Campus security systems
Allegion, a provider of security products and solutions, and CBORD, a provider of campus card technology solutions, announced a new integration that strengthens perimeter security across colleges and universities in the U.S. Allegion’s Von Duprin Remote Undogging (RU) and Remote Monitoring (RM) options will now extend the impact of CBORD’s card software system for greater control of secondary doors over perimeter access. The integration improves perimeter security by providing elect...
Established in 1950 in a small chapel in downtown San Diego to serve San Diegans experiencing homelessness and poverty, Father Joe’s Villages has since grown to include a comprehensive campus and scattered-site programs that provide comprehensive housing and services to people struggling with homelessness in San Diego. The organisation provides housing to over 2,000 people every night and serves more than one million warm, nutritious meals annually. In addition to offering hope to those e...
Avigilon Corporation, a Motorola Solutions company, announced the newest version of its video management software, Avigilon Control Center (ACC) 7.4, which incorporates artificial intelligence-powered facial recognition technology. The new “appearance alerts” capability will help commercial organisations, such as educational institutions and hospitals, accelerate response times by identifying people of interest in enterprise settings. For example, the technology can alert the securi...
Pivot3, a provider of intelligent infrastructure solutions, announced that it is providing its hyperconverged infrastructure (HCI) software platform to Lenovo Datacenter Group (DCG) to deliver integrated edge computing solutions optimised for mission-critical Smart City and Safe Campus environments. As part of Lenovo’s ON DEMAND program, Pivot3 and Lenovo have developed fully qualified solutions for edge deployments that are available through Lenovo’s network of channel partners worl...
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
The technology partnership established between BlueBox Video and Hanwha Techwin means that images captured by Wisenet Full HD, ultra-high definition 4K and 360 degree fisheye cameras can now be cost effectively displayed on and across a video wall, as well as on a desk top PC monitor. The successful integration of Wisenet WAVE Video Management Software (VMS) with professional grade video wall controllers manufactured by BlueBox provides an affordable control room solution for a wide range of ap...
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, announced that it will unveil new headquarters in the City of London, in the autumn of 2019. The announcement follows a period of accelerated growth for Genetec in the United Kingdom, with a significant and sustained increase in EMEA revenues over the last five years. Some of the company’s flagship customers in the UK include the Royal Borough of Windsor and Maidenhead, Twickenham Stadium and the University of Hull. Paul Dodds, Country Manager, UK & Ireland, commented: “At a time when Brexit has seen many organisations reconsider their presence, Genetec is unequivocal about the role of the United Kingdom as a critically important part of the global economy. As such, we’re delighted to be opening a central London headquarters to better meet the needs of our channel partners, end users, and prospects.” Public safety applications We work with local partners to provide training, compelling educational experiences, and state-of-the-art support The new headquarters will incorporate an expanded state-of-the-art training facility, and a new ‘Genetec Experience Center’ housing innovative solutions from Genetec and its large ecosystem of technology partners. Furthermore, the office will house a dedicated research and development team focused on justice and public safety applications for law enforcement, emergency responders and local government. Michel Chalouhi, VP of Global Sales, added: “The new London headquarters will give us the perfect platform to continue to execute our UK strategy and sustain the excellent year-on-year growth that we’ve achieved globally over the past years. The security market is growing and changing rapidly. We are constantly facing new challenges, so we need to ensure we work with our local partners to provide up-to-date training, compelling educational experiences, and state-of-the-art support. Our base in London will help us do that, thanks to its fantastic location, facilities, and links.”
Everbridge, Inc., a pioneer in critical event management and enterprise safety software applications to help keep people safe and businesses running, announced a partnership with RiskBand, a provider of wearable, live-monitored safety devices for organisations and their workers. The alliance is part of Everbridge’s strategy to reach the broadest set of workers, including those that may not always have ready access to a mobile phone, such as a hospitality employee, in-home healthcare provider, or lone worker in the field. With the additional modality and simple access of the RiskBand wearable device, Everbridge is expanding its addressable market for protecting employees regardless of their physical location, whether inside the office, working remotely, or travelling the globe. Critical events such as assaults and active shooter incidents are threatening lives and causing major business disruptions. Fatal work injuries have increased over the last decade, with 5,147 occupational fatalities recorded in the U.S. in 2017. Emergency response strategy The rise in smart technology is drastically improving operations for businesses across the globe" This challenge is only magnified by an increasingly mobile workforce, as well as the prevalence of lone worker scenarios across multiple industries served by both Everbridge and RiskBand, including healthcare, banking, retail, energy and utilities, hospitality, and higher education. Designed for enterprise-level personal safety and security, RiskBand’s wearable devices bolster an organisation’s emergency communication and response strategy. A single push of a button provides two-way voice, user profile data, images, and geolocation, in near real-time to your organisation’s security operations centre. As part of the partnership, Everbridge will integrate its award-winning Safety Connection™ platform with RiskBand’s wearables, allowing both Everbridge and RiskBand customers to receive emergency messaging and provide detailed reporting of their location. The data from an employee’s RiskBand device is shared back to the Everbridge platform, allowing an organisation to deploy the appropriate emergency response. The rise in smart technology and connected devices is drastically improving operations for businesses across the globe, and bringing about new opportunities to keep people safe,” said David Meredith, CEO of Everbridge. Immediate access to phones The collaborative partnership will enable us to enhance employee safety through state-of-the-art wearable devices" “Our partnership with RiskBand is advancing our existing connected safety ecosystem, offering employees without immediate access to a mobile phone with a direct line for emergency communication that they can utilise anywhere.” As part of the expansion of that ecosystem, Everbridge is looking to introduce additional wearables into the marketplace, and integrate further with IoT devices, sensors, and smart building technology, all to better protect employees from an increasing array of workplace threats. "It is especially gratifying that a respected industry leader like Everbridge recognises the powerful solution of the RiskBand ARIES device and platform. We believe that this collaborative partnership will enable us to empower businesses to enhance employee safety through state-of-the-art wearable devices that are fully integrated with the most comprehensive critical event management solutions,” explained Jim Van Law, CEO and Co-founder of RiskBand. RiskBand will be fully integrated into Everbridge’s platform. Individuals attending the Global Security Exchange (GSX) conference next week in Chicago can visit the Everbridge Booth #124 to learn more about the joint offering.
