service teams in the region by including elements such as conferencing and automatic alerts for fires and intrusions through a messenger system. The remote management of user access rights at the substations has enhanced the overall service level and prevented security breaches. Satisfied with the end-to-end solution, CELPE has now commissioned Bosch to equip approximately 240 electrical substations over the next years.
Nestled on the banks of the river Thames, Kew Gardens in southwest London is home to the most diverse collection of living plants anywhere in the world. At 330 acres in size, it’s London’s largest UNESCO world heritage site, and has a history stretching back more than 250 years. The Royal Botanical Gardens, Kew, attracts more than 1.6 million visitors every year, coming to see the 30,000 different kinds of plants, and to visit the Herbarium, which has over seven million preserved plant specimens. As an internationally important botanical research and educational institution, Kew’s library contains more than three quarters of a million books, along with more than 175,000 prints and drawings of plant life. 24/7 video surveillance coverage Kew Gardens hosts a wide variety of events throughout the year, including festivals, concerts and art exhibitions, as well as learning experiences for all ages and interests, in addition to the garden attractions. A need was identified to upgrade the existing legacy analogue CCTV system to one capable of transmitting and recording in true HDThe site is accessible via London Underground, Overground, buses and river services in summer, and the public can enter via four separate gates: the Elizabeth Gate, the Brentford Gate, Victoria Gate and the Lion Gate. There are also a number of other access gates to the gardens which are not open to the public. Because of the sheer volume of visitors and the multitude of public and trade entrances to Kew Gardens, the site requires around the clock video surveillance coverage, seven days a week. Analogue to IP CCTV system Kew’s CCTV control room operations team works to monitor the safety and security of the park, but a need was identified to upgrade the existing legacy analogue CCTV system to one capable of transmitting and recording in true High Definition. Security specialist firm The ITS Group was called in to help. The ITS Group is comprised of ITS Fire and Security, ITS Electrical, ITS Fire Training and ITS Building Services. The company has 20 years of experience within the fire and security industry, and provides CCTV, intruder alarms, barrier gates, security lighting, panic alarms, access control, and door and video entry, alongside a swathe of other services. ITS Group Director Tim Dyer said the Kew project required upgrading equipment in the Gardens’ security control room and providing site-wide cameras which can be used to view all entrances for both public and trade, as well as various strategic locations throughout the Gardens. Challenges in system installation The results were achieved in the process of implementing a Hikvision IP HD video surveillance systemThe massive 330-acre site is a huge area to monitor in itself, and Tim Dyer says the very public nature of the Gardens and its operations meant the actual video system installation posed some security continuity challenges. “Because the control room needed to be in operation 24/7, close co-ordination was required between ITS and the security team on-site,” he says. “We needed to maintain the CCTV in line with the changing site requirements on a daily basis. This, coupled with access issues and working in a public environment, was very challenging, and the fact that we were able to achieve such good results is testament to the close co-ordination between the site team and Kew security.” Those results were achieved in the process of implementing a Hikvision IP High Definition video surveillance system, which included new 43-inch and 22-inch HD monitors for the control room, along with new touchscreen network keyboards and joysticks. HD images in low light When there’s no light at all, the Darkfighter cameras switch to IR mode and record black and white images at 0 LuxControl room operators monitor images from a number of different Hikvision cameras. These include an initial 48 DarkfighterX network speed domes, which provide colour HD images in light levels as low as 0.001 Lux. That’s pretty dark. And when it gets darker still, they provide black and white images in light levels down to 0.0001 Lux. When there’s no light at all, the Darkfighter cameras switch to IR mode and record black and white images at 0 Lux. In addition, they offer 25x zoom capabilities and Deep Learning-powered target classification for automatic tracking and perimeter protection. They’re complemented by 29 Darkfighter 2 megapixel motorised varifocal lens cameras, 21 ultra-low light smart bullet cameras, and six low light smart cameras. Images are recorded to Hikvision 16-channel Turbo HD digital video recorders which support analogue, HD-TVI, and IP cameras, H.264, H.264+ and dual-stream compression, and can output at up to 4K resolution. Improved picture quality The Gardens now have a full HD system which can be expanded with additional cameras in the future"The resulting system is not only powerful and effective in the short-term but is purposefully planned to incorporate forthcoming changes. “The Gardens now have a full HD system which can be expanded with additional cameras in the future,” Tim Dyer says. “It allows them to take advantage of technology advances and newly developed functionality on any cameras or devices they add to the system in future.” Tim Dyer says the Hikvision system has revolutionised Kew’s video picture quality and functionality. “Making the change from an old analogue system to installing a new Hikvision IP system has transformed the Gardens’ picture quality, both during the day and at night,” he says. “The zoom facility is amazing and precise, and the reliability of them is second to none, making the work of the control room operatives a much easier role.” The HD surveillance system has been received exceptionally well by those whose opinion matters most: the security team at Kew Gardens. John Deer, Head of Security, said: “I am delighted with the installation of Hikvision cameras at the Royal Botanic Gardens, Kew. They are of the highest quality, which has enhanced the overall security across the 330-acre site.”
