Axis Communications announces the upcoming launch of AXIS Object Analytics. This intelligent video analytics application offers detection and classification of humans and vehicles tailored to the surveillance need. Ideal for various installations including public buildings, warehouses, and parking lots, it will be offered pre installed on compatible Axis network cameras, adding value at no extra cost. Designed with a straightforward interface, tailored scenarios are easily set up with only a few...
The DMP Field Technical Training team is excited to welcome Matthew Darmody to its ranks. He is relocating to the New York Metro/New England territory where he’ll lend his technical expertise in training DMP-authorised dealers in that region. Darmody’s first introduction to the alarm industry was through the installation of car alarms, roughly 26 years ago. After earning his degree at ITT Tech, he went on to pursue an electrician apprenticeship program. Past experience For the las...
Ajax Systems, the developer behind the most award-winning wireless alarm in Europe, has hired a UK Sales Leader to strengthen the presence in the UK market and expand the local team. Steve Norman is a security industry veteran. For the last 20 years, he was working for major international manufacturers from the US and China, and a distribution and integration company in the UK - this experience lets Steve understand the industry from all sectors. Industrial intruder detection Lately, he headed...
AxxonSoft has launched version 4.4 of the Axxon Next intelligent VMS. This version includes new functions of neural analytics and camera management, enhanced GUI and Web Client, and many other enhancements and improvements. Supported body temperature measurement with a number of thermographic camera models. Measurement results appear as captions over video and are saved to an archive. Upon discovering an individual with abnormal body temperature, the camera creates an alarm event, and sends it...
Ajax Systems have announced that the latest OS Malevich 2.9 update brings significant changes for users and security industry professionals. The new data import feature simplifies the process of replacing old hubs with new ones. Remote activation/deactivation Detectors that work incorrectly can now be deactivated remotely and still be part of the system. Button and transmitter got new types of alarm notifications, adjustable in the app. Automation devices can now work in pulse mode and a...
Genetec Inc., a renowned technology provider of unified security, public safety, operations, and business intelligence solutions, announced the latest deep integration to result from its enduring partnership with Bosch Security Systems (“Bosch”). Users of the widely deployed Bosch MAP 5000 intrusion alarm panels can now directly connect to Genetec Security Center through the Intrusion Manager, combining intrusion, video and access control into one intuitive interface. Facility and s...
Alarm systems have been available for decades, but many solutions offer little functionality beyond a sensor triggering an alert in the event of a break in. To take alarms to the next level, Hikvision is bringing a number of new and innovative technologies to market, allowing customers to meet their home and business security requirements more fully and to help expand the alarm business. No one can stay alert for a potential home or business security breach every hour of every day. That’s why alarm solutions are critically important for customers in terms of identifying and reacting to any incident in the fastest and most effective way possible. Enhancing residential and corporate security Hikvision offers a broad range of alarm solutions and technologies for different customer requirements But not all situations require the same kind of alarm system, which is why Hikvision offers a broad range of alarm solutions and technologies for different customer requirements. In some cases, for example, a customer needs to be aware when the perimeter of a site or location is breached. In other situations, they may need to monitor entrances or site perimeters, to track multiple intruders at the same time, or to speed up responses in the event of attacks in buildings or in public spaces. Hikvision innovative alarm solutions To address this broad range of end-customer requirements, Hikvision has created a broad portfolio of innovative alarm solutions that are sophisticated, automated, and always fit for purpose. These allow one to: Meet customers’ home security requirements with Hikvision Intrusion Alarm A break-in at a customer’s home can cause major upset, as well as material and financial losses. With Hikvision Intrusion Alarm solutions, they can get peace of mind that their home is properly protected at all times. Hikvision Intrusion Alarm solutions To maximise home security, the intrusion alarm solutions combine a wide range of integrated detectors To maximise home security, the intrusion alarm solutions combine a wide range of integrated detectors, including door and window-contact detectors, break-glass detectors, vibration detectors, smoke, and temperature detectors. Customers can also stream video from their security cameras direct to their mobile phones with Hikvision’s pioneering Intruder Verification as a Service (IVaaS) technology, which seamlessly unites video with cutting-edge intrusion detection capabilities in a single platform. Wireless alarm control panels The Hikvision Intrusion Alarm solution includes wireless alarm control panels and peripherals that make it fast and easy to deploy in home environments. Wired products are also available for small commercial applications. For residential applications, end users can connect into the alarm control panel, receive alerts, and watch streamed video from CCTV cameras on their handheld device. They can also configure their home security system remotely and view alarm reports. Detect and track multiple intruders concurrently over large distances with Hikvision Security Radar Customers with large sites to secure may need to track multiple intruders concurrently. They can get this capability with Hikvision Security Radar, which offers a detecting distance of up to 120 metres and a 120° detecting angle. That means customers can cover sites of 15,000 square metres and – most importantly – they can track up to 64 targets simultaneously. Hikvision Security Radar To make life easy for customers’ security teams, they can define the different areas they want to monitor, such as the warehouse, the car park, the perimeter or entrance, and others as needed. One Hikvision Radar can link up to 4 PTZ dome cameras at the same time to check multiple targets via video. With Hikvision, customers also get an extremely low rate of false alarms. This means they can focus on real intruders rather than pets or other animals, or weather interference such as fog, rain or snow. Stop criminals before they can do any damage with Hikvision Perimeter Protection The best way customers can minimise safety risk and damage to their assets is to stop intruders while they are still outside of the site or building, and that’s what Hikvision Perimeter Protection is all about. To stop criminals in their tracks, we use two parallel infra-red bars that have to be broken at the same time for the alarm to be sounded. Hikvision Perimeter Protection solution With two infra-red bars, customers can filter out all kinds of false alarms With two infra-red bars, customers can filter out all kinds of false alarms, from small animals crossing their perimeter, to falling leaves or flickering lights, which means they always know when an intrusion threat is real. Furthermore, their solutions are temperature and weather hardened, enabling deployment outside, in all kinds of perimeter locations. Their customers can also monitor their perimeter security remotely via their handheld devices. Increase safety for people in public places with Hikvision Emergency Alarm An emergency situation can unfold anywhere, in a school, on a university campus, in a park, or in the street. To help security teams work effectively, and ensure that people feel safe wherever they are, Hikvision has created the Emergency Alarm system. Hikvision Emergency Alarm system This solution allows a person in an emergency situation or attack to call for help by pushing a button, or by broadcasting a call for help to police or emergency response teams, or both. The Hikvision solution has a built-in camera and audio recording facility to collect evidence of the events taking place. In addition to these benefits, the Hikvision solution is available in different formats and can be integrated with joined-up ‘safe city’ technologies, including dome cameras, license-plate recognition cameras, low-light cameras, and much more. This kind of solution is already being deployed to improve safety in cities, parks, universities and schools worldwide and can be deployed in a wide range of other customer scenarios. Fit-for-purpose alarm solutions for every application Based on these four key application areas, Hikvision alarm solutions cover all of customers’ home security and business security requirements. While Hikvision Intrusion Alarm solutions protect homes and small businesses against break-ins, their Security Radar, Perimeter Protection, and Emergency Alarm solutions enable protection of people and assets and rapid responses on a far larger scale, either for large sites or in smart-city environments.