Threat Extinguisher, a Columbus, Ohio based innovator of a patented, innovative, non-lethal active shooter violence solution, has partnered with Paul Boucherle CPP CSC, founder of Matterhorn Consulting, LLC, to continue guiding their growth. Sam Fasone shared their core mission, "Our passion is saving lives in situations of extreme violence by providing an effective means of communication and defensive solution to the average person during highly stressful events. We have implemented our solution over the last 3 years with leaders looking for a new, proactive and innovative solution that can easily be added to existing security measures." Lifesaving technology The product operates like a fire extinguisher, and automatically communicates through wireless communication Paul Boucherle is a security hall of fame inductee, thought leader, writer, technology innovator, education advisory member and WPV mitigation advocate consultant in the security industry for 42 years. "I have helped technology solution providers, system integrators and end-users grow our industry my entire career, and this tool is a game-changer for the increasing threat of workplace violence. It offers an effective solution to the crucial first 5-minute response of an active shooter scenario to allow people to protect and quickly communicate to security first responders." Threat Extinguisher has installed their solution in schools, churches and corporate sites over the last 3 years, and is now prepared to engage select strategic partners to make this non-lethal and lifesaving technology available to the mainstay of security tools for security professionals. Wireless communication "Matterhorn Consulting has worked with us to help guide our early business development and new technology launch into the security industry for the last 19 months. This relationship has helped us prepare for our next phase of growth," according to Sam Fasone, CEO of Threat Extinguisher. The Threat Extinguisher product was recognised as a Top 30 New Technology in Security Sales and Integration magazine in December of 2018. The product is a long-range, military-grade pepper spray gel canister that operates like a conventional fire extinguisher, and automatically communicates through wireless communication to designated security personnel, monitoring companies, and first responders. It has commercial, industrial and residential applications, while potentially driving RMR growth opportunities.
Montreal-based TrackTik, the workforce management solution for physical security, is pleased to announce its sponsorship of Clery Center’s National Campus Safety Awareness Month (NCSAM) 2019. NCSAM originated in 2008 following unanimous congressional support for increased public awareness on issues surrounding campus safety, culminating in September becoming the designated National Campus Safety Awareness Month. Crucial issue of campus safety Montreal is a proud student city, and as a Montreal-based software company, TrackTik is very excited about this partnership" “This year’s theme of ‘Bridging the Gap’ focuses on connecting theory to practice in areas campuses often find confusing or challenging,” said Laura Egan, Clery Center Senior Director of Programs. “Through providing subject matter experts across the field in our webinars and hands-on resources like our flowcharts and tools, Clery Center highlights the questions that need answers and provides applicable ways to put the answers into practice.” “Montreal is a proud student city, and as a Montreal-based software company, TrackTik is very excited about this partnership,” said Brian Strasser, Senior Director of Partnerships at TrackTik. “We’ve been in talks with Clery Center for a while now, and are happy to support their initiatives on the crucial issue of campus safety.” Professional development opportunities “With risk being invisible, yet ever-threatening, we know that creating awareness and ensuring compliance with the Clery Act is vital,” Strasser said. “As such, we recognise the important work that Clery Center does and are delighted to support their initiatives.” In recognition of National Campus Safety Awareness Month, the two organisations have announced a joint webinar being held free of charge as part of the range of professional development opportunities offered during the month of September. Webinar participants will benefit from the combination of TrackTik’s proficiency in the field of security and Clery Center’s subject matter expertise on the Act. Both organisations will cover strategies to refine the reporting procedures necessary to ensure Clery compliance. Scheduled to take place September 19 at 2 p.m. EST, the webinar will be led by Laura Egan of the Clery Center, and Mark Folmer, Vice President, Security Industry of TrackTik and industry expert.
What could real-time access control do for your building security? In an instant, upgrading to real-time control boosts the intelligence of an access system, relaying live event reports and enabling you to change the security status of any door or user at any time. Real-time access control with wireless online locking provides options that do not exist with offline systems. With real-time functionality, facility managers get audit trails and change access rights for any door, user or credential instantly. You can lock or unlock any door remotely from the central admin software — which means no walking to the door in person and no delays when you need to take action at short notice. In schools, real-time wireless online access control enables security managers to remotely lock and open doors in any emergency, or whenever they choose. In hospitals equipped with real-time access control, staff see immediately who had access to drug stores or valuable equipment. Many more building types already benefit from real-time access control. Alerts are monitored in real-time, so you track and prevent any attempted unauthorised access Access anytime, anywhere Real-time access control relies on a network of communications hubs. These operate as a bridge between admin system software and access control door devices. In a SMARTair® Pro Wireless Online system, one communications hub links up to 30 wireless locking devices to the central system. Information is exchanged via an existing or new TCP/IP network, protected with AES-128 and SSL encryption. You can pass updates or read the event logs of any battery-powered SMARTair® escutcheon, knob cylinder, lock or wall reader anytime you choose. With real-time access control from SMARTair®, you can view the status of every door in your building at a glance. Alerts are monitored in real-time, so you track and prevent any attempted unauthorised access before it even happens. A real-time SMARTair® system alerts a facility manager in cases of intrusion, doors left open, low battery status, denied access or attempted use of any cancelled card or mobile credential.To amend door or time validity of any user credential takes a couple of clicks in SMARTair® admin software which you can access anytime and from anywhere. Plus SMARTair® gives you the option to combine wireless online and offline doors in the same system. You can fine-tune where you deploy real-time access control in different areas of your premises. Benefits for schools In an emergency, the school can remotely lock and open doors in real time via the admin softwareReal-time access control can impact your security and access management no matter what size or type your premises. At Westbridge Special Residential School, SMARTair® Wireless Online management proved a simple electronic solution for greater control and school security. Each staff member carries one RFID credential card programmed with access rights personalized to their role. In an emergency, the school can remotely lock and open doors in real time via the admin software.In Denmark, Vejle Friskole’s mechanical keys have been replaced by a SMARTair® online access control system. Over 80 doors and cabinets around the school are locked with SMARTair® wireless devices. Using the intuitive SMARTair® software, managers always have an overview of who has been at the school, and when. Audit trails are generated and monitored in real time using the SMARTair® system.
