Hanwha Techwin America, a supplier of IP and analogue video surveillance solutions, announced a new app for systems integrators. The new Wisenet QR Scanner App is designed to help quickly create a list of all Wisenet devices associated with a specific project, without having to take the products out of their packaging. The QR code is found on the outside of the product carton, the bottom of the device, as well as on an included extra sticker for Wisenet modular cameras. This allows a technicia...
OPTEX Europe, a pioneer in sensing and detection, has entered a new partnership with UK security services company, DS Security Group Ltd. The collaboration between OPTEX and DS Security Group is two-fold. Firstly, monitoring of the new OPTEX Intelligent Visual Monitoring solution is done via DS Security’s recently launched state-of-the-art Alarm and Video Monitoring Centre, DS Operations Centre (DSOC). Secondly, the adoption and promotion of OPTEX’s suite of sensors is part of...
NSI (National Security Inspectorate), the UK’s most widely recognised UKAS accredited Certification Body in the security and fire safety sectors, announces the launch of a new upgraded website. The primary aim of the site’s new look is to simply steer homeowners and commercial buyers of security and fire safety services to relevant information and enable them to easily connect with NSI’s independently approved providers, for the services they seek. Alarm response services Th...
Security video wall technology experts Ultimate Visual Solutions (UVS) have signed a distribution agreement with Zodiac Investment Corp in Vietnam, who will be its exclusive partner in the region. Zodiac was founded in 1991 and is recognised as the country’s high-tech products distributor and audio visual solutions provider, with bases in Hanoi and Ho Chi Minh City. It has completed installations in various fields, including education, government and the military. Data centre video wall...
GeoVision has announced the release of its GV-Decoder Box Ultra, a compact, easy-to-install video decoder that allows digital monitors to display live views from ONVIF IP cameras. GV-Decoder Box Ultra Optimised for decoding H265 and H264 video streams, GV-Decoder Box Ultra supports displaying 64 IP videos in sequence or in 4, 6, 8 and 9 matrix view. The security administrator can monitor live events, take snapshots when necessary, and pause a channel when any event or incident occurs. GV‐Joys...
We still have some way to go before we see 5G service rolled out as a UK-wide service, but we can discuss future implications of 5G, and how it can improve device capabilities once its widely accessible. The impact of 5G lies within the increase in the amount of data that can be transferred between smart home devices through a cloud-based system. By utilising the cloud’s mass com...
Paxton’s longstanding access control system, Net2, receives its latest software update. The highly anticipated new feature, Checkpoint Control, supports COVID-secure sites. This additional functionality helps Net2 users protect employees and visitors by monitoring and approving people as they enter buildings. Throughout the first half of 2020 the creation of Checkpoint Control was underway, along with the unforeseen global spread of the coronavirus COVID-19. During this time lockdown and social distancing restrictions in many countries heightened the need for the update to be rolled out globally, in a timely fashion. Since then Paxton’s Development team has worked tirelessly preparing the release alongside other vital COVID-secure Net2 updates. Thermal scanning hardware Paxton’s U.S. Senior Product Manager Jeremy Allison said: “At Paxton, people are at the heart of everything we do and this year our focus is bringing people back to work safely. Following on from the successful introduction of Occupancy Management, we are introducing Checkpoint Control. Designed to help businesses ensure their COVID-secure guidelines are being followed before staff enter a site.” Designed to help businesses ensure their COVID-secure guidelines are being followed before staff enter a site" The Checkpoint Control functionality follows on from Paxton’s successful introduction of Net2 Occupancy Management and integration with thermal scanning hardware. Both were released for Net2 in July 2020. These features work simply and seamlessly together to reduce the risk of spreading COVID-19 around populated buildings. Temporary access levels Jeremy Allison further explains “Net2 Checkpoint Control allows a site to assign temporary access levels to one or more users that will remain in place until they have either been manually validated or badged through a specific door. This allows Net2 system administrators to ensure all staff and visitors pass through a designated checkpoint at a frequency that can be configured to suit the business requirements." "It also offers the flexibility to split staff between multiple checkpoints to help maintain social distancing and not overrun an area”. Access permissions feature Checkpoint Control works in just two simple steps: Step 1: System Setup Specific doors or areas of a building are designated as checkpoints, such as the main entrance or reception. End users are then given access to that checkpoint using their normal access token, with the limited access point managed via the access permissions feature within the Net2 software. Step 2: A manual or automated verification takes place to validate further site access Access can be verified manually in person or by using technology to support automated validation. The automated process works by identifying a person via their access credentials, which can then be followed by a thermal scan to further increase protection against the spread of Coronavirus. Once identity, and where relevant, an individual’s health and well-being has been approved, the checkpoint will validate and grant further building access. Virtual traffic lights Paxton has produced an on-demand webinar called the definitive guide to COVID-secure buildings Net2 v6.05 also includes new functionality to further enhance the Net2 Occupancy Management feature. New virtual traffic lights can be used on screens to indicate occupancy levels with no need for integrated traffic light hardware. This will further support social distancing by informing the end user of whether the current occupancy of the area they are about to enter is safe for them to do so, working alongside Checkpoint Control to reduce bottlenecks and overcrowding. Occupancy Management override is also included in this new update. Should there be an emergency, this functionality allows selected people to enter an area that is at capacity, such as a first aider or senior manager. Checkpoint Control and the new additions to Occupancy Management functionality are available exclusively with Net2 Pro software. In conjunction with the updates, Paxton has produced an on-demand webinar called the definitive guide to COVID-secure buildings. This is an ideal starting point for installers looking to understand more about social distancing and COVID-secure guidelines.