The Partnership for Priority Verified Alarm Response (PPVAR) is pleased to announce Tom Nakatani, IT VP of Customer Monitoring Technology for ADT, has been elected President. Nakatani officially began his two-year term at the June 10th PPVAR member’s meeting after serving as Vice President. He succeeds Joey Rao-Russell, President and CEO for Sonitrol-Kimberlite, who will now serve on the PPVAR Board as an immediate past President and Treasurer. “I am honored to take on the role of PPVAR President and to work with the distinguished and influential group of industry thought leaders, public safety leaders, and key partners on our Board of Directors,” said Tom Nakatani. Changing verification technology use Tom adds, “The use of verification technology is fundamentally changing the relationship between the alarm industry and public safety for the better. We’re thrilled to be involved with the development of industry standards that will provide more actionable information for first responders. This information will improve officer safety while prioritising their impact.” Tom Nakatani also sits on the Board of Directors for the Security Industry Association Nakatani started his career at ADT in 1991 and has held a number of positions with the company including global monitoring technology, monitoring standards, program management, operational reporting, M&A, and product delivery. He also sits on the Board of Directors for the Security Industry Association and participates on a number of industry and regulatory committees. Promoting the value of verification As PPVAR continues to work toward its mission of promoting the value of verification during the dispatch process, it is expanding the composition of its Board of Directors to increase the number of public safety representatives. This change will ensure that the PPVAR board will represent a balanced team of professionals with excellent relationships across both public and private sectors as they work together on the issues related to alarm response process. Three of the public safety and partner members were introduced and spoke at the virtual meeting, including: David L. Holl is the Director of Public Safety for Lower Allen Township, PA. Director Holl oversees the police department, emergency medical services, is liaison to two Township volunteer fire companies, and serves as the municipal Emergency Management Coordinator. He sees his involvement in PPVAR as a way to directly impact false alarm issues and is looking forward to influencing the future of responding to emergencies. Frank G. Fernandez, is the retired Chief of Police from Miami and Hollywood Police. He is the former Director of Public Safety and Assistant City Manager for the City of Coral Gables, Florida. He is currently president of Blueprints 4 Safety (B4S) Strategies Group LLC, a security and risk assessment consulting group specialising in vulnerability assessments, strategic planning and best practice policing/public safety strategic development. He chose to become involved in PPVAR because he sees the opportunity to increase situational awareness for police when responding to emergencies and to bring awareness to his public safety colleagues about the alarm industry. John Chiaramonte is President of Mission Critical Partners’ Consulting Business where he leads more than 80 dedicated and specialised public safety professionals in improving his clients’ emergency response outcomes. He is a subject matter expert in emergency communications, 911 and next generation 911. One of his goals in participating with PPVAR is to improve emergency response outcomes as new technology brings changes to emergency dispatch centers. Strengthening public safety partnership With a bold vision for the future for PPVAR, new President Nakatani plans to continue to build on the work of the previous presidents by helping improve collaboration with public safety and other partners. This vision for the future includes expansion of the PPVAR Board, educating public safety and industry members, creating a framework for alarm verification scoring, and collaborative work with PSAPs to incorporate the next generation of technologies.
Customers may know it as DMP’s enhanced all-in-one system — and until now, the XTLtouch has only been available to Verizon customers. DMP is pleased to announce that the XTLtouch Wireless Control Panel with AT&T LTE is here. “We’re very excited about this,” says DMP’s Vice President of Sales Mark NeSmith. “No other all-in-one offers the same powerful and flexible solution. For areas that require AT&T service, this allows our dealers to much more aggressively compete in the residential and small commercial markets.” Graphic touchscreen keypad All XTLtouch installation options offer Entry Check-In Protection included at no extra price The XTLtouch combines DMP’s elegant and intuitive 5-inch graphic touchscreen keypad with the popular XTLplus. The installer can place it in the best location with the option of wireless sirens and wireless keypads exactly where their customers want them. All the keypads have the exact same interface so users can learn them quickly and move from one to another easily. Plus, it’s competitively priced. In fact, all in a single small footprint, the XTLtouch comes standard with: 99 zones of DMP’s 900 MHz Two-Way Wireless LTE AND Wi-Fi communication Six Areas or Home/Sleep/Away Arming or All/Perimeter Remote control via DMP’s Virtual Keypad app or VirtualKeypad.com Built-in Z-Wave support for up to 140 Z-Wave Plus devices Custom Actions - up to 20 different user programmable scripts that can be programmed into the XTLtouch Video integration with multiple options via the Virtual Keypad app or browser Proactive safeguard Compared to other all-in-one systems, the XTLtouch offers much more, including: Entry Check-In Protection All XTLtouch installation options offer Entry Check-In Protection included at no extra price. In the event of an intrusion, this is a proactive safeguard against a burglar’s fast tactic to disable the security system before it can send a signal. “Entry Check-In Protection is based on the same reliable check-in technology that we’ve used for years for our high-security customers,” NeSmith explains. External 110dB Wireless Sirens The XTLtouch’s external 110dB wireless siren can be placed anywhere. When it comes to real security, this can make a resounding difference. “The first thing an intruder would typically do is try to disable the soundmaker,” NeSmith says. “But with the XTLtouch, since the siren won’t be coming from the main panel, it’s not alerting the intruder to where the main system is; therefore, it’s more secure.” Fast and flexible installations And they remind, that the XTLtouch offers table-top and wall-mount installation options to fit the customer’s preferences. And, depending on where they find the best cell reception or wireless coverage, the installer will be able to place the panel wherever it works best with the option of installing up to eight wireless sirens, as well as seven additional keypads. Those keypads all have identical user interface as the main unit and can be placed exactly where the customer wants them.
With 73% of all domestic burglaries occurring through a door, it is now more important than ever that maximum-security locks are in place to offer protection from potential break-ins. Mul-T-Lock’s coveted Break Secure 3DS anti-snap cylinder has been specially designed to help locksmiths meet consumer demand for high security locks, and now it has excelled in recent tests – surpassing the British Standard Kitemark BS EN 1303:2015 test 10 times over. To achieve the highest Grade 6 in this test, a lock must withstand 100,000 cycles, but Mul-T-Lock’s Break Secure 3DS euro profile cylinder completed a staggering one million accelerated cycles – offering the very best protection in lock security. Unrivalled level of security We are so confident that the Break Secure 3DS cylinder will offer maximum protection to a home" As well as complying to the EN 1303 standard, the Break Secure 3DS cylinder has also undergone rigorous independent testing by the Master Locksmiths Association to meet the Sold Secure Diamond SS312 standard, as well as the TS007 3 Star standard developed by the Door and Hardware Federation (DHF) and the Glass and Glazing Federation (GGF) in conjunction with Secured by Design, the police preferred specification. The Break Secure 3DS cylinder offers three separate lines of defence, enabling locksmiths to offer customers an innovative solution with an unrivalled level of security that will deter even the most resolute intruder: A sacrificial end – designed to snap to protect against lock-snapping; the most common form of entry to a property Bump resistant – many cylinders can be easily ‘bumped’ (inserting and tapping an illegal key to release the cam and open the door), but the Break Secure 3DS is proven to resist this Drill resistant – engineered using high strength material and robust construction to withstand prolonged drilling In addition to these lines of defence, the Mul-T-Lock Break Secure 3DS cylinder boasts anti-screw and anti-pick protection, and the key or thumb turn is still able to operate internally, even after the cylinder has been attacked. Latest security standards Michael English, Mechanical Product Manager at Mul-T-Lock, said: “Our Break Secure 3DS cylinder means locksmiths can be confident of achieving the latest security standards, which in turn, means peace of mind for their customers. As consumers become more aware of the importance of home security, this product offers locksmiths a key weapon in the battle against domestic break-ins. In fact, we are so confident that the Break Secure 3DS cylinder will offer maximum protection to a home that we also offer a full ten-year guarantee.” Mul-T-Lock also offers a one keyed house solution encompassing the Break Secure 3DS cylinder, with patented keys that only Mul-T-Lock Approved Locksmiths can cut.