ASIS International, the membership organisation for security management professionals, will be staging its fourth annual Security Cares program at Global Security Exchange (GSX) 2019, to be held from September 8-12 in Chicago. A multi-faceted community-based program, Security Cares provides leaders of Chicago area community organisations and small-to-medium sized businesses with free access to valuable security education, networking, funding opportunities, and resources. The 2019 Security Cares education program will examine current issues surrounding workplace and community safety and security. “All organisations, regardless of size or complexity, need access to tools and resources to manage and mitigate risk across their enterprise,” says Christina Duffey, CPP, 2019 ASIS President. “Security Cares was developed to meet pressing safety and security needs of GSX host communities, providing small businesses and community institutions — such as places of worship, nonprofits, and schools — with unprecedented access to information via specialised programming and our global network of security thought leaders and solutions providers they can’t get anywhere else.” Addressing the community safety challenges Security Cares’ goal is to empower and impact the local community through education, networking, public healthExpanded for 2019, Security Cares’ goal is to empower and impact the local community through education, networking, public health, and school safety. With more than 30 highly informative sessions included in the education line up at GSX 2019, Security Cares learning sessions will address the challenges and needs associated with workplace and community safety and security. In addition, to the learning sessions, Security Cares registrants will have access to various networking events, the exhibits and cutting-edge programming on the expo floor (featuring the latest innovations and experts in the security profession), and Thursday’s keynote from cybersecurity expert, Tarah Wheeler. Installing security equipment in schools The Security Cares program at GSX 2019 also includes ASIS International’s School Security Grant Competition. First launched in 2003 as a means of giving back to the communities where GSX is hosted, the program helps fund the purchase and installation of security equipment at a local school building and/or campus. Additionally, in-kind donations are often sourced from the local chapter to supplement the grant. DeWitt Clinton Elementary will receive a $20,000 grant sponsored by Axis Communications in cooperation with ASIS This year, the grant is being awarded to Chicago’s DeWitt Clinton Elementary School at an event attended by school and local government officials on Friday, September 6 before GSX officially opens. Home to more than 1,200 students, DeWitt Clinton Elementary will receive a $20,000 grant sponsored by Axis Communications in cooperation with ASIS. Upgrading the security camera system “Our school serves a resilient population, more than 50% of whom are immigrants and refugees,” stated Maureen Delgado, DeWitt’s principal. “Providing a safe school and learning environment is of paramount importance to us. This grant will allow us to upgrade the school’s security camera system to add another level of security for our school community.” On Tuesday, September 10, from 10:00 a.m. – 5:30 p.m., Security Cares will roll up its sleeves to help save lives as we partner with the American Red Cross for a blood drive. The GSX 2019 blood drive will be located at booth #4407. Attendees can sign up in advance to participate in the blood drive, though walk-ups will be accepted as well.
Artificial intelligence (AI) is improving everyday solutions, driving efficiency in ways we never imagined possible. From self-driving cars to intelligent analytics, the far-reaching impacts of Deep Learning-based technology empower human operators to achieve results more effectively while investing fewer resources and less time. By introducing AI, solutions are not merely powered by data, but they also generate valuable intelligence. Systems which were once leveraged for a narrow, dedicated purpose, can suddenly be engaged broadly across an organisation, because the previously under-utilised data can be harnessed for enhancing productivity and performance. Video analytics software The video intelligence software processes and analyses video to detect all the people and objects that appear When it comes to physical security, for instance, video surveillance is a standard solution. Yet, by introducing AI-driven video analytics software, video data can be leveraged as intelligence in previously inaccessible ways. Here are some examples of how diverse organisations are using AI-based video intelligence solutions to enhance security and performance with searchable, actionable and quantifiable insights. Law enforcement relies on video surveillance infrastructure for extracting investigation evidence and monitoring people and spaces. Instead of manual video review and live surveillance – which is prone to human error and distraction – police can harness video content analysis to accelerate video investigations, enhance situational awareness, streamline real-time response, identify suspicious individuals and recognise patterns and anomalies in video. The video intelligence software processes and analyses video to detect all the people and objects that appear; identify, extract and classify them; and then index them as metadata that can be searched and referenced. Maintaining public safety For law enforcement, the ability to dynamically search video based on granular criteria is critical for filtering out irrelevant details and pinpointing objects of interest, such as suspicious persons or vehicles. Beyond accelerating video evidence review and extraction, police can leverage video analysis to configure sophisticated real-time alerts when people, vehicles or behaviours of interest are detected in video. Instead of actively monitoring video feeds, law enforcement can assess triggered alerts and decide how to respond. In this way, officers can also react faster to emergencies, threats and suspicious activity as it develops. Video analysis empowers cities to harness their video surveillance data as operational intelligence Empowering law enforcement to maintain public safety is important beyond the benefit of increasing security: A city with a reputation for effective, reliable law enforcement and enhanced safety is more likely to attract residents, visitors and new businesses, exponentially driving its economic development. Furthermore, in cities where law enforcement can work productively and quickly, time and human resources can be reallocated to fostering growth and building community. Video surveillance data Video analysis empowers cities to harness their video surveillance data as operational intelligence for optimising city management and infrastructure. When video data is aggregated over time, it can be visualised into dashboards, heatmaps and reports, so operators can identify patterns and more seamlessly detect anomalous behaviour. A city could, for instance, analyse the most accident-prone local intersection and assess the traffic patterns to reveal details such as where cars are dwelling and pedestrians are walking; the directional flows of traffic; and the demographic segmentations of the objects detected: Are cars lingering in no-parking zones? Are pedestrians using designated crosswalks – is there a more logical location for the crosswalk or traffic light? Do vehicles tend to make illegal turns – should police proactively deter this behaviour, or should the city plan new infrastructure that enables vehicles to safely perform these turns? Finally, does the rise in bike traffic warrant implementing dedicated biking lanes? With video intelligence, urban planners can answer these and other questions to facilitate local improvements and high quality of life. By leveraging the video insights about citywide traffic, public transit organisations can make data-driven decisions about scheduling and services Enhancing situational awareness Insight into traffic trends is also critical for transport companies, from public transit services to transportation hubs and airports. By leveraging the video insights about citywide traffic, public transit organisations can make data-driven decisions about scheduling and services. Analysing video surveillance around bus stops, for instance, can help these companies understand the specific hours per day people tend to dwell around bus stops. Correlating this information with transactional data for each bus line, bus schedules can be optimised based on demand for individual bus lines, shortening waiting times for the most popular routes. Similarly, the traffic visualisations and activity heatmaps derived from the video of major transit hubs, such as international airports and central stations, can be beneficial for increasing security, enhancing situational awareness, identifying causes of congestion, improving throughput and efficiency and, ultimately, solving these inefficiencies to provide a streamlined customer experience for travellers. Large education campuses Campus law enforcement can leverage video data to increase situational awareness and public safety Much like a city, large education campuses have internal transportation services, residential facilities, businesses and law enforcement, and video content analysis can support the campus in intelligently managing each of those business units, while also providing video intelligence to these individual groups. Campus law enforcement can leverage video data to increase situational awareness and public safety, driving real-time responses with the ability to make informed assessments and accelerating post-event investigations with access to easily extractable video data. When campuses are expanding or developing additional infrastructure, they can plan new crosswalks, traffic lights, roads, buildings and entrances and exits based on comprehensive video intelligence. By understanding where pedestrians and vehicles dwell, walk, cross or even violate traffic laws, the campus can inform construction projects and traffic optimisation. Countless business operations The campus can leverage video business intelligence to justify leasing pricing for different retailers across campus Finally, the campus can leverage video business intelligence to justify leasing pricing for different retailers across campus, demonstrating property values based on traffic trends that can be correlated with retailer point of sale data. Whether its empowering security, productivity or decision-making, the insights generated by AI-based technology can drive significant optimisation – especially when data is fused and cross-referenced across smart sensors and systems for even deeper intelligence. In the case of AI-backed video analytics, diverse organisations can harness video surveillance impactfully and dynamically. Whereas once video technology investments could be justified for their security value – with the introduction of AI capabilities – procurement teams can evaluate these solutions for countless business operations, because they offer broadly valuable intelligence. And video surveillance and analytics is merely one example of AI-driven solutions’ potential to disrupt business as we know it.