Security researchers at Check Point have unravelled a six-year, ongoing surveillance operation apparently run by Iran-based threat actors against regime dissidents. Going back as far as 2014, the attackers used multiple attack vectors to spy on their victims, including hijacking victims’ Telegram accounts, extracting two-factor authentication codes from SMS messages, recording a phone's audio surroundings, accessing KeePass password manager account information, and distributing malicious Telegram phishing pages using fake accounts. Malware-laced documents The victims appear to have been hand-picked from anti-regime organisations and resistance movements such as Mujahedin-e Khalq, the Azerbaijan National Resistance Organisation, which advocate the liberation of Iranian people and minorities within Iran, and Balochistan citizens. The attackers used malware-laced documents to lure victims into infecting their devices. The core functionality of the malware is to steal as much information as it can from the target device. The payload targets two main applications: Telegram Desktop and KeePass, the famous password storage manager. The main features of the malware include: Information Stealer Uploads relevant Telegram files from victim's computer. These files allow the attackers to make full usage of the victim's Telegram account Steals information from KeePass application Uploads any file it could find which ends with pre-defined extensions Logs clipboard data and takes desktop screenshots Unique Persistence Implements a persistence mechanism based on Telegram’s internal update procedure Two-factor authentication During their investigation, Check Point researchers also uncovered a malicious Android application tied to the same threat actors. The application masquerades as a service to help Persian speakers in Sweden get their driver's license. This Android backdoor contains the following features: Steals existing SMS messages Forwards two-factor authentication SMS messages to a phone number provided by the attacker-controlled C&C server Retrieves personal information like contacts and accounts details Initiates a voice recording of the phone's surroundings Performs Google account phishing Retrieves device information such as installed applications and running processes Setting up an account Some of the websites related to the malicious activity also hosted phishing pages impersonating Telegram. Surprisingly, several Iranian Telegram channels issued warnings against the phishing websites, claiming that the Iranian regime is behind them. According to the channels, the phishing messages were sent by a Telegram bot. Some of the websites related to the malicious activity also hosted phishing pages impersonating Telegram The messages warned their recipient that they were making an improper use of Telegram's services, and that their account will be blocked if they do not enter the phishing link. Another Telegram channel provided screenshots of the phishing attempt showing that the attackers set up an account impersonating the official Telegram one. At first, the attackers sent a message about the features in a new Telegram update to appear legitimate. The phishing message was sent only five days later, and pointed to a malicious domain. Cyber-security expert A removed blog entry from 2018 accused a cyber-security expert of plagiarism, when he was interviewed by AlArabiya news to discuss Iranian cyber-attacks. Researchers believe this page was created as part of a targeted attack against this person or his associates. The blog included a link to download a password-protected archive containing evidence of the plagiarism from `endupload[.]com`. It appears that `endupload[.]com` has been controlled by the attackers for years, as some of the malicious samples related to this attack dating to 2014 communicated with this website. Monitoring different geographies Lotem Finkelsteen, Manager of Threat Intelligence at Check Point said: “After conducting our research, several things stood out. First, there is a striking focus on instant messaging surveillance. Although Telegram is un-decryptable, it is clearly hijackable. Instant messaging surveillance, especially on Telegram, is something everyone should be cautious and aware of.” “Second, the mobile, PC and web phishing attacks were all connected to the same operation. These operations are managed according to intelligence and national interests, as opposed to technological challenges. We will continue to monitor different geographies across the world to better inform the public around cyber security.”
Hikvision, an IoT solution provider with video as its core competency, has announced its new generation of wireless alarm systems – the AX PRO – delivering comprehensive alarm solutions for both residential and commercial applications. The newly launched AX PRO product family includes a compact panel hub for a wide range of detectors and peripherals, covering intrusion detection, video verification, smoke detection, flood detection and home automation. Developed with both the installer and user in mind, the system can be configured according to a variety of needs. Installation complexity is minimal so the end-user can easily manage the system with its intuitive user interface. AX PRO panel hub with dual RF chip design The AX PRO hub itself supports several protocols for wireless integration, welcoming the connection of up to 210 peripherals. The panel has been designed with dual RF (radio frequency) chips, featuring Tri-X and CAM-X wireless technologies, to block interference across channels and enable high speed and reliable transmission of alarm messages simultaneously. Range of detectors and peripherals options With the PIRCAM, users can view those snapshots of detected activity to verify alarm notifications Alongside the panel, Hikvision has developed an extensive range of detectors and sensors to tailor the system to different installation needs, such as combined PIR-Glass Break detector, safety detectors, door contacts, smoke sensor, water-leak detector, etc. Also available is a wireless passive infrared PIRCAM detector, which detects infrared signals over a 12-metre range and collects snapshots of any moving object. With the PIRCAM, users can view those snapshots of detected activity to verify alarm notifications, receiving alerts even before intruders realise that they have been recorded on video. The PIRCAM is also equipped with LED Illumination for high-quality imaging in the dark. Intruder Verification as a Service Built with practicality in mind, Hikvision has created a wide range of peripherals to maximise user safety and assist their day-to-day activities. Such devices include static and portable panic button options to keep occupants safe, while the wireless LED keypad or ergonomic keychain fob provides multiple control options to suit the user’s preferences. If customers choose, the AX PRO hub panel can be linked to their IP cameras over the cloud or a sub-stream to initiate Intruder Verification as a Service (IVaaS). This service provides live video verification or seven seconds of video recording for users to quickly and efficiently confirm alarm events on the system. App compatibility Users will take charge and stay connected using the AX PRO since it is fully compatible with Hikvision’s proprietary Hik-Connect app. The app provides voice and video clip notifications for users and allows them to remotely control and monitor their alarm systems. The AX PRO also supports the Hik-ProConnect app, which can provide full configuration assistance for installers and enable them to offer cloud-based security solutions and services with customer’s authorisation.
GeoVision Inc. has launched the GV-QSD5730 / GV-QSD5731-IR speed dome camera, designed to minimise the impact of uncontrollable oscillation. Its Sony STARVIS Sensor provides high quality image under low light conditions. The Servo Feedback feature allows the camera to return to its previous position immediately after encountering with external forces (tampering) or environmental vibration, such as earthquake. Featuring with EIS, minimal impact from vibration, and a stabilised image is provided. Also, its panoramic PTZ function when integrated with Geovision Fisheye camera allows users to monitor an area overview and a detailed regional view simultaneously. Key features include: NDAA compliant Up to 30 fps at 2592 × 1520, with 33x optical zoom EIS (Electrical Image Stabiliser) Servo Feedback Panoramic PTZ function: (Available in GV-VMS V.17.5 / 18.3) GV‐QSD5730 is significantly lighter than all previous speed dome models, with only 2.6kg in weight. Its Power over Ethernet (PoE) support further allows for quick and easy installation.
Revader Security has agreed a strategic partnership with Dynamic CCTV, a trade supplier of professional CCTV to the security industry. Revader Security’s range of products include Transit rapid redeployable cameras which are straightforward to install in virtually any location and can be rapidly repositioned to respond to changing security demands. Powered by battery or mains, footage can be viewed and downloaded over wireless and mobile networks. Remote monitoring solutions The company also produces a range of mobile power solutions (PowerPaks) and a range of accessories to interface with the redeployable CCTV products. Revader Security has also developed a range of diesel and battery powered rapid deployment CCTV towers which are proving increasingly popular with end users and the security trade as a rental opportunity. Dynamic CCTV will promote, supply and support Revader Security’s range of products As complete surveillance, recording and remote monitoring solutions, they are ideal for deployment into situations where little or no existing infrastructure is present. Dynamic CCTV will promote, supply and support Revader Security’s range of products with trade customers across the UK, drawing on over 25 years’ experience in the marketplace as one of the suppliers of CCTV to the security industry. Digital recording systems Dynamic CCTV is a Hikvision UK authorised distributor, providing the latest innovative CCTV equipment at very competitive pricing - including Digital Recording Systems, IP Cameras and CCTV monitoring equipment, along with products from other manufacturers such as TP-Link, GJD, Iiyama, TOA, Ubiquiti and Veracity. Stuart Caldecourt, Managing Director at Revader Security commented: “We are delighted to be partnering with Dynamic CCTV, who have an outstanding track record in the supply of professional CCTV products across the UK – and an impressive engineering and support capability proven over many years.”