Life has just become much easier for control room operators and security personnel with the launch of 5 new Wisenet P ultra-high definition 4K AI cameras. In addition to capturing superb quality images, the new feature rich cameras from the Hanwha Techwin Premium range are equipped with deep learning video analytics which offer a high level of detection accuracy, whilst minimising false alarms. The license-free deep learning video analytics simultaneously detects and classifies various object types, including people, vehicles, faces and licence plates and is supported by Wisenet AI algorithms unique to Hanwha Techwin which are able to identify the attributes of objects or people, such as their age group, their gender or the colour of the clothing a person is wearing. Control room efficiency The algorithms are even able to recognise if a person is wearing glasses or is holding a bag The attributes are saved as metadata alongside the images captured by the new Wisenet P AI cameras, enabling users to quickly search for specific objects or incidents. The algorithms are even able to recognise if a person is wearing glasses or is holding a bag. To further increase operator efficiency, as well as minimise network bandwidth and data storage requirements, the new Wisenet P AI cameras have a BestShot feature which, as its name suggests, is able to select the best images which have been captured of a person or object, and only send these together with the associated metadata, to a storage server. False alarm reduction Operators are able to take advantage of VMS from leading software developers such as Genetec and Milestone, as well as Wisenet WAVE and Wisenet SSM, to forensically search for specific objects or people, by filtering the recorded metadata. The analytics can be configured to ignore video noise, waving trees, moving clouds and animals, all of which might normally be the cause of false alarms when standard motion detection technology or sensors are being used to detect activity. This ability to minimise time wasting and costly false alarms means control room operators and security personnel are able to focus on responding to real incidents and emergencies. At some point in the future, when the number of people being tested positive for COVID-19 begins to reduce, thought will no doubt be given as to how businesses will be able to safely reopen. Business intelligence solution The data can be displayed to provide managers with information on the number of people present Inevitably, social distancing rules will have to remain in place, and this is likely to mean only a specified number of people will be allowed to be in a controlled area at any one time. With this in mind, the Wisenet AI algorithms built into the new Wisenet P 4K AI cameras can be utilised to accurately count the number of people entering and leaving a premise. The data can be displayed to provide managers with information on the number of people present. The new Wisenet P AI cameras are likely to be of particular interest to the retail sector as they have been integrated with Wisenet Retail Insight (v2.0), which enables retailers to gain a greater understanding of customer behaviour and buying patterns. The Wisenet Retail Insight business intelligence solution utilises people counting, heat mapping and queue management applications to display statistical analytics on a centralised dashboard, along with other practical information such as weather reports. Analyse customer demographics With the help of Wisenet AI algorithms, Retail Insight is also able to display the age and gender of store visitors, allowing retailers to granularly analyse customer demographics. Other key features of the new Wisenet P AI cameras include: Digital auto-tracking: The cameras are able to transmit two streams of video, providing the option for operators to see a camera’s full field of view, whilst at the same time using a digital PTZ auto-tracking feature while viewing Full HD images to track the movements of a person or vehicle. Wide Dynamic Range (WDR) which performs at up to 120dB to produce clear images from scenes containing a challenging mix of bright and dark areas which normally results in overexposed or underexposed images. DC output: A 12V DC power supply with maximum 50mA provides sufficient power to support external devices, including LEDs, PIR sensors and glass break detectors, eliminating the need to install separate power supplies for each of them. Alarm in/out ports: Connected devices such as LEDs can be activated when a camera detects and classifies an object or person. 2 SD card slots allow video or data to be stored at the edge should there be disruption to the network. Video evidence, which might have been potentially lost, can be retrieved when the network connection has been restored. Motorised varifocal lens The new Wisenet P AI cameras are as follows: Wisenet PNB-A9001 - 4K AI box camera Wisenet PNO-A9081R - 4K AI bullet camera Wisenet PNV-A9081R - 4K AI vandal-resistant dome camera with built-in IR illumination Wisenet PND-A9081RF - 4K AI flush-mount dome camera with built-in IR illumination Wisenet PND-A9081RV - 4K AI dome camera with built-in IR illumination The dome cameras have a four-part magnetic modular design which makes them extremely easy to install With the exception of the Wisenet PNB-A9001, all models come supplied with a 4.5~10mm (2.2x) motorised varifocal lens which facilitates auto-tracking and allows operators to zoom into a camera’s field of view to see close up detail of any activity and functionality. The dome cameras have a four-part magnetic modular design which makes them extremely easy to install. The ability to prefigure IP network settings without the need to remove the camera modules from their packaging, also reduces the time an engineer has to spend on site and/or cause disruption. Video surveillance solutions “We are proud of all the new innovative products and solutions we have launched over recent months, but this new camera range is a particularly good example of how Hanwha Techwin is continuing its 30 year journey of innovation and adding real value to video surveillance solutions,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. “By harnessing the power of Deep Learning AI, we are providing security personnel with an extremely powerful and accurate tool to help them keep one step ahead of intruders and we are also able to provide businesses with information which could help them be more productive.”
ADT, globally renowned security and automation provider that serves residential and business customers, has announced that it is providing US $1 million, through its ADT Always Cares program, to support over 100 non-profit organisations in 44 states and Puerto Rico affected by COVID-19. ADT Always Cares program The funds are being allocated in US $5,000 and US $10,000 increments to nonprofits in communities where ADT employees live and work. Local ADT teams are determining which charities to support with choices ranging from soup kitchens and homeless shelters to first responder organisations or any other nonprofit which serves those in need. “All of us at ADT are immensely grateful to our hometown heroes on the front lines who are selflessly continuing to serve their communities while facing the unique challenges of a COVID-19 environment,” said Jim DeVries, President and CEO of ADT. Jim adds, “Through our giving, we are supporting local organisations who share our passion and commitment to create safer neighborhoods, improve lives and help make the world a better place.” COVID-19 relief fund One of the first US$ 10,000 recipients will be Gleaners, an Indianapolis food bank The check presentations will start May 18 and continue through June, 2020. One of the first US$ 10,000 recipients will be Gleaners, an Indianapolis food bank that has distributed over a half a billion pounds of food since 1980. “Gleaners is navigating the hunger relief crisis associated with COVID-19. We are grateful for the ADT contribution which will help us provide emergency food boxes throughout our service area to hungry Hoosiers, many of whom find themselves struggling to put food on the table for the first time,” said John Elliott, President and CEO of Gleaners. LifeSaver celebrations to support police, fire departments As part of ADT’s award-winning Always Cares program, employees volunteer more than 20,000 hours each year benefiting hundreds of non-profit organisations and touching the lives of thousands in need. Examples of support include providing meals through local food banks, building homes with Habitat for Humanity, beautifying Ronald McDonald Houses and much more. ADT also supports police and fire departments through its LifeSaver celebrations, a signature program that recognises ADT employees and first responders who help save the lives of ADT customers.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organisation. Time-intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralised operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analysed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
Johnson Controls recently unveiled the findings of its 2018 Energy Efficiency Indicator (EEI) survey that examined the current and planned investments and key drivers to improve energy efficiency and building systems integration in facilities. Systems integration was identified as one of the top technologies expected to have the biggest impact on the implementation in smart buildings over the next five years, with respondents planning to invest in security, fire and life-safety integrations more so than any other systems integration in the next year. As advanced, connected technologies drive the evolution of smart buildings, security and safety technologies are at the center of more intelligent strategies as they attribute to overall building operations and efficiencies. SourceSecurity.com spoke with Johnson Controls, Building Solutions, North America, VP of Marketing, Hank Monaco, and Senior National Director of Municipal Infrastructure and Smart Cities, Lisa Brown, about the results of the study, smart technology investments and the benefits of a holistic building strategy that integrates security and fire and life-safety systems with core building systems. Q: What is the most striking result from the survey, and what does it mean in the context of a building’s safety and security systems? The results show an increased understanding about the value of integrating safety and security systems with other building systems Hank Monaco: Investment in building system integration increased 23 percent in 2019 compared to 2018, the largest increase of any measure in the survey. When respondents were asked more specifically what systems they we planning to invest in over the next year, fire and life safety integration (61%) and security system integration (58%) were the top two priorities for organisations. The results show an increased understanding about the value of integrating safety and security systems with other building systems to improve overall operations and bolster capabilities beyond the intended function of an individual system. Q: The survey covers integration of fire, life safety and security systems as part of "smart building" systems. How do smarter buildings increase the effectiveness of security and life safety systems? Hank Monaco: A true “smart building” integrates all building systems – security, fire and life-safety, HVAC, lighting etc. – to create a connected, digital infrastructure that enables individual technologies to be more intelligent and perform more advanced functions beyond what they can do on their own. For example, when sensors and video surveillance