Governments and corporations face crisis events every day. An active shooter terrorises a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective response plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyse. Assessing threats for prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualise all this intelligence data within the context of an organisation’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social media monitoring Free tools like Google Maps or satellite imagery from organisations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis.Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organisations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating a threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualised on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organisations or communities they are protecting Acting and automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organisations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon security guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralised within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis of a threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate emergency response Virtually every organisation has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyse. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimise the impact by improving visibility, collaboration and response.
Schools today are charged to provide an environment that is both safe and conducive to learning, which can be difficult considering the range of security incidents and challenges they face, including bullying, fights, graffiti, theft and more. In addition to working within often tight budgetary constraints, a main challenge is to provide the highest level of security in an aesthetically pleasing way that doesn’t make students feel as if they are in prison. While these two needs may seem mutually exclusive to some degree, that doesn’t have to be the case. School security can be achieved without building 20-foot walls or putting barbed wire around the perimeter. The key to balancing the security and learning environment can be found in the four pillars of a good school security strategy, namely people, practices, technology and physical environment. A mobile app or text notification system could be used to alert students and staff of potential problems Situational awareness One of the most effective measures to take is to educate staff and even students to learn to be aware about their surroundings and adopt the 'If you see something, say something' mentality. In an emergency, time is of the essence, so the speed of response becomes critical. Educating staff and students to recognise potential problems and report them is a good first step. Augmenting this with mobile apps and/or texting capabilities, for example, that allow someone to send a photo to school security or law enforcement for quick assessment and evaluation, can speed response even more. A mobile app or text notification system could also be used to alert students and staff of potential problems and provide instructions on what steps to take in order to remain safe. By providing real-time situational awareness about potential responses, these types of technologies can reduce the number of armed guards or resource officers needed to patrol a school or campus, which also makes students more comfortable and able to learn in a non-prison-like environment. Security best practices Every school should establish a set of security policies and procedures and ensure that staff and students understand what to do if they suspect a problem or if an incident should unfold at the school. However, too often, schools may not know where to start when seeking out best practices. And once these policies are in place, there may be confusion about how to audit them to ensure people are properly educated. The NFPA has begun work on a school security standard that would address a range of issues schools face on a daily basis A number of organisations are available to aid with this process, such as the Partner Alliance for School Safety a group founded in cooperation with SIA (Security Industry Association), which provides resources and tools to help schools and security professionals evaluate and establish the best security protection for their buildings. These guidelines and best practices are designed to help schools spend their often limited funds on the right security solutions. Safe and Sound Schools provides downloadable school security toolkits, and the National Fire Protection Association (NFPA) has recently released the NFPA 3000 Active shooter response guidelines and has begun work on a school security standard that would address a range of issues schools face on a daily basis. The key takeaway is that the information is out there, and the organisations mentioned above are excellent resources for helping schools create safe, secure and learning-conducive environments. Technology in school security The second thing that needs to be considered is how technology can be brought to bear to contribute to school security. Video surveillance with video analytics can be deployed to monitor areas at certain times of day. For example, once school starts, there shouldn’t be a lot of activity in the parking lot or in particular areas around the school. For these situations, intelligent cameras with video analytics can be used to detect activity in those areas of interest to alert school security that something may need their attention. This might be a vehicle entering a lot or driving against the normal traffic flow, which may simply be a parent arriving to pick their child up early, or it could be something worth following up on. Radar detection is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area In any case, this is something that should be brought to the attention of someone who can quickly assess the situation and determine what, if any, response is needed. Because the goal in a potentially dangerous situation is speed response times. The faster you’re able to detect something using technology, the faster you’re able to respond. Therefore, being able to identify something happening in a parking lot and alert school resource officers could provide 30 seconds or a minute head start for response, which can get the school into a lockdown situation and get first responders on site more quickly.Facial recognition systems and providing access through smartphones could help create a more welcoming and secure environment for students, staff and parents After-hour monitoring solutions Monitoring buildings and facilities after hours presents a different set of challenges. For sporting events, the National Center for Spectator Sports and Security (NCS4) at the University of Southern Mississippi provides best practice guidance for sporting facilities and events not only just for universities but even including those at high schools. It’s been shown that using lighting at night can deter crime. However, it can be expensive to keep a building and grounds illuminated all night, every night. To mitigate these concerns and potential costs, there are video cameras available with extreme low-light capability that allows them to see in near-dark or in some cases complete darkness. This allows a school to save money by turning lights off while achieving a level of surveillance performance similar to daytime deployments. Radar detection Another technology for effective school security, both during and after school hours, is radar detection. This is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area. Radar can be deployed with a single PTZ camera, which can track whatever has been detected to provide real-time situational awareness for a school resource officer or law enforcement to investigate to determine the potential threat, if any, related to the perimeter breach.Following the four pillars of school security can ease the process while improving the effectiveness and efficiency of securing educational facilities More often than not, schools are faced with issues that are not necessarily the worst-case scenario everyone fears, such as how to identify parents and others who are authorised to pick a child up from school early. In this instance, facial recognition systems and providing access through smartphones could help create a more welcoming and secure environment for students, staff and parents. Lighting and landscaping In addition to technology, one of the things that can contribute to a safer school environment is environmental design. CPTED provides four basic principles, one of which is natural surveillance, which follows a 'see and be seen' philosophy. In other words, when people know they can be seen, they are less likely to commit a crime. The main points in this general principle are lighting and landscaping. For example, a school doesn’t want to block potentially vulnerable areas with landscaping, so the height and thickness of any potential landscaping elements should be carefully considered. In general, openness and visibility should be the guiding factors. Securing physical environment Another aspect of the physical environment is maintenance. If a window gets broken but isn’t fixed right away, that tends to invite vandalism. These are just two of the guidelines CPTED offers for creating a more secure environment that doesn’t feel like a prison. In general, finding the right mix between maintaining security and providing a welcoming, aesthetically pleasing and learning-conducive environment can seem like a difficult – if not impossible – task. Following the four pillars of school security can ease the process while improving the effectiveness and efficiency of securing educational facilities.