American Fibretek, of St. Petersburg, Florida, a USA-based manufacturer of fibre optic transmission and networking equipment, is expanding their media converter offering worldwide by offering one of the smallest hardened media converters available. The AFI9HMEC Series Ultra Mini Media Converter measures approximately 2” by 2” by 1” is smaller than a mobile phone and additionally is available in PoE and non-PoE versions. AFI9HMEC Series Housed in a mini chassis, these DIN rail mountable devices are ideally suited for connecting field-based equipment such as IP CCTV cameras and industrial controllers to Ethernet networks over long distances using multimode or single-mode fibre. Fibre connectivity is determined by separate SFP device for number of fibres connector and distance, providing application and site flexibility. In addition to its beneficial small size, the AFI9HMEC Series offers both 10/100Mbps and Gigabit speed models, The PoE models deliver up to 30 watts and meet the IEEE802.3AT standard. “We’ve seen in increased demand for a very small size media converter to fit very confined spaces in the field in many IP video surveillance situations. Even our existing media converter variants were not small enough. We challenged the engineering team to make it even smaller, and the AFI9HMEC Series was the result,” stated Donna Poulos, AFI President. “This one product family covers so many applications. We believe it will have great appeal to the Security Market,” said Poulos. Environmental extreme conditions These hardened media converters work in all environmental extremes and are guaranteed to work for the life of the installation. The entire AFI9HMEC Series is TAA compliant and the company believes they will have great appeal to federal, state and local entities who require TAA compliance for their product requirements. American Fibretek, offers an extensive line of fibre optic video and data transmission equipment that is uniquely designed to meet the needs of the security markets.
Developing an effective contact tracing system in the UK to monitor the spread of COVID-19 has proved to be problematic. The trials of the app developed by the government and its partners encountered numerous challenges, and despite the reopening of restaurants, pubs and shops, the current approach to contact tracing is inconsistent, with recent reports suggesting not all establishments are following the government guidance. At the same time, businesses are being encouraged to ask employees to return to the workplace as lockdown restrictions ease, and the lack of an effective contact tracing system is only going to become more of an issue. Responsibility now lies with employers to ensure social distancing measures are adhered to in the workplace, trace any contact that a person infected with COVID-19 has had with others, and communicate consistent messaging across their organisations. Considering all of these challenges, it is not surprising that technology is being turned to for the answers. Turning to technology However, it is not just cutting-edge technology that can support measures to address health and safety issues related to COVID-19; the use of existing infrastructure is vital too. Consider the ubiquity of CCTV in workplaces and public spaces, especially in densely populated cities. Recent research has shown that London, for example, has 627,727 cameras for 9.3 million residents - the equivalent of 67.5 cameras per 1,000 people. The data collected from these feeds will play a key role in effectively tracing interactions and monitoring the adherence to social distancing measures. Tracing interactions and monitoring the adherence to social distancing measures As useful as this data is though, the sheer volume of it is enormous. Sifting through hundreds of hours of video footage collected from networks of thousands of cameras will be far too time-consuming and inaccurate to complete manually. This is where more advanced technology such as A.I.V.A. (Artificial Intelligence Video Analytics) is required. A.I.V.A. solutions use existing camera networks and geospatial algorithms to determine an individual’s location in the camera field of view in real-time, automatically learning the perspective of the scene and calculating the GPS coordinates of individuals in real-time based on their location in the camera field of view. Social distancing algorithms For example, with regards to social distancing, an algorithm can detect when two parties are within a metre proximity of each other. This will trigger an alert in the system and log the occurrence in a dashboard report. If government recommendations change and the suggested distance is 2 meters, the algorithm is easily adjusted. This approach will help to reinforce changes in behaviour to encourage social distancing and, in the worst case, establish an effective contact tracing system for those who have been infected with COVID-19 and have come into contact with others. An effective contact tracing system for those who have been infected with COVID-19 Firstly, in terms of how this can be used for social distancing, AI powered video analytics can be used to identify particular hotspots where breaches occur. While isolated incidents of a breach in the 1m rule may not be particularly useful, when a series of occurrences is identified from thousands of hours of CCTV footage, vital insights can be gained into localised clusters of COVID-19 infections. The reports generated from this type of analysis can be extremely useful; for example, pinpointing particularly busy areas of a job site, identifying queues at a coffee station at a certain time of the day, or the most frequently used exit of an office building. Breaching the rules Armed with these insights, businesses can implement measures to try and alleviate such bottlenecks. In practice, this may involve implementing one-way systems or moving people from one congested area to a quieter one at particular times of the day, to help reduce the chances of breaching the 1m social distancing rule. There is even the capability of triggering an automatic alert when a breach is observed to remind employees of their responsibility to adhere to the guidelines. If a business is informed that one of its employees or a visitor has contracted COVID-19, the use of A.I.V.A can support in helping to identify areas that the person has visited and whether there were any other people in that area at the same time. Instead of informing others directly, the business can issue a notice to say exactly where that person was and advise employees who may have been present to be tested. This is particularly useful for businesses with large sites, who need to manage each building and facility on a case-by-case basis. Workforces can be protected by decreasing the chance of social distancing breaches Although simple to implement, AI powered video analytics can play a key role in helping businesses implement solutions that allow employees to safely return to work. With such technology in place, workforces can be protected by decreasing the chance of social distancing breaches occurring and effectively tracking those who have it. The technology does not rely on the identification of specific individuals nor their personal information or mobile phones, but rather recognises behaviour patterns and uses this approach to provide accurate information to groups of people that need it. AI has long been touted as the technology set to revolutionise life as we know it, and now it has the chance to unlock its potential and protect people in a world significantly affected by COVID-19.