are integrated with lighting systems, if abnormal activity is detected on the building premise, key stakeholders can be automatically alerted to increase emergency response time. With integrated video surveillance, they also gain the ability to access surveillance footage remotely to assess the situation. When sensors and video surveillance are integrated with lighting systems abnormal activity on the premise can automatically be detected Q: How can integrated security and life safety systems contribute to greater energy efficiency in a smart building environment? Hank Monaco: Security, fire and life-safety systems can help to inform other building systems about how a facility is used, high-trafficked areas and the flow of occupants within a building. Integrated building solutions produce a myriad of data that can be leveraged to increase operational efficiencies. From an energy efficiency standpoint, actionable insights are particularly useful for areas that are not frequently occupied or off-peak hours as you wouldn’t want to heat or cool an entire building for just one person coming in on the weekend. When video surveillance is integrated with HVAC and lighting systems, it can monitor occupancy in a room or hallway. The video analytics can then control the dimming of lights and the temperature depending on occupant levels in a specific vicinity. Similarly, when access control systems are integrated with these same systems, once a card is presented to the reader, it can signal the lights or HVAC system to turn on. In this example, systems integration can ultimately help enable energy savings in the long run. Security and life safety systems contribute to help enable greater energy efficiency and energy savings in the long run Q: What other benefits of integration are there (beyond the core security and life safety functions)? Hank Monaco: Beyond increased security, fire and life-safety functions, the benefits of systems integration include: Increased data and analytics to garner a holistic, streamlined understanding of how systems function and how to improve productivity Ability to track usage to increase efficiency and reduce operational costs Enhanced occupant experience and comfort Increased productivity and workflow to support business objectives Smart-ready, connected environment that can support future technology advancements Q: What lesson or action point should a building owner/operator take from the survey? How can the owner of an existing building leverage the benefits of the smart building environment incrementally and absent a complete overhaul? Lisa Brown: Johnson Controls Energy Efficiency Indicator found that 77% of organisations plan to make investments in energy efficiency and smarter building technology this year. This percentage demonstrates an increased understanding of the benefits of smart buildings and highlights the proactive efforts building owners are taking to adopt advanced technologies. There is an increased understanding that buildings operate more effectively when different building systems are connected As smart buildings continue to evolve, more facilities are beginning to explore opportunities to advance their own spaces. A complete overhaul of legacy systems is not necessary as small investments today can help position a facility to more easily adopt technologies at scale in the future. As a first step, it’s important for building owners to conduct an assessment and establish a strategy that defines a comprehensive set of requirements and prioritises use-cases and implementations. From there, incremental investments and updates can be made over a realistic timeline. Q: What is the ROI of smart buildings? Lisa Brown: As demonstrated by our survey, there is an increased understanding that buildings operate more effectively when different building systems are connected. The advanced analytics and more streamlined data that is gathered through systems integration can provide the building-performance metrics to help better understand the return on investment (ROI) of the building systems. This data is used to better understand the environment and make assessments and improvements overtime to increase efficiencies. Moreover, analytics and data provide valuable insights into where action is needed and what type of return can be expected from key investments.
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all of which are commonly used to support security solutions. The underperformance, from June 15 to August 24, of U.S. stocks with high revenue-exposure to China, and that of Chinese stocks with high revenue-exposure to the United States was significant and almost identical at 3.2%, significant losses to some investors already involved in security industry M&A activity. Significant public safety Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety While it was not apparent that practitioners’ security program budgets kept pace with the growth of the more popular solution providers like video surveillance and cyber security, the ICT industries supporting the security economy continued to expand, especially in wireless and wired infrastructure, including preparations for 5G wireless rollouts. These omnipresent technologies drove significant public safety, smart city and public venue projects in 2018. Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety. In 2018, virtually every public presentation, webinar and published Q&A on social media monitoring and facial recognition technologies I worked on, involved significant pushback from privacy advocates, almost to the point of alarmism. Massive risk reduction Several solution providers in these areas have made significant strides on data protection, accuracy, powered by AI and documented crime reduction cases; however, this real news is quickly shadowed by privacy advocates, seemingly ignoring massive risk reduction, especially in the case of active assailants and gang-related crime. Will FR become mainstream? The cautious security industry may take a cue from the maverick retail industry, sports venue and VIP verification solution providers that grew in 2018. 2019 trends: presupposition or repudiation; winners and losers. Chinese tariffs have had a huge impact on the security industry, which can be seen from changes to U.S and Chinese stocks Although technology adoption forecasting is inexact, there are definitive opportunities in the security industry born on necessity. With the widespread problem of false alarm transmission and inability for first responders to ‘be everywhere,’ developers of solutions that provide automated verification and alternative security incident detection are expected to become mainstream. Promising detection systems The use of AI, NLP, LiDAR, UAS (Unmanned Aerial Vehicles aka drones) with surveillance and thermal imaging will grow, mostly due to higher acceptance in other industries like autonomous vehicles, rail safety, terrain and post devastation mapping/rescue. However, legacy ‘listing’ or certification organisations will be forced to make an important decision for their own survival: work toward integrating these promising detection systems into acceptance by insurance, licensing and standards development organisations. 2019’s ‘true’ Industrial Philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants 2019’s ‘true’ industrial philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants. For these use cases, 5G infrastructure rollouts, FR acceptance, lower cost perimeter detection and long range object and fire recognition by LiDAR and Thermal imaging will all be watched closely by investors. Should public agencies and philanthropical solution providers in the security industry cross paths, we may just yet see a successful, lifesaving impact. Cyber risk profile The ‘Digital twin’ refers to a digital replica of physical assets (physical twin), processes, people, places, systems and devices that can be used for various purposes. Your ‘Security Digital Twin’ has a similar physical and cyber risk profile, either through common threats, similar assets or both. Good news: managing your risk, protecting assets and securing your facilities in 2019 will get easier as security digital twin profiles will grow in maturity, while keeping their data sources private. This will be accelerated by the maturity of AI-based, auto-generated visualisations and image recognition, that happens to also drive the FR solutions. The 5G wireless infrastructure market is emerging as far more of a quantum leap in connectivity, like ‘wireless fiber optics’ performance, than an upgrade to 4G LTE. The 5G infrastructure market will be worth $2.86 billion by 2020 and $33.72 billion by 2026, growing at a compound annual growth rate (CAGR) of 50.9%. Intelligent applications The explosion of ingested voice, video, and meta-data, the interconnectivity of devices, people and places, and the integration of intelligent applications into expanding ecosystems all require faster communications. To be more accurate, 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity: 5G and FWA (Fixed Wireless Access). 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity Quite simply put, larger solution providers are gently coaxing practitioners into seemingly ‘open systems;’ the negative discovery during an M&A process, audit or integration with a smart city’s public/private partnerships will continue to be revealed, and related industries will force reform. Autonomous things will be enabled by AI and image recognition. With few affordable rollouts of security robots and outdoor unmanned ground vehicles (UGV) that leveraged platforms popular with research and even NASA, the autonomous security robot was mostly MIA from a security practitioner’s program in 2018. Perimeter intrusion detection One platform was even accused of intimidating homeless people in a public place, at a major city. Industries mutually beneficial are often unaware of each other; this will change gradually: one major domestic airport is currently evaluating a UGV platform performing perimeter intrusion detection, runway weather conditions and potential aircraft taxiing dangers. The platform is being used largely in transportation research, yet offers significant opportunities to the security industry. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR The ‘immersive experience’ of virtually any security or threat detection is a twist on virtual/augmented/mixed reality (VR/AR/MR) with additional sensory features. Although VR/AR/MR is well underway in other industries, there are several companies with solutions like VR-based active assailant training that could provide a fighting chance for practitioners, employees, visitors, faculty and children. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR. Security ecosystem members Not necessarily MIA, but of special mention is the need of security and safety practitioners to prioritise communications systems over ‘nice to have’ expansive video surveillance systems for mass casualty threats. This will eventually improve with 5G for Enterprise solution rollouts. At the past GSX and upcoming CES Technology trade shows, a new roundup of technologies is discovered: a wider diversity of protection promise to save ASIS members on their technical security program is realised. With each of the ‘winners,’ (5G, AI, NLP, LiDAR, UAS [Unmanned Aerial Vehicles aka drones], thermal imaging, digital security twins and smart-city-friendly technologies) it is both exciting and challenging work for both security practitioners and solution providers. All things equal and with the necessary technology acceptance testing processes, this is a truly great time for security ecosystem members.