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customise the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-time access control security updates Furthermore, once healthcare facilities are able to digitise all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analogue to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change – is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorised staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardised technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more. Missed the rest our healthcare mini series? Read part one here and part two here.
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilising so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilising a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organisation, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualisation tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organisations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson football game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analysing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organisational change is difficult, and our team hopes to make the transition process easier for our customers.”
According to the reports of not-for-profit organisation Gun Violence Archive, the year 2018 saw 323 mass shooting incidents as of November. This number is 346 for the year 2017 and 382 for 2016, with ‘mass shooting’ defined as cases where four or more people are shot or killed in the same time period and location. A variety of gunfire detection solutions and other technology approaches seek to address the problem. ShotSpotter SiteSecure and ShotSpotter SecureCampus provide critical outdoor infrastructure protection against active shooter attacks. SiteSecure delivers critical information such as the number of shots fired, a detailed map of the airport or transportation facility, with the shooting location clearly identified. SiteSecure also provides law enforcement and transportation facility management with real-time information that can be useful to identify and address false alarms and reduce mass panic. Gunfire detection and precise shooter location Designed for college campuses and K-12 schools, ShotSpotter SecureCampus provides gunfire detectionShotSpotter SecureCampus is a gunfire detection system designed to provide outdoor coverage at university and school campuses. Designed for college campuses and K-12 schools, SST SecureCampus provides gunfire detection, precise location, and number of shooters to first responders and school personnel, enabling faster response to an incident. Data capture form to appear here! Gunshot detection can offer tremendous benefits in mitigating active shooting incidents occurring in a public facility or commercial environment. Data shows that active shooter attacks often begin outside a building and then progress indoors. Thus, the first line of defence for security professionals lies outside a facility, in a zone of protection surrounding it or comprising the entire outdoor area of a larger facility of many buildings. Audio solutions for perimeter security Video cameras are effective surveillance tools in the event of a shooting incident, but they are not able to capture everything. Deploying audio solutions can automatically flag incidents not caught on camera, as well as alert central station guards of what surveillance zones need to be closely monitored. Audio analytics solutions for aggression and gunshot detection are some of the best security tools in the security market when it comes to detection, intervention and deterrence. They are the next generation of monitoring; equipping security teams with critical information and enhancing perimeter security. End users can identify high-risk situations in real-time and prevent acts of physical aggression before they happen Aggression detectors are capable of accurately recognising duress in a person’s voice. The software automatically and objectively detects the presence of rising human aggression, anger or fear, and subsequently warns staff by a visual alert or alarm trigger. As a result, end users can identify high-risk situations in real-time and prevent acts of physical aggression before they happen. Artificial intelligence to detect weapons A gunshot detector recognises firearm discharge from various firearms in different settings. Within seconds of a gunshot, the software accurately classifies and triggers an immediate notification through a designated VMS. Security staff can then verify the alert, effectively reducing the reaction time of first responders. With the development of artificial intelligence (AI) in object recognition, AI weapons detection offers an efficient alternative to gunshot detection to prevent active shooting: AI can visually detect guns based on their shapes before they are fired. The AI is trained to recognise firearms in different shapes, sizes, colours, and at different angles in videos, so that the AI weapon detector can be deployed with existing camera systems, analyse the video feeds, and instantly notify security staff when a gun is spotted. Audio analytics, processed inside a video camera, are another approach that can quickly pinpoint zones that security staff should focus on, which can dramatically shorten response times to incidents. Audio-derived data also provides a secondary layer of verification that an event is taking place which can help prioritise responses from police and emergency personnel. Detecting audio levels and alerting operators Operators can be notified of abnormal situations via event signals allowing the operator to take suitable measuresThe first job of a well-configured camera or camera/mic pair is to detect sounds of interest while rejecting ancillary sounds and noise below a preset threshold. Each camera must be custom-configured for its particular environment to detect audio levels which exceed a user-defined level. Since audio levels are typically greater in abnormal situations, any audio levels exceeding the baseline set levels are detected as being a potential security event. Operators can be notified of any abnormal situations via event signals allowing the operator to take suitable measures. Finding a baseline of background noise and setting an appropriate threshold level is the first step. Well configured audio analytics can deliver critical information about a security event, accelerating response times and providing timely details beyond video-only surveillance. Analytics take privacy concerns out of the equation and allow installers and end users to use camera audio responsibly. Hanwha Techwin's audio source classification technology, available in its X Series cameras, features three customisable settings for category, noise cancellation and detection level for optimum performance in a variety of installation environments.