IP cameras for video surveillance has been a trending topic amongst enterprises across the world due to rising concerns for security and safety. IP CCTV cameras are revolutionising security measures, and technology has evolved to allow for a more diverse security monitoring system through high resolution, larger digital storage options and compatibility for integrated analytical software. According to Global CCTV Market Forecast 2022, analysts expect the market for global CCTV to grow at a CAGR of around 11% during 2018-2022. Clearly, a successful hack of an enterprise security camera system could lead to a range of implications. Amongst the main ones is unauthorised access to video and audio streams of data, as well as to the archive, violation of confidentiality, HIPPA, PII and potential leaks of personal and corporate information, possible copying, unauthorised distribution and duplication of such data. “Most Enterprise video surveillance systems are vulnerable to hackers. According to our studies, more than half of companies and organisations, both large and small, do not take sufficient precautions when it comes to preventing their security cameras from being hacked. Be it ignorance or just careless approach to security of their network in general, the results of hacking can be disastrous,” says Chris Ciabarra, the CTO and co-founder of Athena Security. With the increasing number of surveillance cameras installed in homes, offices and public places, hacking incidents related to these devices happen more and more often. The ease of hacking surveillance cameras It’s not a secret that surveillance cameras, like many other Internet of things (IoT) devices, are full of vulnerabilities that can be exploited by hackers. A hacker can find hundreds of potentially vulnerable IoT devices to hack into Cameras, just like all other devices connected to the Internet, have IP addresses that are easy to find using Shodan, a search engine for Internet-connected devices. With this simple tool, a hacker can find hundreds of potentially vulnerable IoT devices to hack into, including cameras, especially when most companies use default passwords. The solution Below are basic recommendations on how to protect your camera network, and what actions you should take to minimise the chance of hacking. Change the default username and password You should start by changing the default password and username of your camera network. Even though this may seem obvious, not everyone does it, practically leaving the door for hackers wide open. Use a strong password that is hard to guess. When setting up the password use numbers, symbols, both uppercase and lowercase letters. Do not use simple and commonly used passwords, such as the ones in SplashData's list of 100 worst passwords of the year. Do not use the same password you are already using for other online accounts. According to a recent survey on data privacy conducted in May 2019, 13% of respondents with at least one online account say they use the same password for all their accounts. Using a password manager to generate a strong random password may be a good idea. Update your camera firmware regularly Keeping cameras firmware up-to-date is very important as it allows you to prevent hackers from exploiting vulnerabilities and bugs that are already patched by manufacturers in a new firmware update. Despite the fact that most modern cameras will automatically download and install firmware updates, some require the user to check for updates and install them. Set up two-factor authentication Set up the two-factor authentication if your cameras support it. With two-factor authentication on, the camera manufacturer will send you a randomly generated passcode via text message or phone call, as an addition to username and password, during each log in to the account. Two-factor authentication prevents hackers from accessing the camera system even if they were able to crack username and password. Not all surveillance camera systems support two-factor authentication, though. Technical recommendations Prevent cameras from sending information to third parties Companies that use surveillance cameras very often do not put enough effort into protecting their cameras and the data they transmit, despite the fact that this footage is of great importance to many people. The firmware of most cameras from different manufacturers is programmed in a way to keep a connection with the manufacturer’s server without knowledge of the end-user. Most users, both private and corporate, are not aware of this and therefore do not take any steps to protect themselves from this potential vulnerability, which could result in footage leak to a third party or a successful hacker attack. To prevent your camera network from transmitting, the following steps should be taken. Step 1: Statically assign an IP address Statically assign IP address for each camera, subnet mask and leave gateway blank or 127.0.0.1, if this is allowed in gateway fields to be entered. If the firmware does not allow blank or 127 subnets, just point gateway to an unused dedicated IP address. This way, cameras will not be able to send the information off the local company network. Step 2: Assign DNS servers Assign DNS servers that are local to cameras and force only your domain to be present with zero forwarding DNS servers. This way, if a camera tries to do name resolution, it will come up blank. Not being able to find the IP address of the main server (mother ship), cameras won’t be able to connect to it. To stay safe you can order your own DNS servers, locked down to your addresses only. Block your camera network’s access to the Internet Blocking your camera network’s access to the Internet is a good way to make sure hackers won’t be able to get access to the footage and other confidential data. Any dual-homed system touching your camera network should be blocked from Internet access. This way all systems in the same subnet won’t have access to the Internet from that box. Always use DNS because firewall rules tend to be easy to hack, while DNS that is internal is not expected and stops systems from resolving names you do not wish to be translated, like talking back to the mothership of a bad program. Monitor your system for traffic spikes One of the tricky things about hacker attacks is that there are no warnings. In most cases hackers would penetrate your system without any signs or symptoms of an attack, and it isn’t until you face consequences (like leaked footage or hackers manipulating cameras) when you realise something is wrong. It may be days or even months between the hacker attack and the time you realise the system has been compromised. Monitoring dual-homed systems for bandwidth spikes could be a good way to spot a hack resulting in the leakage of confidential data like images or video. There are a number of traffic monitoring tools available to private and corporate users that can manage and sniff the network or just monitor them. Facial blur in archived footage Blurring people’s faces when archiving in surveillance camera video streams is a great tool, allowing you to comply with privacy laws and make the footage useless to hackers even if they manage to successfully hack your system. These recommendations will allow you to lower the risk of hackers breaking into your security camera network, detect the hack if it has occurred already, and to protect yourself from possible consequences if camera footage was stolen.
We all know that having CCTV around your home can help to protect you and your family. Without CCTV, you could end up in danger and an intruder could get away with breaking into your house, hurting your loved ones and stealing your possessions. Similarly, without CCTV in the office, you’ll be leaving yourself open to all kinds of damage and could lose a lot of equipment in the process. In short, making sure you have CCTV is important for both home and business security. However, it can be improved to become a more effective system so that you’re better protected, and can even deter a potential intruder without having to panic. In our world of ever-changing technology, we’re able to upgrade and enhance our CCTV systems so they can become a monitored system. Remote CCTV monitoring is an ideal way to protect everyone and everything whether you’re at home or at a workplace. What is remote CCTV monitoring? For a long time, CCTV was one of the best ways to keep your home, the office and people safe. But people started to notice that it would only deter people so much of the time and often the cameras were ignored by intruders. They would just cover their faces and hope for the best as they steal from a home, office or any other premises. Remote CCTV monitoring is a system that can loop into your existing CCTV, or come preinstalled with a new system. This technology sends a feed to a control room full of trained operators that are on call 24/7. Within this control room, operators are able to respond to any sort of distress call or unauthorised movement on the property line. How does it work? Remote CCTV monitoring works by attaching to a live feed of your CCTV system, existing or new, so that the signal and images can be passed to a team of operators. These operators are on hand 24/7 so that if there is a problem, you know that you're safe in the hands of a specialist team. The specialist team has been trained to mitigate the chances of somebody breaking into your home when the system is triggered; similarly they call the local authorities instantly so that the potential intruder has less time to flee the scene. This is especially important if an intruder is already inside your property because they have less time to steal your items and leave. Without CCTV in the office, you’ll be leaving yourself open to all kinds of damage and could lose a lot of equipment in the process One of the biggest questions that revolve around remote CCTV monitoring is the idea of operators watching the CCTV at all times. Luckily most remote CCTV monitoring systems will incorporate a motion detection system to accompany your CCTV. Motion detection offers the ability to alert a control room if there is an unauthorised entry to the property line. These motion detection systems are state-of-the-art and so, depending on the system that you choose, they can watch over your property from a number of angles. Once the motion detection system has been triggered and the alert has been sent to the control room, then and only then will the operators get involved. This means that until the motion detection system has been triggered, nobody will watch your live CCTV feed. After one of the systems has been triggered, one of the specialist operators will instantly jump into action. This means that they can take different measures to deter any potential intruder and make sure that they do everything in their power to stop any damage or theft from the premises. In addition to the motion detection system and CCTV, you are able to opt for a public address (PA) system too. This means that an operator is able to shout commands through the PA system and potentially scare away any intruder. The intruder will also be warned about the fact that local authorities have already been called to the location. Remote monitoring versus traditional CCTV Motion detection offers the ability to alert a control room if there is an unauthorised entry to the property line Having a monitored CCTV system means that you're able to better protect yourself, your business, employees and even your loved ones. Whether you're at home or in the office, having someone looking over your shoulder protecting your every move is something that can be appreciated by everybody. The biggest problem with just having traditional CCTV, is that it is a reactive system. This means that rather than stopping crime, a CCTV system just records it. While the thought is that having a CCTV camera visible can deter some intruders, there's no real evidence to suggest that it stops anybody; anyone can simply cover their face and carry on breaking into your home, office or even your car. As mentioned, remote CCTV monitoring is going to tackle that problem and make sure that someone is on hand to protect you at all times.