The Security Industry Alarm Coalition (SIAC) has a mission to be the voice of the electronic security industry on issues involving municipal alarm management for the approximately 18,000 public safety agencies in the U.S. and Canada. Specifically, SIAC works to minimise the number of false alarms, which are a costly waste of resources for law enforcement jurisdictions. SIAC works directly with leaders in law enforcement at the national level, such as the International Association of Chiefs of Police (IACP) and the National Sheriffs’ Association (NSA); and at the state and local levels to provide expertise and proven strategies to reduce unnecessary dispatches to alarm sites while maintaining the police response taxpayers endorse and deserve. The primary tools for alarm management are education on causes of false alarms and implementation of the Model Ordinance for Alarm Management and False Alarm Reduction. SIAC's Model Ordinance SIAC works to minimise the number of false alarmsRecently both the International Association of Chiefs of Police and National Sheriffs’ Association passed resolutions supporting SIAC’s Model Ordinance. This has resulted in dispatch reductions between 40-50% in jurisdictions where all of the model’s recommendations have been followed. Adoption of some version of the Model Ordinance grows each year. It has been adopted nationwide by over a thousand large cities and small towns. Fourteen states have adopted SIAC’s suggestion of a statewide alarm management committee through state associations of chiefs of police. “This enables the industry to work with law enforcement leadership on a regular basis and in a formalised structure to discuss and address issues,” says Stan Martin, SIAC Executive Director. Fourteen states have adopted SIAC’s suggestion of a statewide alarm management committee SIAC worked with the industry on new alarm panel standards that made it less likely an end user would trigger a false alarm. The overall dependability and sophistication of alarm systems have also helped make them less vulnerable to outside forces that can trigger the system. Video and audio technology are playing an ever-increasing role with helping monitoring centers evaluate whether a crime is in progress before dispatching the police. Dramatic changes in the industry Kirk MacDowell was recently selected as SIAC’s new Chairman of the Board. He is a dynamic industry leader with more than 39 years of experience in the industry. SIAC’s biggest challenge is maintaining strong financial support for its work during a time of dramatic changes in the structure of the electronic security industry. The Security Industry Alarm Coalition (SIAC) has a mission to be the voice of the electronic security industry SIAC’s biggest challenge is maintaining strong financial support for its work during a time of dramatic changes Some cities require a "verified response" before police officers are dispatched to an alarm. This requirement is problematic for the end-user as it requires a third-party confirmation that a crime is being or has been committed. This creates a significant delay in response to crime victims needing immediate help. Fortunately for citizens, the vast majority of cities have rejected ordinances that require confirmation that a crime has taken place prior to police dispatch – verified response. Over the past 15 years only about 34 of 18,000 public service agencies in the U.S. have adopted some form of verified response and 10 of those cities ended the policy. It is important to note that despite the rejection of verified response in favor of the Model Ordinance, there are still individuals who lobby aggressively to curtail police response without verification. This requires a continued and aggressive education program to get in front of these lobbying efforts which are based on false premises and misleading statistics, says Martin. Despite SIAC’s success, there are a number of important issues that need to be addressed, says Martin. First is the high turnover among law enforcement leaders and elected officials. SIAC has been effective in developing relationships with current leaders in law enforcement as well as the next generation of leaders who are currently rising through the ranks of their departments. SIAC has been effective in developing relationships with current leaders in law enforcement as well as the next generation of leaders Coordinating challenges Another challenge has been the attempt by at least one city (Sandy Springs, Ga.) to fine alarm companies for customer-generated false alarms. SIAC is currently coordinating a challenge of that ordinance in federal court with the state alarm association in Georgia. SIAC is also working on plans for more secure funding and on succession planning so the organisation can continue to move forward aggressively in the future. SIAC, Inc. is a 501(c)(6) not-for-profit Delaware corporation. The Board of Directors has two members from each of the major North American trade associations: Canadian Security Association (CANASA), The Monitoring Association (TMA, formerly CSAA), Electronic Security Association (ESA), and the Security Industry Association (SIA), and an elected official. SIAC is funded by donations from individual companies. There are no memberships dues, and the organisation sells no products or services.
Could millions of burglar and fire alarm control units be recalled by the U.S. Consumer Product Safety Commission? That could be the upshot when the independent agency of the U.S. government rules on a 'Complaint of Non-Conforming Products' investigation requested on behalf of a consultant/forensic expert who says he has identified non-compliance dangers and vulnerabilities related to the devices. Breaching security standards Jeffrey Zwirn, an alarm and security forensic expert, says he has identified problems with the alarm devices and has posted online a series of videos confirming that they do not operate in conformance with Underwriters Laboratories (UL) 985 and 103 and NFPA 72 (National Fire Alarm and Signaling Code) Standards. Specifically, the single data-bus circuits of the hardwired devices can be short-circuited and become either fully or partially non-functional. The U.S. Consumer Safety Product Commission is tasked with promoting the safety of consumer products by addressing “unreasonable risks” of injury, such as risk of fire, chemical exposure, electrical malfunction or mechanical failure.The U.S. Consumer Safety Product Commission is tasked with promoting the safety of consumer products Typically, the CSPC evaluates such requests and determines what corrective action, if any, is appropriate, in this case possibly by the end of the year. IDS Research & Development Inc. (Zwirn’s company) and Connaughton Group LLC, a product integrity consulting firm, sent a request to the CSPC on Sept. 20 asking for an investigation of products across the North American household fire and burglar alarm control units and commercial burglar and fire alarm control panel category. Recalling alarm control units The request estimates that “hundreds of millions” of the units were sold and installed across the United States. They include products sold under brand names such as Honeywell, DSC, NAPCO, ELK Products, and Interlogix. If the recall were to happen, it would be the largest recall in the history of the alarm industry. The request states: “It is our expert opinion that these non-conforming control panels present a foreseeably dangerous and serious public safety hazard and risk to all of the unsuspecting consumers, their families and business owners who have these control panels installed in their homes and businesses.”These non-conforming control panels present a foreseeably dangerous and serious public safety hazard" Zwirn has also submitted the products for investigation by UL and Intertek Testing Services Inc., which respectively provide the UL and ETL certification marks and are Nationally Recognized Testing Laboratories (NRTL). Outcomes of those investigations are forthcoming. Jeffrey Zwirn also promotes and sells a product, The Interceptor, that would address the vulnerability. It is a microprocessor designed to protect the data-bus and auxiliary power output wiring installed throughout a protected premises.