PACOM Systems, which designs, develops, and manufactures security platforms for enterprise multi-site and campus environments, announces that Hancock Whitney Corporation continues to roll out the PACOM GMS security management platform to their growing number of bank financial centers and ATMs. Hancock Whitney Corporation operates bank offices and financial centers in Mississippi, Alabama, Florida, Louisiana, and Texas, offering comprehensive financial products and services, including traditional and online banking; commercial and small business banking; private banking; trust and investment services; healthcare banking; certain insurance services; and mortgage services. Multi-site security management platform GMS meets end-user demands for a multi-site security system with multiple integrations PACOM’s relationship began with Hancock Bank in Mississippi and, after Hancock’s acquisition of Louisiana-based Whitney Bank in 2011, blossomed further still. Currently, the PACOM GMS software platform manages card access and intrusion monitoring at 258 locations and growing. Hancock Whitney does all its own 24/7/365 alarm monitoring from a central location in Gulfport, Mississippi. There are also two company data centers monitored and protected by PACOM GMS. GMS is a robust multi-site security management platform, providing integration between access control, intrusion, video, intercom and virtually any building management or security solution. Designed to manage thousands of locations simultaneously through a single interface, while providing industry-leading availability and redundancy. GMS meets end-user demands for a multi-site security system with multiple integrations. Third-party monitoring companies “One of the biggest advantages of the PACOM system,” commented Al Tapper, CPP, Manager, Bank Protective Services for Hancock Whitney Corporation, “is it’s all-inclusive with integrated card access and alarms. We have our entire company on a single, integrated platform. We do our own alarm monitoring, which is a big plus because we can immediately verify what is going on in any of our financial centers.” One of our banking acquisitions had two third-party monitoring companies" Tapper continued, “One of our banking acquisitions had two third-party monitoring companies. It was one false alarm after another. That’s dangerous, and it can be quite expensive. With PACOM and self-monitoring, we avoid that. The PACOM system also helps with disaster recovery. We can see what’s going on in our financial centers and know if our alarms are working.” Central monitoring station Hancock Whitney has launched another phase to their company-wide security platform: video integration. When an alarm goes off in any branch, the central monitoring station will automatically be able to see events associated with that alarm. Eventually, all branches and ATMs will have video monitoring with a number of integrated cameras at each location. The system currently provides access to more than 5,000 card holders with varying levels of access privileges. Alarm protocols are in place for each location, with Tapper and his team managing and monitoring the system. “PACOM helps us adapt the system to our changing needs; and when we provide feedback, PACOM listens and will consistently respond directly to that feedback, said Tapper.”
Established in 1976, Meghna Group of Industries (MGI) is a conglomerate in Bangladesh. MGI operates out of a large campus in Dhaka that houses its head office, 45 different manufacturing plants, and maintenance workshops, all under one roof. MGI has a turnover of over USD 3 billion, and an employee strength of over 30,000. Being an established and trusted group, it required operations to be suitably monitored, in order to ensure uninterrupted production, adherence to quality standards, and timely delivery of supplies to customers. So far, it had been monitored by manned security, with accompanying risks ranging from damage to assets, misuse of equipment, thefts, leakage of confidential information, employees’ safety, poor record keeping for vehicles entering or exiting the premises, and more. Providing investigation-friendly monitoring software Enabling IVA at various locations has helped in the monitoring of infrastructure Designing of the solution started with a joint site survey by Videonetics, MGI IT heads, and the system integrator. After extensive research, Videonetics developed a unified solution encompassing Intelligent Video Management Software (IVMS), Intelligent Video Analytics (IVA), and a customised ANPR system to read and capture licence plates in Bengali language. Key aspects of the solution included the following: Videonetics’s IVMS has been deployed to help in viewing and recording feeds from over 500 cameras installed in multiple factory locations. This is enabled over IP network in an efficient and elegant way. In addition, the solution provides investigation-friendly monitoring software at the front-end, while relegating all the complexity of the server software to the back-end. Enabling IVA at various locations has helped in the monitoring of infrastructure, vehicles, people, crowds and objects, for automatic detection and analysis of events of interest. Manned security to address safety The operators get a bird’s eye view of various sites from their centralised location, enabling them to respond quickly and effectively when an incident occurs. The solution has been installed on Red Hat® Enterprise Linux® which makes the overall system more secure and maintainable. Videonetics’s Automatic Number Plate Recognition (ANPR) system has been customised to read license plates in Bengali. Regardless of the lighting conditions, the Bengali ANPR accurately captures with timestamp the licence plate of any vehicle as it appears in the camera’s field of view (FoV). The new implementation enables security operators to be deployed at the unified interface In addition, the system is integrated with the IVMS at the command and control centre, for viewing and analysing vehicular movements, and taking action, if required. THE IMPACT Prior to the installation of Videonetics’s solution, MGI used to rely on manned security to address safety, security and operational risks. However, the new implementation enables security operators to be deployed at the unified interface, for monitoring multiple sites such as assembly plant, warehouse, process, dispatch area, vehicle movement, and so on. Personal protection equipment detection So now, MGI operators can handle incidents of thefts, potential break-ins, unauthorised intrusions, and conduct investigations, without having to leave their desks. This has helped MGI in maximising resources and significantly reducing costs. But the biggest benefit has been to be able to provide a safer environment to its employees, and to secure its workplaces with optimisation in day-to-day operations. The open architecture of the solution allows MGI to continue adding, in a single interface, more AI & DL powered applications such as personal protection equipment detection, facial recognition, fire & smoke detection, workers slip/ fall detection, workers head count, vehicle movement management, to name a few. This makes it possible for the company to address all its security concerns with a holistic approach.