Trends in the alarm industry point to a need for a software system that accommodates business patterns such as recurring monthly revenue (RMR). Workhorse Service Company provides a software that combines customer relationship management (CRM), enterprise resource planning (ERP) and field service management (FSM) into a “cradle-to-grave” system designed specifically for the alarm industry. “Making an alarm sale is different than making a CCTV sale, and the processes for the salesperson, technician and customer service rep are different,” says Steven Hayes, founder of Workhorse Service Company. He says WorkHorse is built on modern programming languages, is responsive, and provides a pleasant user experience regardless of the device being used. Client experience “Before coming on WorkHorse, our clients have needed to use multiple softwares such as bookkeeping, quoting, central station software, email, spreadsheets, and more,” says Hayes. “This would cause issues with continuity between softwares. Mistakes are made, appointments are missed, and customers leave.” When building WorkHorse, Hayes and his team interviewed dozens of companies to find out what they were missing and what their pain points were. “There are other CRM and FSM softwares on the market, but the ones that are made for our industry are generally designed for dealer programs and selling contracts,” he says. “Others are designed to bill your RMR and have basic service call functionality.” Alarm companies know that they need RMR to survive, and WorkHorse seeks to make it easy. WorkHorse allows companies to have multiple subscriptions inside a single deal. Single point of data entry WorkHorse ensures a single point of data entry for alarm companies Merchant services come with Auto Updater. If a credit card expires or even if it is cancelled, the service will reach out to the issuing bank and get the new number or token necessary to bill customers. This means less time with past due bills and calling on customers to get an updated form of payment. With two-way sync integration into central stations, WorkHorse ensures a single point of data entry for alarm companies. Information used at the time of the sale to create accounts is then pushed right from the tech portal to the central station. Employees can Create, Place Online/Offline, on test, and terminate accounts through the use of WorkHorse. The Workhorse call centre, ProConnect.io, will answer phone calls and provide a Tier 1 Tech Support line for clients as a well as a concierge service. Operators will trouble-shoot alarm issues or create a service ticket if they cannot help them (subscriptions to both ProConnect and WorkHorse are needed). Operators will also try and collect money that is past due while assisting clients. Misconceptions in the industry Over the next year the prevailing trends will likely be a large swing from dealer programs to the traditional alarm company, says Hayes. This will make software like WorkHorse incredibly important as companies move from a funding program to managing their in-house sales, RMR, service, and customer retention, he adds. There is a misconception is that an owner/operator can purchase a bookkeeping software and run their alarm company efficiently and effectively. Another misconception is that someone can just turn on a software and know how to use it without any help or guidance, that “playing around” with it at night will be enough to make them proficient users. The software used to run a business should be a top priority. The software used to run a business should be a top priority The WorkHorse team is looking to expand verticals into other environments in the future. WorkHorse is built in a way that could easily expand verticals by making changes to the deal and service call modules. “In mid-2020 we plan on starting Pool Cleaning and Pest Control followed by HVAC, Plumbing, Electricians, and more,” says Hayes. WorkHorse has all in-house developers located in South West Florida. The team is continuously working to create additional features and integrations in order to bring the best user experience to clients and their customers.