When it comes to emergency planning and response, there is an abundance of resources to help enterprises prepare to mitigate the impact of an incident. The U.S. Federal Emergency Management Agency (FEMA) has devised the National Incident Management System (NIMS), aimed at defining and standardising ways that resources can be used to manage and respond to an incident. An enterprise’s Emergency Operations Plan, or EOP, incorporates NIMS concepts and spells out what to do in an emergency. Security equipment purchases But how does an EOP relate to security equipment purchases? In the language of FEMA, enterprises should ask themselves: How do I currently ‘resource type’ my electronic countermeasures as part of my critical incident response plan? In FEMA parlance, ‘resource typing’ is categorising resources according to capability using FEMA’s ‘Typing Library Tool’. The tool identifies technologies that can improve response. Technology purchases should be considered in the context of their role in the larger plan, says Jerry Wilkins, PSP, Vice President of Active Risk Survival. “Currently, that doesn’t happen, and we as an industry do not even speak in the same language as those who guide emergency responses to which security equipment can be a useful contributor,” Wilkins says. The National Incident Management System is aimed at defining and standardising ways that resources can be used to manage and respond to an incident Wilkins speaks with authority based on a long career in the industry. Beyond his experience working in burglar alarms, home security, and as a manufacturer’s rep, Wilkins has expanded his expertise to the broader categories of incident command, emergency response and law enforcement. He has received FEMA IS-0100 (incident command training) and has sought to apply it to critical incidents, active shooters and other emergency situations. He has attended Solo Engagement Operator Training (SWAT school) and Tactical Emergency Casualty Care (TECC) military training. Responding to emergencies As a student in a broad array of disciplines, Wilkins has sought to engage the security technology industry in an important conversation: What can we do as an industry to apply technical capabilities to the question of how to respond to an emergency? Adherence to best practices can help to avoid liability – and save lives For example, CCTV is a valuable tool for situational awareness, but it wasn’t deployed in the aftermath of the Parkland, Florida, school shooting in 2018 until 24 minutes into the incident. “By the time they decided to use the video, [the shooter] was already gone. They had 15 high-definition cameras, but they did not know how to use the technology for situational awareness because it was not part of the Emergency Operations Plan. They could have known every move [the shooter] made if the technology had been part of the EOP,” says Wilkins. Here is another example from the Parkland shooting incident response. When responding to an incident, Emergency Medical Service (EMS) typically divides a site into three levels – hot zones, warm zones, and cold zones – based on danger levels. In the Parkland shooting, the 1200 building went ‘cold’ – meaning it was safe – as soon as the shooter left the building. But it was 58 minutes before they called it a ‘cold’ zone, thus delaying survivors’ access to emergency care that could have saved lives. Better situational awareness, provided by leveraging CCTV, would have made the difference. If OSHA puts out a white paper on how to protect a facility and you don’t do it and have an event occur, how does that look?" There are a number of other available standards, processes and other documents to guide emergency response. Adherence to best practices can help to avoid liability – and save lives. Ignoring known and well-documented best practices can leave an enterprise vulnerable in the aftermath of an incident. Understanding these principles and best practices can help security equipment companies understand how the benefits of their products can be maximised in this context. Here are some available resources: NFPA 3000, a 42-page provisional standard for responding to an active shooter, addresses all aspects of the process, from identifying hazards and assessing vulnerability to planning, resource management, incident management at a command level, competencies for first responders, and recovery. National Association of School Resource Officers (NASRO) has created Standards and Best Practices for School Resource Officer Programs. PASS (Partner Alliance for Safer Schools) has compiled School Safety and Security Guidelines and a School Security Checklist. Federal Bureau of Investigation (FBI) has released ‘Making Prevention a Reality: Identifying, Assessing and Managing the Threat of Targeted Attacks’. Department of Homeland Security (DHS) has released ‘Planning and Response to an Active Shooter: An Interagency Security Committee Policy and Best Practices Guide’. U.S. Secret Service has released ‘Enhancing School Safety Using a Threat Assessment Model: An Operational Guide for Preventing Targeted School Violence’. OSHA 3148 provides policy guidance and procedures to be followed related to occupational exposure to workplace violence. (OSHA is the Occupational Safety and Health Administration) OSHA’s ‘general duty’ clause requires that each employer furnish to each of its employees a workplace that is free from recognised hazards that are causing or likely to cause death or serious physical harm. “If OSHA puts out a white paper on how to protect a facility and you don’t do it and have an event occur, how does that look?” says Wilkins. “It’s regulatory guidance that you could have followed but didn’t.”
One of the largest public train operators in the United Kingdom, Southeastern Rail Network, now relies on a smart video security solution from Bosch Security Systems to secure twelve train depots, including five unmanned locations, against theft and intrusion. The fully digital video surveillance system presents a significant upgrade to the British train operating company, which provides train services between London, Kent and parts of East Sussex and transports 6, 40,000 passengers each weekday on its 392 trains. Built-in Intelligent Video Analytics Powered by cameras featuring built-in Intelligent Video Analytics, the solution was installed and configured to the specific requirements at the train depots by Bosch integration partner, Taylor Technology Systems Ltd., over the course of six months. Video security system relies on machine learning algorithms to automatically sound alarms on security threats Fully operational at all twelve locations, the video security system relies on machine learning algorithms to automatically sound alarms on security threats, such as intruders and perimeter breaches. Beyond security applications, the system also tracks important metadata on the arrival times of trains, while also monitoring deliveries at the train depots, among other AI-assisted functions that it carries out. IP-based cameras with Starlight technology The cameras portfolio installed across the twelve depots replaces an analogue legacy solution with IP-based security cameras from the Flexidome, Dinion, and Autodome product lines of Bosch Security Systems. These smart cameras include Bosch’s Intelligent Video Analytics capabilities as a built-in feature, ensuring that the most relevant video data can be precisely applied to the requirements of the train depots. Because night-time security and surveillance is critical, especially at the five unmanned train depots on the network, the Bosch cameras rely on Starlight technology to provide full intelligent analytics at night and in low light levels. The Starlight technology supports colour filtering down to a light level of only 0.0077 lux, so as to deliver detailed monochrome images where other cameras show no image at all, and guard against intruders and unauthorised entry around the clock. Featuring digital ‘trip wire’ to counter false alarms Highly resilient against false alarms, the smart cameras can detect movement at the perimeters of the train depots using a digital ‘trip wire’. In case of a security breach, the system alerts Southeastern Rail Network’s watch personnel, who can view live camera footage, as well as recordings of incidents for heightened situational awareness and total perimeter security. Instead of relying on the pre-configured capabilities, such as vehicle tracking and more, security personnel can also use the built-in camera trainer function to ‘teach’ new functionality, such as detecting certain types of objects or situations. Remote video recordings storage with Divar recorders Recordings from the depots are safely stored and managed remotely with Divar recorders in encrypted format As an integral part of this end-to-end Bosch security solution, recordings from the depots are safely stored and managed remotely, using Divar all-in-one recorders in encrypted format. When looking at the bigger picture, the video security solution adopted by Southeastern Rail Network is part of an industry-wide evolution from cameras as mere video capturing devices to smart sensors capable of collecting rich metadata. Insights beyond security This metadata unlocks unique insights beyond security, including video analytics at the train depots that support applications such as monitoring deliveries to onsite buildings, providing access to personnel and logging the arrival and departure times of incoming trains. The system thereby not only ensures that all train depots remain fully guarded and protected 24/7 against criminal access, but also provides a data-based foundation to keep efficiency gains and cost savings on track in the long run.