An Oxford University facility has enhanced its security with the help of world technology pioneer in integrated access control, intruder alarms management and perimeter protection. Saïd Business School, the University of Oxford’s centre of learning for undergraduate and graduate students in business, management and finance, has replaced its former system with an integrated Gallagher Security access control solution to protect it against theft and create a safe environment for visiting dignitaries. Saïd Business School is located right next to a train station – a heavy transit route into Oxford. While this location is convenient for students and staff, proximity to the station was making it easy for organised thieves to target the school and use the train to get in and out quickly. As hosts to international heads of state, royalty and others with strict personal security requirements, the school also saw a clear need to upgrade its security system to achieve a higher level of security. Safe from unauthorised intruders T-series were installed on doors throughout the building and new access cards were issued to all Saïd Business School wanted a system which could meet its need for complete control, yet maintain an open and welcoming feel on campus. “We needed to ensure only current employees and students had access to the school, and that those people were only accessing the areas relevant to them,” says Martin Boyt, Estates Operations Manager at Saïd Business School. “We also needed it to be easy and efficient to manage cardholder permissions, with the flexibility to adapt as the school grows.” Gallagher T-series readers were installed on doors throughout the building and new access cards were issued to all employees and students. Gallagher Command Centre is used to manage access control groups and set privileges to enable varying levels of access to different parts of the building. Students and staff can now easily move around the school and access the rooms and resources they need on a day-to-day basis, with confidence they’re safe from unauthorised intruders. Certified security installer Access control has been integrated with the student and staff induction process, meaning access control cards are not issued until induction has been completed. The school also uses the new system to issue event and conference visitors with temporary cards that have restricted access suited to the purpose of their visit. Boyt says protecting their people is of paramount importance. “Schools can be vulnerable to vandalism, theft and, increasingly, violence and terrorism by individuals or groups, so security is a top priority. We want our students and staff to have peace of mind that they are studying and working in a safe and secure place.” Partnering with Gallagher Security and a Gallagher certified security installer streamlined the process of installing the new system. Boyt says working with someone who understood their needs made all the difference. Building integrated security system Saïd Business School is using its learnings to improve security at its other university facilities“Translating the needs of our staff and faculty into workstreams and access control groups was a complex undertaking, and having trusted advisors on hand helped us get it right the first time.” Built-in reporting tools enable the estate managers to carefully monitor the system to keep the site secure. “We can run reports to check on occupancy levels and usage of certain areas, helping to reallocate rooms quickly and efficiently,” says Boyt. Saïd Business School is an active member of the Tertiary Education Security Network (TESN), organised by Gallagher. The aim of the group is to bring Gallagher customers together to build relationships and share knowledge. Boyt says: “We have found this group to be extremely useful as we continue our journey of building an integrated security system that meets our needs. We have learned a lot about campus security by attending TESN events and working closely with Gallagher and our security installer.” Learnings to improve security Saïd Business School is using its learnings to improve security at its other university facilities. “We want to integrate the CCTV cameras at our Park End Street events venue with Gallagher Command Centre to improve our monitoring capability,” says Boyt. “We will also insist the Gallagher system and CCTV integration is installed on future projects, including the redevelopment of Osney Power Station which is set to become a world-leading centre for executive education.”
AASA, The School Superintendents Association, has formed a new partnership with Armor At Hand™, a company that manufacturers Smart Shields™ connected to the internet and are capable of protecting users from handguns and high-powered rifles. The Shields serve as a first layer of protection in the event of an intrusion and serve as an alarm to alert those connected to the system a potential threat is occurring. Armor At Hand manufactures the world’s first lightweight, mobile Smart Shields with internet connectivity and U.S. National Institute of Justice (NIJ) level 3 equivalent test rating, giving it the ability to stop high-powered rifle rounds. Schools, workplaces, places of worship and other venues now have access to the Smart Shield. AASA members can receive a special offer to receive a Smart Shield from Armor At Hand. Immediate protection at first encounter "Armor At Hand’s partnership with AASA speaks to both organisations’ commitment to providing resources to assist school districts before, during and after a crisis,” said Chad Ahrens, founder and CEO, Armor At Hand. “With access to more than 12,000 school districts, the AASA partnership enables us to reach the people that the Smart Shields are designed to protect.” The Shields hide discreetly in plain sight, yet, provide immediate protection at first encounter. Once one of the shields is moved, all the shields in the area are alerted and will light up and buzz while autonomously sending an alert to authorities of a potential threat. Armor At Hand Smart Shield uses ArcGIS by Esri to map real-time danger areas and safe zones while simultaneously offering route guidance to safety for those in harm’s way. Activation movement amount and timeframes are setup at installation to meet the needs of each site. Emerging technology in security “AASA is proud to be partnering with Armor At Hand,” said Daniel A. Domenech, executive director, AASA. “Threats of violence at our schools has continued to be an issue that must be addressed. AASA is committed to keeping students, teachers and schools around the country safe. Launching this partnership with Armor At Hand is indicative of our commitment to doing that by using emerging technology in security.” AASA is the premiere membership organisation representing public school district superintendents across the country and the world. The primary goal of AASA is to advocate for highest quality public education for all students, as well as to develop and support school system leaders.
Four networked MxPro 5 fire panels from global systems provider, Advanced, are now protecting one of Serbia’s most prestigious higher education facilities. The project at the University of Belgrade’s School of Electrical Engineering, involved installing a fire system to reliably protect lives and property while respecting the value and authenticity of its 1920s features. This meant overcoming various problems presented by outdated construction methods, inaccessible areas and high ceilings. 4-loop and 1-loop MxPro 5 fire panels Advanced’s partner in Serbia, TVI Ltd, was responsible for the design, installation, commissioning of the project Thanks to their performance, quality and ease of use, a network of three of Advanced’s 4-loop and one of its 1-loop MxPro 5 fire panels, including over 1000 Argus detectors, were chose to protect the entirety of this top educational and scientific institution, including the facilities of Civil Design, Mechanical and Electrical Engineering. Advanced’s local partner in Serbia, TVI Ltd, was responsible for the design, installation and commissioning of the project. Electrical Engineer, Radomir Kerkez, at TVI Ltd, said, “The flexibility of Advanced’s fire panels to adapt to sites both large and small is what makes us choose them time and time again. Advanced products make even the most complex installation challenges straightforward and we can always rely on them to deliver complete protection.” Multiprotocol fire system solution MxPro 5 is a renowned multiprotocol fire system solution and was recently certified to the EN 54 standard by FM (Factory Mutual). It offers customers a choice of two panel ranges, four detector protocols and a completely open installer network, backed up by free training and support. MxPro panels can be used in single-loop, single-panel format or easily configured into high-speed, multi-loop networks of up to 200 nodes covering huge areas. MxPro’s legendary ease of installation and configuration plus wide peripheral range, make it customisable to almost any application. Building fire safety Our fire systems offer many ways to meet the challenges of protecting a building’s heritage"Vladimir Zrnic, Advanced’s Regional Sales Manager for Southern Europe, said, “Our fire systems offer many ways to meet the challenges of protecting a building’s heritage features while providing robust and reliable fire protection. It is great to see that potential put into practice in yet another successful and prestigious site.” Advanced, owned by FTSE 100 company - Halma PLC, has a long history of protecting some of Europe’s most notable and prestigious buildings, including Athens’ Stavros Niarchos Foundation Cultural Centre, Istanbul’s Hagia Sophia and Sofia’s Sofia University. Intelligent fire systems firm Advanced is a globally renowned company in the development and manufacture of intelligent fire systems. The legendary performance, quality and ease-of-use of its products see Advanced specified in locations all over the world, from single-panel installations to large, multi-site networks. Advanced’s products include complete fire detection systems, multi-protocol fire panels, extinguishing control, fire paging and false alarm management systems.