Brazilian infrastructure company Companhia Energética de Pernambuco (CELPE) is the main supplier of electricity in the country’s Northeastern state of Pernambuco. Headquartered in the state capital Recife, one of the most important economic and urban hubs in the country, CELPE serves a population of more than 8,8 million inhabitants in the 184 municipalities of Pernambuco. As part of the Brazilian government’s commitment to clean energy, the CELPE grid also contains several hydropower plants at rivers across the state. Detecting and deterring power thefts Providing electricity to private customers and industrial clients in the expansive region requires a 136,762 kilometers distribution network and 4,386 kilometers of transmission lines. As critical parts of the power infrastructure, CELPE operates 240 substations across Pernambuco. But as most of these stations are located in remote areas, the last few years saw an alarming increase of vandalism and theft of expensive power cables. Looking to safeguard its vital infrastructure, CELPE needed an integrated security solution that achieved three goals: firstly, keep out criminals and alert police upon security breaches. Secondly, provide seamless access control for the 300 maintenance teams in the field. And thirdly, connect fire alarm, communications, and voice evacuation on an integrated system that allows for remote management from CELPE headquarters. Bosch video security and intrusion detection systems For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS) As a one-stop solutions provider, Bosch won the contract for equipping sixteen substations with video security systems, access control, communications, fire alarm and voice evacuation as well as intrusion alarm connected on the Building Integration System (BIS). For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS). The fire alarm revolves around smoke and heat detectors, while for voice alarm and evacuation, Plena Mixer Amplifiers are connected to driver loudspeakers. All systems and cameras are monitored by security personnel at the company’s control center in Recife. IP cameras with built-in video analytics For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities. The system also fulfills the key customer requirement for remote management via the management system BIS (Building Integration System), including administration of user credentials and access rights for the 300 maintenance teams serving various substation sites. Successfully installed at sixteen stations in Pernambuco, the Bosch solution has proven to be an asset for CELPE and its personnel. Aside from safeguarding valuable infrastructure against criminals, the system has also streamlined communications among the service teams in the region by including elements such as conferencing and automatic alerts for fires and intrusions through a messenger system. The remote management of user access rights at the substations has enhanced the overall service level and prevented security breaches. Satisfied with the end-to-end solution, CELPE has now commissioned Bosch to equip approximately 240 electrical substations over the next years.
We all assume, in fact expect, a bank to be secure. The major challenge: the customers should not notice the actually highly complex security equipment. As they definitely should not have the feeling of being watched. Apart from Regiobank Solothurn being our house bank, the collaboration between the bank and Siaxma has already extended over ten years. With the new building in Zuchwil, there was the opportunity for the first time to plan and install a totally digital system All the branches have the video surveillance equipment which is controlled at a computer workstation at the Solothurn headquarters, where the data is analysed too. The access control was added gradually and is initially being used in Biberist and Zuchwil. With the new building in Zuchwil, there was the opportunity for the first time to plan and install a totally digital system. This includes access control, door management, video surveillance, a burglar alarm system and alarm management – all from one source. This was one of the requirements the Regiobank specified. Authorisation using one badge Digital access control has one major advantage for all users: they can enter all the buildings and rooms they have authorisation for with just one badge. These badges are issued and managed at the Solothurn headquarters. Mechanical keys have largely disappeared from everyday business at the Zuchwil and Biberist branches. The administrator can change or extend the access rights in comfort at their PC workstation. Saves cost for additional licenses Using their personal badge, customers can now use the lift to the basement, on their own or accompanied, and open their boxHow do customers get to their deposit boxes now? Keys are also a thing of the past here. Customers report to the desk where the bank employee then authorises them with access to the vault for one whole day. Using their personal badge, they can now use the lift to the basement, on their own or accompanied, and open their box. So that the Regionbank does not have to release and pay for hundreds of additional licences, we manage the vault in the system like a client. This means: one license with as many users as you like. Advantages for the end user: Centralised administration with customised issuing of rights by user, building, day and time frame One system for all locations Clear responsibilities Traceability