Fury Motors has served the St. Paul, Minnesota area for more than 50 years. Founded in 1963 as a family-owned and operated business, the dealership offers the community a diversified mix of vehicles and services including new and pre-owned vehicles, financing, auto repair and maintenance. Currently, the dealership employs 115 people locally and is a one-stop-shop for all things automotive and trusted by the community. Committed to offering quality new and used vehicles for every taste and need, Fury Motors maintains a large and complete inventory of new Chrysler, Dodge and Jeep vehicles. With more than $50M in inventory on a 10-acre lot, security has taken on a whole new level of importance since the dealership was founded. Challenges faced With the face of retail ever-evolving, challenges commonplace for auto dealerships have not only intensified but evolved, too. The safety and security of employees, customers and assets has taken on a whole new meaning-making visibility into daily operations not just important but critical to business success. Now more than ever businesses require flexibility, agility and adaptability in their business solutions. This is particularly evident when it comes to solving security challenges. Fury Motors is no exception. The dealership realised simply recording security events as they happened was no longer enough. It needed to take a proactive stance on protecting its assets. Security of assets and operations To provide perspective, Fury Motors’ video security system required constant monitoring to capture events that were time and cost-prohibitive even with a monitoring company. And, if they could afford to have someone watch the cameras 24x7, human observations are subject to error or oversight. Fury Motors relies on remote monitoring to protect its inventory and capture valuable insight As a result, most video footage was never viewed or put to practical use, so Fury Motors was missing valuable information that could improve the security of assets and its operations. With no guard on-site, Fury Motors relies on remote monitoring to protect its inventory as well as capture valuable insight into employee behaviour and customer service practices. When the dealership turned to Global Axiom and Ava, a unified security company, it was losing $7K+ a month to internal theft and operational inefficiency above and beyond losses and damage to inventory. Global Axiom Remote Monitoring powered by Ava Aware Fury Motors realised that it could and should get more value from its remote monitoring service including its intelligent video security system and footage. The dealership turned to Global Axiom for a monitoring service coupled with Ava Aware to provide the perfect solution to stay a step ahead of criminals and potential losses. And even more importantly, it gives Fury Motors the data intelligence to take business operations to a whole new level with greater efficiency and resource optimisation. Fury Motors needed a new approach to security. Specifically, a system to capture, analyse and present the big picture data. Everything from monitoring people and assets on the outdoor car lots to technicians doing oil changes in the service bay to the handling of incoming parts and inventory after hours. Video monitoring solution Combination of Global Axiom’s remote monitoring expertise and Ava Aware technology is unprecedented The dealership’s new intelligent video monitoring solution uses artificial intelligence (AI) and machine learning bringing a new level of agility and flexibility to monitoring services allowing Fury Motors’ security operators to quickly review footage from past incidents, increase situational awareness and respond time to evolving situations and capture trend data for developing strategies and making data-driven decisions to prevent future problems. The combination of Global Axiom’s remote monitoring expertise and powerful Ava Aware technology is unprecedented. Ava Aware allows Fury Motors to accelerate investigations by searching objects and events of interest with speed and precision. Critical when managing $50M+ in inventory. Four important Ava differentiators Proactive threat detection Ava’s intelligent algorithms and self-learning detect abnormal behaviour in specific Fury Motors scenarios and alerts operators in real-time. It intelligently highlights what’s truly relevant from all Fury Motors’ cameras, in real-time, all the time. Powerful search using machine learning Fury Motors is now able to search by event and similarity to perform appearance and image detection powered by machine learning capabilities. The dealership is now able to comb through countless hours of video in seconds. Critical in pre-empting theft and invaluable in managing operational efficiency. Directional audio analytics Fury Motors’ dealership is expansive with $50M in inventory on-site. The dealership needed a solution like Ava Aware to provide 360-degree coverage with Ava’s innovative acoustic sensors. The cameras identify specific sound patterns to determine the type of sound and its direction, and sends instant alerts to the Ava Aware video management system, providing Fury Motors’ security operators with a complete overview of the surroundings. Enhanced business and operational insights Fury Motors security and operations teams now have more situational awareness and insights. The dealership can monitor and count people and vehicles, watch smart maps to understand hot spots or high traffic areas to manage occupancy and shift scheduling and ultimately, improve customer service. Improved operational efficiency Fury Motors is positioned to carry on for another 50+ years as a leader in the St. Paul, Minnesota market. Management team is able to review past events, respond to changes in real-time and enhance operational efficiency with real data With its new improved monitoring service powered by analytics, the dealership’s management team is able to both review relevant past events but more importantly, proactively respond to situational changes in any environment via real-time alerts to prevent situations from occurring. Similarly, management is able to improve operational efficiency with real data. Ava’s technology Ava’s mobile technology allows investigators to immediately search footage across multiple video cameras from the field to decrease the time-to-target and save hours of investigation and suspect-tracking. Again, creating significant operational efficiencies and increasing the likelihood to prevent and/or recover lost assets. Video analytics Video analytics has also allowed Fury Motors to create customised alerts allowing the dealership to take a proactive and preventative response to a variety of problems. This need gained significance in the wake of health and safety guidelines put in place for COVID-19 and since has allowed Fury Motors to improve customer service by being more in tune with employee response times to customers on the lot. Data analytics The ability to detect both patterns and anomalies using Ava’s powerful data analytics is empowering Fury Motors to enforce compliance and respond to important company mandates in the short term while improving operations and protecting employees and customers in the long-term. Win-Win partnership “The Ava Aware solution combined with the Global Axiom remote monitoring service has been a tremendous win. Not only have our losses been eliminated but more importantly the headaches around dealing with those losses are gone as well. Our goal is for our customers to feel safe on our lot no matter when they choose to shop. They should feel comfortable that if they drop their car off for service or trust us with it for repair we will keep it safe. The Ava / Global Axiom solution provides this level of service and allows us to stay focused on serving our customers,” Fury Motor’s Owner, Tom Leonard.
Inaugurated in 2012, the government of West Bengal had taken an initiative to build a Cultural & Research Institute to commemorate the birth anniversary of Bengal’s polymath, known as the Bard of Bengal, globally. Spread over an area of 4.89 acres, the institute is in the heart of New Town with facilities including an auditorium, art gallery, exhibition hall, mini cinema hall and music room. Every year, thousands of guest tour exhibits, attend cultural programmes, enjoy movies, and view artifacts. Incident management While the Cultural & Research Institute had delegated personnel to keep a watch on the premises, manning the expansive property proved to be time-consuming and inefficient. For security team, round-the-clock security preparedness at the location was crucial and ensuring the safety and security of the guests was quite a challenge. The management wanted to build a unified solution, aiming to not only deliver 24x7 surveillance but also empower the on-ground team to manage incidents proactively. Specially, they were facing the conflicting dilemma of keeping priceless objects safe yet allowing millions of visitors a chance to see them. Intelligent VMS After analysing the requirements, the Videonetics team conducted a detailed survey of the property along with the system integrator for the project, Prakash Electricals, to draw out a comprehensive plan for the campus. The state-of-the-art Videonetics unified solution combining Intelligent VMS and Intelligent Video Analytics coupled with IP cameras were chosen to address the unique needs of specific areas. Videonetics Intelligent VMS helps in recording and viewing 25+ cameras throughout the property including gated entrance, open-air pavilion, fountain park, art gallery, auditorium, passages, server room to name a few. The institute wanted a video analytics solution that could help with protecting valuable artifacts in the art gallery. The art gallery is secured with a virtual and invisible protective barrier called Artifact Protection. If an individual breaches this perimeter, in an attempt to touch or steal an artwork/paintings, an alarm is triggered and immediately received both in the centralised location as well as by the security personnel on their mobile devices, allowing them to react and take action quickly. During the survey, some of the vulnerable areas were identified where Videonetics deployed Zone Monitoring as part of the unified solution. The zone monitoring was required at the entrance, operators’ room, art gallery, park space, to detect when a person stays beyond a certain duration in a user-marked zone. Monitored facility The Cultural & Research Institute has been very successful in promoting an open and secured environment where guests and staff could move freely throughout the premises while keeping an eye on strategic locations and limiting access to more sensitive areas such as management offices, cash handling office and crossing barrier near to precious artifacts. Today, incidents are rare at the institute; but if something happens, the team is ready. The security team is alerted in real-time to any irregularities within the site, including tampering with the exhibits and entry into the restricted access zones. From the start of the tour, visitors become aware that they are in a secured and monitored facility. “As we looked to address a variety of surveillance challenges, we were assured to have Videonetics on board to exceed customer’s expectations, in terms of intuitive functionalities, open architecture and accuracy. With Videonetics team, we have successfully provided a right balance between securing the people and protecting assets, to the institute,” expressed, Ujjwal Kumar Dey, Partner, Prakash Electricals.