The drive for learning doesn’t diminish, even in times of a global pandemic. To accommodate the demands of social distancing, more training today happens online. “We have seen unprecedented international demand for our portfolio of online training courses ranging from small installation companies to the largest organisations, across a wide range of sectors,” says Jerry Alfandari, Group Marketing Manager of Linx International Group, a U.K. training firm. “More than ever, businesses are looking to ensure they have the skills in-house to coordinate their response to the changing situation. Individuals are also taking this time to upskill themselves for when we return to ‘normal’ by bringing something with them they didn’t have before. Perhaps unsurprisingly, people are still seeking to better themselves for what will be, eventually, a competitive market.” Expert security training Topics such as CCTV, Access Control, Intruder and Fire Tavcom Training, part of the Linx International Group, provides technical security training delivered by expert tutors on topics such as CCTV, Access Control, Intruder and Fire and also CCTV Control Room and Security Management. Given the practical nature of the courses, the majority have historically been delivered in a state-of-the-art training centre through interactive workshops. However, in order to best protect their staff and learners, and following government guidelines, Tavcom have closed their training centre for the time being. Learners are still able to book into classroom courses for later in the year with a choice of two learning centres now being offered: Hampshire or the recently established training centre in Shipley. For those who prefer to learn online, Tavcom delivers accredited online security training. “Given the situation we are all in at the moment, our online courses have seen an 86% increase in demand over the last several months,” says Alfandari. All online courses offer the same level of support as the classroom courses, with many accredited to BTEC level 3 and 5, catering to professionals of varying skill levels and experience. Improve your professional development “Our online courses remain as accessible as ever, with huge numbers of security systems engineers and professionals seeking to use this [quarantine] time to improve their professional development,” Alfandari says. “We encourage all people to consider the benefits of eLearning and, if they need any advice, to reach out to the Tavcom training team.” It’s more important now than ever before that learners are able to access Tavcom’s online learning programmes and continue in their professional development, he says. To help facilitate learning, the company has discounted 25% off the portfolio of eLearning courses, many of which are BTEC accredited and come with expert tutor support. We are also introducing new interactive ways of teaching traditionally classroom-based courses" “We are also introducing new interactive ways of teaching traditionally classroom-based courses with the aid of Zoom virtual classroom courses, led by our tutors,” says Alfandari. “From the learner’s own home, they will be able to undertake their chosen training course and return to the training centre later in the year to complete the practical assessment.” Skillsets remain in demand Even the most well-prepared organisations with extensive contingency plans have been stunned by the scale and speed of the current situation. Alfandari says: “We are finding especially our Intruder Alarms courses for repair and maintenance engineers have been exceptionally popular; those skill sets remain as in demand as ever in these troubled times.” A sister company, PerpetuityARC Training, offers Security Management BTEC Level 4 and Risk, Crisis and Disaster Management BTEC Level 4 courses that are purposely designed to help businesses and those responsible for security learn how to identify threats, risks and vulnerabilities, and create a comprehensive plan that will enable practical measures to be applied to mitigate the impact. Both courses run via two media: classroom or online and are tutor-supported so learners have a choice according to what best suits their needs and requirements. An online Essential Security Practices course is comprised of 12 modules designed to introduce the essentials of corporate security. Modules can be bought individually or as a whole course and will establish fundamental knowledge of best security practice. “It’s a great starting place if you’re new to security or want to brush up on your expertise,” says Alfandari. Maintaining a security presence is a challenge during a global pandemic. “With people following guidelines by staying at home, we’ve been working hard to drive the message that learning doesn’t stop just because you can’t go out,” says Alfandari. “People may think that because they can’t get to the training centre then they can’t train, but that’s just not the case.” Learning in these unprecedented times Our training centres may be closed for now, but our courses are still very much running" Between Tavcom Training and PerpetuityARC Training, there are more than 20 distance learning courses including ASIS International and The Security Institute, all of which can be accessed at home, at a learner’s own pace. “It’s important that people understand that we’re still here, still available and that we haven’t ‘gone away’,” says Alfandari. “Our training centres may be closed for now, but our courses are still very much running. “ “These are, without doubt, extremely difficult times,” he adds. “We are here for our learners. Our team are working hard behind the scenes to facilitate the best possible learning experience during this time, and we encourage all potential learners to really use this and make the most of it. Whether you want a refresher in security basics or finally to start on that qualification you’ve been putting off, we are here to help you in your professional development.” Rhiannon Limbert, Marketing Coordinator for Linx International Group, contributed to this content.
The success of smart homes began with professional security providers offering bundled packages, focused mostly on security monitoring. However, due to the cost of professional contracts, consumers began to embrace the do-it-yourself (DIY) approach. Despite the challenges and opportunities that come with professional and DIY approaches, the momentum of smart home growth depends on these two approaches working symbiotically. Smart home systems In 2017, there were about 122 million smart home devices shipped globally, according to IHS Markit. The retail channel represented about 62 percent of all device shipments in 2017 and will represent about 70 percent in 2021. Despite the increased demand for professional installation, the “do-it-for-me” approach, most the volume remains with ad-hoc purchases. This includes a consumer video camera or a smart thermostat purchase from a retailer. Data capture form to appear here! When a consumer wants to add devices to an existing professionally installed system, they often will buy products from retail. Flexible service offerings and pricing are already taking shape across smart home offerings. DIY installed smart home systems such as Scout Alarm already offer no contract monitoring. Professional monitoring companies are already offering no contract pricing, and providers such as Comcast are looking to pilot programs for just video monitoring, bundled with Internet for a low monthly fee. Home automation system Connected smart locks can actually act as an extension of a smart hub or controller Options for financing are also going to become commonplace. Smart home equipment is expensive, even when attempting to outfit a modest size home (2,500 square feet). Immediate access to services is becoming more critical. This means consumers should be able to access on-demand service options directly from a mobile device to activate or deactivate professional monitoring. Lastly, pricing still needs to come down for many smart home devices, but there is a threshold. For example, the sale of wireless, connected smart locks (viewed by some consumers as DIY) can lead to opportunities for further home automation product sales and professional installations. Connected smart locks can actually act as an extension of a smart hub or controller. They can be used to communicate wirelessly with and control all the devices that make up a home automation system, including lighting, entertainment, thermostats, air, alarms, shades and more. Residential security According to a 2018 Residential Security Market Report prepared by Parks Associates, “More than 60% of installing dealers now report that DIY systems are biting into demand for their services.” But the rise in DIY is not entirely bad news for security and home automation installers and dealers. There are a number of ways to view this glass as half-full. For example, with their lower cost and perceived ease of installation, DIY products have broken down barriers for additional purchases. There are reasons for dealers and installers to be cheerful about the rise of DIY. For one thing, according to that same Residential Security Market Report from Parks Associates, residential security dealers are doing quite well. The report states, “In 2017, revenues were up an average 7.72% for security dealers.” Full-time monitoring DIY products have broken down barriers for additional purchase and installation of professionally installed systems What about installations? The report goes on to say, “For 2017, the average number of installs per dealer was 22 per month, compared to 17 per month in 2016.” So, revenues are up for security dealers, and at least part of the reason can be attributed to the fact that DIY products can raise overall awareness of and spur interest in other home automation and security products. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for the additional purchase, and installation, of complete, professionally installed systems. Instead of paying for monthly monitoring, homeowners can install a web cam, access from a smartphone or tablet and essentially do their own security monitoring. The downside of this approach is readily apparent. Without full-time monitoring, homeowners can easily miss the break-in or the aged parent who falls and can’t get up. Near-field communication Until they log on and take a look, there’s no central station to send medical aid or call the police. Connecting door locks and other devices to the Internet can also open a door to hackers, if the infrastructure isn’t properly protected. The areas of consumer electronics and security are closely intertwined. For example, Apple recently expanded near-field communication (NFC) support to include the NDEF (NFC Data Exchange Format), which will likely accelerate the adoption of smartphones for access control credentialing. In another recent development, Amazon acquired Blink, a home security camera startup that offers wireless home security systems. The acquisition aligns with Amazon’s effort to offer more home devices. A common theme among professional monitoring providers is that a homeowner who is aware of events happening in the home does not necessarily have a secure and protected household. Traditional security features For example, a Nest camera, a DIY product, notifies a consumer via smartphone about events in the home when it detects motion, but only when the notification is opened and identified will a consumer be able to act on the related event. Self-installable smart home devices may resonate with a segment of the market that want security but are unwilling to adopt professional monitoring; however, providers can leverage these devices to enhance traditional security features and communicate the value of professional monitoring. Missed part one of our smart home mini series? Read it here.