As prime targets for criminals, banks have always faced major security challenges. But today, when banks are pressed to increase revenues, improve operational efficiency, and mitigate risk, defending against security threats is increasingly expensive. Two key drivers in the banking sector are customer trust and operational efficiency. Both are significantly strengthened by a quality integrated ‘smart’ banking security solution. Smart banking security solution A robust security strategy is of the highest priority and is usually embedded within the bank’s Risk Management Plan. This enables banks to manage operational risk and compliance demands. The modern approach to bank security design incorporates IT, Channel Management and Identity and Access Management systems into one solution. At the heart of Vanderbilt, systems are compliance with some of the highest industry and regulatory standards. These systems impact all bank functions and help deliver greater trust, operational efficiencies, and excellent customer experience. Vanderbilt video surveillance Vanderbilt can provide live video surveillance that continuously monitors and provides quality images should a suspicious event need to be investigated In the bank’s self-service area, Vanderbilt can provide live video surveillance that continuously monitors and provides quality images should a suspicious event need to be investigated. Meanwhile, Vanderbilt’s Seismic detectors protect ATM's 24/7. These detectors give immediate and reliable alerts of attacks on the enclosure, but unlike other detectors, do not register false alarms triggered by passing traffic or the vibrations of the ATM itself. Seismic detectors and interlocking Electronic security measures are also used in other banking situations – for example, when a customer claims he tried to withdraw cash from an ATM and was issued a receipt, but no cash – the bank can check with a specialised data department to ascertain whether the money was deducted from the customer’s account. When a staff member unlocks the vault, the door to the secured area simultaneously locks Unique codes grant workers who fill ATMs access to secured areas and the ability to unlock ATM's. The worker's code over-rides any ‘delayed unlock function,' so he can immediately access the ATM and fill it. There are set time limits for the work to be done. The ATM buzzes for a pre-determined time before the machine is due to auto-lock. If the worker needs more time, he can delay this. Once the job is done – the ATM automatically locks. Another example of bank security involves interlocking. When a staff member unlocks the vault, the door to the secured area simultaneously locks. This prevents anyone else from gaining entry until the vault is once again locked. This ensures the safety of staff members and the security of vault contents. Electronic security There are many layers of electronic security protecting the bank. If the manager arrives early, he uses his card to gain access to the branch office and a PIN to disarm the alarm. His code disables the office and secure area, but the ATM's, vaults and safe deposit boxes remain armed. A Central Monitoring Station is alerted to the early entry. They need to know whether the entry is routine or under duress. The monitoring station views the manager on live video as he executes a pre-determined security procedure and until he hits an ‘All is OK' button. If there is a problem – the manager can send a silent ‘Duress Alarm' rather than the ‘All is OK.' The Monitoring Station can listen in – and if necessary can call the police. Security in banking is an essential issue. It requires thoughtful attention and procedure while allowing room for agility, adaptability, and dependability – flagship traits of the Vanderbilt brand. Banks wish to operate in an open and friendly layout while ultimately safeguarding their customers, staff, and assets. Vanderbilt's solutions respond to these expectations and enable active safeguarding foundations to be laid.
Davis School District is the second largest in Utah and ranks 52nd in the U.S. Given its large student population spread across 299 square miles, the school district has placed a high value on maintaining the safety and security of its schools, each of which is equipped with a video surveillance system. Until recently, those systems were analogue across the district – but given the performance and quality of video those systems generate, Davis School District changed that. Dome camera with built-in-motion detectionThe SND-6084R is a fixed-dome type with built-in motion detection, which is ideal for covering areas where nobody should be at night The choice to go with Samsung IP cameras district-wide was based primarily on the quality of the cameras. Samsung’s recorders and Samsung Security Manager (SSM) video management system solidified the decision. Along with other models, the system employs the SND -6084R, a fixed – dome with built-in-motion detection, as well as the SNP -6200RH, PTZ camera. Samsung Techwin offers more than one camera with infrared illumination to support day/night use in outdoor areas, but they have different capabilities. The SND-6084R is a fixed-dome type with a wide field-of-view. With built-in motion detection, it’s ideal for covering areas where nobody should be at night. Integrating video surveillance with intrusion detection In contrast, the SNP-6200RH is a PTZ-type camera, which might be better for an active parking lot, for example, where a security officer can use the PTZ function to have a closer look at something if necessary. Following each installation, the Samsung cameras have demonstrated their value several times over. As the number of Samsung cameras continues to grow, the Davis School District will be integrating video surveillance with intrusion detection systems to further enhance the ability to identify the cause of and respond to burglar alarms. Upgrades will continue for the foreseeable future as funding becomes available and technology continues to advance.