On an average, approximately 400,000 tons of cargo passes through Malpensa Airport every year, located in Milan, Italy. The Alha Group is the major cargo handling agent at the 25,000-square-meter site, which houses 32 airlines, with 34 large cargo aircrafts. Handling cargo at Malpensa Airport In 2012, Malpensa Cargo became a certified competence and administration centre for air cargo and road transport, especially for premium-quality small goods, such as smartphones, tablets, designer clothing and accessories. The Alha Group chose a system from MOBOTIX AG, a renowned manufacturer of cameras in Germany Since then, passenger transport in Malpensa has increased exponentially, which has driven the Alha Group to procure a video surveillance system that offers the very highest level of protection. The Alha Group chose a system from MOBOTIX AG, which has been manufacturing cameras in Germany for over 20 years. MOBOTIX thermal imaging cameras "We have installed nine MOBOTIX thermal imaging cameras at our sites in Malpensa, Rome Fiumicino, Segrate, Pioltello, Verona and Prato to strategically cover the key traffic areas," said Marco Alesi, Security Manager at the Alha Group. The MOBOTIX thermal systems were installed by Alha's business partner, Trium at the beginning of March 2020, in response to the COVID-19 pandemic. Alha can now reliably control access to its offices and warehouses. Virtual security cage The project also saw the construction of a ‘Virtual security cage’ that Alha uses to protect the valuable goods of its customers that are being transshipped against theft. An infrared alarm system delineates a defined area and the video-based system triggers an alarm, as soon as an intruder enters this area. With the help of live images from the camera, the uninvited guest can be identified and stopped immediately. The Alha Group has consequently replaced an expensive conventional locking system with an advanced digital video solution and sped up routine work processes at the same time. The MOBOTIX cameras are integrated into the burglar alarm system, which is controlled using security badges. A detailed log is kept to track when the system is deactivated. Integrated thermal imaging solution "We were, and still are, extremely satisfied with the MOBOTIX cameras we installed previously," emphasizes Marco Alesi, adding "Not only because of their high quality and durability, but also because of the numerous integration and development options we've been able to make use of over time. This is a huge advantage, and one that applies to our most recent installation too." The timesheet system has an integrated thermal imaging camera that is activated, every time an employee signs in The timesheet system has an integrated thermal imaging camera that is activated, every time an employee in the warehouse and office access area signs in. A recorded message asks the employee to look into the camera and remove any glasses or head coverings that they may be wearing for proper identification. If the camera measures their body temperature as being 37.5 degrees Celsius or less, a green LED on the camera flashes to allow access to the cargo bay. If the temperature measured is higher than 37.5 degrees Celsius, a flashing red light and another recorded message informs the employee to wait for a specialist member of staff to take their temperature using a clinical thermometer. VoIP intercom system At the same time, the system sends an email with a dated camera screenshot, stored personnel data and the measured temperature. The VoIP intercom system integrated into the camera enables Alha security staff to immediately communicate with employees who were temporarily stopped when entering the company building. "The extra checks are making us all safer during this crisis. We see the ability to contact someone immediately after they receive negative results for a preliminary test as an intrinsic part of our duty of care toward our employees," explains Alesi.
A used car lot owner had re-occurring issues with intruders cutting holes in the perimeter fence during night-time hours and vandalising or burglarising the area. The intruders would not enter the small office building, so the security system was never triggered. The customer did own a video surveillance system and it would record criminal activity but it did not prevent or deter crime. Integrating motion detectors Using the existing intrusion alarm panel (Interlogix NX8-v2 panel) and the existing video system, the system integrator introduced two OPTEX Visual Verification Bridges and four OPTEX Redwall SIP-3020 Outdoor PIR motion detectors. The motion detectors were installed over the two main perimeter light poles pointing into the lot with IP cameras located directly above each of the motion detectors. Access to camera visual With the two Visual Verification Bridges installed, the integrator can provide operators immediate access to eight live cameras during every alarm event. The Redwall SIP-3020 provided up to 30m of distance coverage and 20m width, complete with anti-masking and vandal tampers. With this simple but effective solution, the integrator was able to provide their customer with immediate visual verification of alarm sensors, only when the alarm panel is armed. Wireless key fobs were provided so the dealer can arm and disarm the system from outside the gate helping to eliminate false alarms during arming and disarming. Reduced false alarms Since the completion of this installation, there have been several nuisance alarms caused by cats that were immediately disregarded. Due to the visual verification solution there was no intrusion and the client has not had any vandalism or crime since. Per the customer’s request, the OPTEX Bridge has been installed on three additional car lots.
With more than 2,200 locations and 41,000 associates, Panda Express is America’s family-owned and operated Asian dining concept. Challenged with losses at the point of sale (POS) and growing false alarm penalties, the company turned to Interface Security Systems, a managed services provider delivering managed network, interactive alarm monitoring, video surveillance and business intelligence solutions to help them dramatically decrease shrink and resolve security inadequacies. False alarms and fines Panda store managers faced continuous distractions from false alarms, receiving calls from the legacy alarm company at all hours of the night and incurring fines from local law enforcement for needless police dispatches. Interface monitoring centre instantly verify any alarm from a Panda store “When an alarm went off overnight, our managers would always err on the side of caution, send police in, or go in themselves. That was dangerous in itself if there was actually a burglary happening inside the store,” says Lyle Forcum, Executive Director of Asset Protection at Panda Restaurant Group, parent company of Panda Express. “Additionally, we were losing significant amounts of money on false alarm charges.” Suspicious transaction notification To address the false alarm challenge, Interface installed a next-generation IP Interactive Monitoring system with live video and two-way audio, which offers a virtual, guard-like level of protection in every Panda location. Operators in the Interface monitoring centre instantly verify any alarm from a Panda store with live streaming video, eliminating false alarms. Forcum reports that Panda is saving over $100K per year in false alarm fees Panda had also implemented a customised, exception-based POS reporting system, which notifies Panda management whenever a suspicious transaction takes place at the register. Interface took the tool a step further by integrating it with the video surveillance and alarm systems at each of the Panda locations, allowing management to immediately connect to the video of any problematic transaction. Identify anomalies and prevent shrink The solution enables loss prevention professionals to quickly identify anomalies and prevent shrink. Top offenders from thousands of employees doing millions of transactions can easily be bubbled up to the top. The combination of business intelligence and video surveillance resulted in a massive reduction in shrink and cash shortage at the register. The business intelligence provided allows for focused tracking and improved store operations With Interface, Panda has experienced vast improvements in security for its associates, customers and assets. Forcum reports that Panda is saving over $100K per year in false alarm fees and thousands of dollars per month per store in reduced shrink at the POS. Monitoring intrusion data The business intelligence provided allows for focused tracking and improved store operations, including people development, store performance data comparison, optimised store efficiencies, monitored intrusion data, and cash tracking. Panda and Interface have successfully partnered to create a potent security and loss prevention tool in the Quick Service Restaurant space. “Interface is a partner that's been collaborating with us on our needs from day one,” says Forcum. “The company understands what we need, and then it develops solutions towards that end. It doesn’t just come up with an off-the-shelf product and expect us to purchase it. Interface has shown a real commitment to our business. We meet with them regularly to collaborate on new initiatives and on emerging issues that Panda faces. The company has truly become part of that solution voluntarily and eagerly. Other business partners do not do that. Interface is, in fact, a true part of the Panda team.” A more detailed case study and video testimonial on Panda Express can be found on the Interface website.
Round table discussion
Tools such as standard operating procedures (SOPs) and checklists ensure that every factor is considered when installing a physical security system – or do they? Security system installations are detailed projects, and any overlooked detail is a missed opportunity to make the system better. We asked this week’s Expert Panel Roundtable: What is the most overlooked factor when installing physical security systems?
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
Ensuring privacy is often a concern for video surveillance systems, especially in situations where a system intended for “public” surveillance could somehow, perhaps inadvertently, view private areas or situations. The classic example is an apartment building whose windows are within the range of a video surveillance camera. How can you provide video surveillance without invading the privacy of the apartment dwellers? Integrators and end users often turn to technology for a solution. We asked this week’s Expert Panel Round Table: How can smart camera features (such as privacy masking and programmable pan-tilt-zoom) address concerns about privacy?