In the fast-growing legalised cannabis industry, extensive security measures are a necessity. VIVOTEK, the pioneering IP surveillance provider has collaborated with Existo, a collective of cannabis industry professionals, to establish an IP surveillance solution for a cannabis cultivation facility in Northern Michigan, the United States. The results not only exceeded the state of Michigan’s expectations to allow for licensing at the state level but are also user friendly and add a level of comfort concerning building security to the owners. Why VIVOTEK? The state of Michigan has placed stringed demands on-camera coverage and recording quality for this industry, so a camera system is essential for the licencing of this business. Challenges in the project were related to distances within the building, coverage in unique spaces and varying climates and light exposure within indoor grow rooms. Existo chose VIVOTEK and a total of 70 of its indoor and outdoor security solutions, network video recorders (NVR) and video management software (VMS) to monitor the cannabis cultivation facility. CC9381-HV Panoramic network camera In the grow room, which includes a long hallway with tight spaces and climate concerns, 7 VIVOTEK 180-degree panoramic network cameras, the CC9381-HV were installed to combat high contrast lighting environments and armed with WDR Pro function to ensure 24/7 surveillance coverage. SD9364-EHL Speed dome camera For exterior corners, 4 VIVOTEK SD9364-EHL speed dome cameras were utilised. The camera is adopted VIVOTEK's Smart IR II technology which is specifically designed to provide a superb low light image in the most challenging situations. FE9181-H Fisheye and FD9380-H Fixed dome cameras Due to its high-quality imagery at a cost-effective perspective, 14 FE9181-H fisheye cameras and 40 FD9380-H cameras were installed throughout the rest of the indoor and outdoor facility. ND9541 NVR and apps VIVOCloud and iViewer app provide users with an open, flexible, and intelligent NVR for video surveillance applications The facility is also utilising VIVOTEK’s 16-CH ND9541 Linux-based embedded standalone NVR to set up and manage advanced IP surveillance systems with ease. It also supports remote and mobile access, via VIVOCloud and iViewer app, for both iOS and Android handheld devices, providing users with an open, flexible and intelligent NVR for seamless use in small to medium-sized video surveillance applications. Marijuana Regulatory Agency (MRA) acclamation In the end, the outcome not only met but surpassed all expectations and goals. The system was complimented as the highest quality in terms of coverage and camera quality by the Marijuana Regulatory Agency (MRA) enforcement agent during the state licencing walkthrough. Surpass expectations “The flexibility we gain from the quality and variety that VIVOTEK offers pays off tenfold in our business because there is no standard building design for cannabis businesses,” said Chris Hernandez, Existo director of operations. “Unique buildings with unique layouts but with highly standardised expectations put forward by state licensing expectations can be a stumbling block for many cannabis businesses. Our ability to utilize VIVOTEK’s solutions allows us to create systems that exceed state expectations while still being used to achieve safety goals set internally by our customers.”
The new CCTV system installed by WLS at Vauxhall City Farm, is according to its Chief Executive, Monica Tyler, being used to its full potential to ensure that the 50,000 visitors who visit the farm every year, are able to safely enjoy all its facilities. “Our previous CCTV was well past its ‘use-by’ date. Although it was still working, it lacked the functionality we needed to ensure around the clock security of our animals and property, as well as ensuring compliance with our health & safety procedures,” said Monica. Central urban farms “The new CCTV system, generously donated and installed by WLS, has transformed our working lives by providing us with peace of mind in knowing we can monitor every area of the farm, including our recently opened eco-garden, without any blind spots.” “The quality of the images captured by the Dahua cameras enable us to see close up detail of any activity or incident, whilst I and other colleagues are able to use an app running on our mobile phones to remotely keep an eye on the farm when it is closed and if there is an alarm event.” Located within earshot of Big Ben, Vauxhall City Farm is one of the oldest and most central urban farms in London. Local and wider communities The farm was established in 1976 when a group of architects began working on a vacant plot of land The farm was established in 1976 when a group of architects began working on a vacant plot of land and made it available to local residents for them to grow vegetables and care for livestock. From those humble beginnings, the farm has continually grown and is now the home for over 100 animals, a riding centre and a cafe, and with the enthusiastic support of a large team of volunteers, conducts dozens of education and youth projects. As a registered charity, the farm’s main objectives are to enhance the health, well-being and life chances of children and disadvantaged people, as well as create enjoyment and recreational opportunities for those from our local and wider communities. Intruder detection systems WLS’s connection with Vauxhall City Farm spans over 15 years, during which it has installed and maintained the farm’s fire and intruder detection systems, as well as the now superseded CCTV system. Alison Ewen, the wife of WLS’s managing director, also has a close bond with the farm. Having been a volunteer for over 20 years, Alison has been appointed a trustee specialising in Riding for the Disabled activities. “As a company which has enjoyed considerable success installing a great number of electronic security solutions across London, we believe we have a corporate responsibility to give something back to the community,” said Jeremy Ewen. “We have welcomed the opportunity to do so by supporting a charity which we have such high regard for, in respect of the support, education and enjoyment it gives to so many people.”
Empire House, the luxury business members' club due to launch in West Yorkshire in a few weeks, has invested a five-figure sum in state-of-the-art, automated security systems to create a slick customer experience, intensify site security and help protect clients from COVID-19. In readiness for opening in a few weeks’ time, the Slaithwaite-based business centre – which will incorporate offices, a ‘lounge’ area with stocked bar and corporate and event facilities – is set to attract businesspeople from all over West Yorkshire and offer 24-hour access to tenants. CCTV and intruder system Recognising a need to heighten client experience and reduce the manpower required, Empire House has invested in CCTV, access control, fire and intruder alarm support from Huddersfield-based specialists, Centurion Fire & Security Ltd. The automated system has been designed to make the management of the building simple. The access control, which can screen visitors via a camera, also offers the option of COVID-19 functionality Able to be programmed to allow and deny access around the building, the system ensures that no unauthorised individuals can gain entry. It is wholly integrated with the CCTV and intruder system, permitting ‘triggers’ and push-notifications to key holders when an area has been ‘breached’. The access control, which can screen visitors via a camera, also offers the option of COVID-19 functionality, allowing or denying entry based on whether they are wearing a mask or not. Manned onsite teams Amy Byram is the founder of Empire House. Commenting on the investment, she said: “We wanted to provide the utmost security for our clients, whilst ensuring that their experience is slick and uninterrupted – the last thing that people want is to feel that their privacy is being intruded, and we have got that balance just right.” “I am impressed with the functionality of the software, which will allow the management team to ensure security is maximal at all times, without the costly need for manned onsite teams. We can lock and unlock doors directly from an app, whilst enabling us to mark people as safe or missing in an emergency. We hope our clients will be as equally as impressed by the technology as we are.”