Upon hearing Pablo Picasso’s famous praise of art’s ability to clear ‘the dust of everyday life’, one’s thoughts could easily turn to one of Arizona’s newest landmarks, the Mesa Arts Center. Set proudly amidst the dust of the Sonoran Desert, the Mesa Arts Center is a striking complex of buildings, art installations, and public throughways, offering a rich blend of visual impressions in glass, water, stone, and metal, with splashes of vibrant colour and metallic reflection. At more than 21,000 sq. feet, the award-winning $95 million campus is the largest and most comprehensive performing, visual and educational arts complex in Arizona, serving as a gathering point for the citizens of Mesa and region alike, seeking to enjoy the indoor and outdoor spaces, public events, classes, and art exhibitions. Ensuring safe, family friendly environment Ensuring a safe, family friendly environment is essential to fulfilling the role the Center plays as a gathering pointThe presence of an adjacent light rail station and hosting of multiple festivals throughout the year further increase traffic to, from, and through the open planned site at various hours of the day, and on weekends and even holidays. The heart of the Mesa Arts Center complex is a grand promenade that knits together all of its pieces, while providing places for group gatherings, performances, and quiet reflection, comfort and relaxation. Ensuring a safe, family friendly environment is essential to fulfilling the role the Center plays as a gathering point for all walks of life. In addition to welcoming visitors to the Center, the open configuration of the complex invites commuters coming off the nearby light rail line to stroll through on their way to and from the station, and draw loiterers, would-be vandals, and itinerant populations (attracted to the semi-secluded spaces created by outdoor art installations and the complex’s fountains and water elements). Surveillance system for crime prevention Particularly outside of traditional hours of operation, such factors can increase the risk of nuisance crimes, vandalism, and petty theft, and potentially more serious crimes against visitors and staff, without a vigilant and comprehensive security and surveillance operation. Additionally, complex spaces, varied materials, and water elements increase risk for incident and accident without proper prevention and/or prompt response. A technical solution with proven power, performance, and reliability was paramount to ensure protection of property While customary approaches to similar venues have typically relied heavily on a combination of CCTV and human security guards, the size and complexity of the Mesa Arts Center campus makes a traditional manned guarding solution, even when supported by a typical surveillance technology, both cost prohibitive and potentially inadequate. Protection of property and campus safety The Mesa Arts Center is an architectural showpiece and regional destination, requiring comprehensive surveillance at all hours, every day of the year, under highly variable conditions. A comprehensive technical solution with proven power, performance, and reliability was paramount to ensure protection of property and the safety of everyone on campus. The City of Mesa, who operates the Center, in partnership with Scottsdale’s Surveillance Acquisition Response Center (SARC) and IDIS technology, provided a mix of surveillance cameras and network video recorders (NVRs) able to meet the varied requirements of a campus housing multiple art galleries, studios, performance spaces, walkways and cut-throughs, and outdoor gathering spaces; and support SARC’s innovative approach to virtual guarding, which incorporates military, police, and intelligence best practices and personnel to enhance traditional remote monitoring models and outcomes. Using Direct IP NVRs and cameras SARC monitors use IDIS’s powerful, modular, and feature-rich VMS, IDIS Solution SuiteThe City of Mesa’s previous successes implementing SARC and IDIS technology at the Mesa Grande Cultural Park made the integration of technology and monitoring selected for the Mesa Arts Center a natural fit. Featuring multiple IDIS DirectIP [model number] network video recorders (NVRs), and IDIS Direct IP [model number] cameras, with [feature set], at the heart of a comprehensive security posture, SARC monitors use IDIS’s powerful, modular, and feature-rich VMS, IDIS Solution Suite, and their unique military, law enforcement, and intelligence-derived protocols and best practices to support on-site personnel and cover the campus comprehensively at night and during other off-hours. Additionally, the IDIS solution also seamlessly integrates with, recording and managing footage from other camera installations, demonstrating the IDIS dedication to eliminating the common frustrations and complexities of security systems. SARC’s virtual guard protection The implementation of SARC’s virtual guard protection and protocols to support on-site personnel, and the highly visible, but seamlessly integrated, presence of IDIS surveillance cameras, as part of a total IDIS solution, have contributed to the Mesa Arts Center’s reputation as one of the region’s most welcoming and inviting community spaces among the area’s art lovers, families, and neighbourhood’s workers (who regularly use the space without fear or discomfort as a gathering place for lunch or pathway to and from the local light rail station). The integrated on-site and virtual guarding professionals identify, deter, and document threats to the campus 24/7, the integrated on-site and virtual guarding professionals identify, deter, and document threats to the campus and those within it, using innovative surveillance application bringing together IDIS’s highest quality remote viewing and VMS offerings and SARC’s remote ‘voice down’ virtual guarding protocol, which informs those under surveillance, in real time, that they are being watched and should leave the property immediately or face consequences. Keeping people and property safe The successful implementation of this solution has placed the City of Mesa and Mesa Arts Center management at the forefront of innovation in keeping the people, places, and property under their protection safe and secure, and marked them as leaders in responsible stewardship of taxpayer, grant, and donor dollars, through the implementation of a system that provides more comprehensive coverage, measurably better outcomes, and enhanced visitor experiences 24/7, year-round for a fraction of the cost of previous manned guarding solutions.
Round table discussion
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?