RCP21, a pioneering Community Interest Company (CIC), has used SmartTask to help set up and manage an in-house security operation at Langthwaite Business Park in South Kirkby, West Yorkshire. The workforce management software was adopted to coordinate a full-time team of officers, tasked with protecting 120 businesses located at the site, without the need to increase management and administrative resource within the organisation. SmartTask has since enabled RCP21 to deliver a superior security service in the most reliable and efficient manner. Workforce management solution “As managing agents of Langthwaite Business Park, we had previously outsourced the security requirements, but we took the decision to bring the service in-house,” explains Nicola Parker, Operations Manager at RCP21. “We recognised the need for a proven workforce management solution that would underpin our security solution moving forward. SmartTask has given us the visibility and control needed to deliver our service and provide customers with complete peace of mind.” SmartTask is used to manage RCP21’s full-time team at Langthwaite Business Park that provides a range of security services including CCTV monitoring, mobile patrols and keyholding and alarm response. SmartTask-enabled smartphones are used to scan 32 checkpoint tags around the site, so RCP21 has full visibility of mobile patrols that take place. Submit incident reports SmartTask has proved to be a hugely useful tool that is delivering value across our security operation" The software’s SmartForm functionality also enables security officers to electronically view their daily tasks; complete vehicle safety checks; and submit incident reports. In particular, the incident reporting tool allows a security officers on patrol or responding to an alarm response to capture all essential information, including any photo evidence, via a smartphone. This means RCP21 has an electronic record of any incident in real-time, so it can take immediate and appropriate action as well as share relevant details to the customer. Monthly performance reports can be taken from SmartTask, while incident data is included within the business park’s newsletter to provide information in relation to crimes and incidents on the park. Mobile workforce management “SmartTask has proved to be a hugely useful tool that is delivering value across our security operation. The software is simple and easy to use by all staff involved and is effective in enabling us to monitor and deliver our security services to a very high standard,” concludes Parker. Paul Ridden, CEO of SmartTask: “Our cloud-based employee scheduling and mobile workforce management software is highly configurable and scalable, making it an ideal solution for any security operation. Whether you are a top 30 security company or a small in-house team, it is possible to take advantage of SmartTask’s user-friendly, feature-rich functionality to better plan, manage, deliver and report on your security services.”
Custom Consoles announces the completion and delivery of Steelbase Lite desks and a MediaWall video monitor display mounting system for the Agricultural Development Bank of Ghana (ADB). Commissioned by Virtual InfoSec Africa, the new installation is situated at ADB's headquarters in Ghana's capital city, Accra. "We were looking for a production partner with a good understanding of video technology, able to produce robustly built and ergonomically efficient control room furniture," says Bondzie Acquah, VP Operations at Virtual Infosec Africa. “With its long experience of the security business and proven ability to meet the demands of heavy industry, Custom Consoles was the logical choice both for the desks and the display mounts. Based on SteelBase Lite and MediaWall, we were able to integrate a complete system into a compact 8 by 5-metre room while at the same time ensuring that all staff could function safely and effectively. Computer equipment is housed in ventilated desk frames with easy front and rear access via black-finished lockable doors for routine technical maintenance." Video display screens Largest of the two desks is a 5.1-metre wide by a 1-metre front-to-back four-bay in-line unit designed for simultaneous use Largest of the two desks is a 5.1-metre wide by a 1-metre front-to-back four-bay in-line unit designed for simultaneous use by up to four operators. Two 24-inch video display screens are mounted in front of each work position on individually adjustable support arms. The desk is located 70 centimetres forward of a 5.2-metre wide MediaWall giving a clear view of eight 55-inch Samsung video display screens mounted in a four wide by two high configuration. Front to back depth of the MediaWall is just 50 centimetres. The second desk is a single-bay dual-screen unit measuring 1.5 metres wide by 1-metre front-to-back. This is configured for use by a supervisor. Both desks are finished in rust-coloured Marmoleum with black PVC edging and silver anodised aluminium legs. The supervisor's desk faces a 76-centimetre high printer support unit with a 60 by 60-centimetre top surface, height-adjustable shelf and integral cable tray. Control room consoles "SteelBase, SteelBase Lite and MediaWall continue to be in strong demand for a very wide range of process control, security and corporate applications," says Custom Consoles' Sales Manager Gary Fuller. "We are very pleased to have worked with Virtual InfoSec Africa on this project and look forward to partnering with them in the future." A variant of Custom Consoles' long-established SteelBase series, SteelBase-Lite is a compact structured desking system which can be configured from 1.2-metre wide powder-coated modules and Marmoleum finished work surfaces, providing a self-assembly hard-wearing ergonomic solution for control room consoles. Panels and ventilation SteelBase Lite comes complete with two VESA mounts per module, mounted on height adjustable beams SteelBase Lite comes complete with two VESA mounts per module, mounted on height adjustable beams. Additional design features of the SteelBase Lite range include hinged removable access doors, 19-inch equipment racking, heavy cable management, power distribution panels and variable-speed ventilation fans. Worktops can be configured to suit individual client requirements. All elements of SteelBase and SteelBase Lite are guaranteed against component failure for five years of normal use. SteelBase-Lite is designed to conform to ISO 9241 part 5, ISO 11064 Part 4 and EN 527 Parts 1, 2 and 3. MediaWall monitor displays First announced in 2006, Custom Consoles' MediaWall allows flat-screen monitor displays of practically any width to be constructed from standard horizontal and vertical support elements. MediaWall can be used as a fully self-supporting structure or coupled directly to the studio wall. Individual screens can be positioned so that the edges meet exactly to form a continuous horizontal display limited only by the boundary of the monitor panel. All wiring is fully concealed and can enter or leave the structure at any desired point. MediaWall is available in any required element widths.
JEWISH CARE has placed its trust in the latest access control, door entry and CCTV technology, to help create a safe and secure environment for residents living in Anita Dorfman House, a new 64-bed care home facility recently erected at its Sandringham care and community hub in Stanmore. Phase 1 of the project has seen the MEPH contractor Harvey Group, award a contract to South London system integrator WLS, to install a Paxton Net2 access control and door entry system with the objective of ensuring that JEWISH CARE has strict control as to who is able to enter the accommodation block or gain access to its sensitive areas. Home management control Paxton proximity card readers and door entry panels have been installed at the new care home’s 5 entrances which, together with 55 door entry handsets deployed throughout the building, allow JEWISH CARE reception and security personnel monitor all access control events. They are able to do so with the help of Paxton’s user-friendly Net2 software platform run on a desktop PC. WLS has also installed over 60 high definition 4-megapixel network dome cameras manufactured by Dahua at carefully chosen locations both within and around the building, to help detect intruders, as well as visually verify access control activity. In addition, automated barriers will shortly be installed at the site’s entrance. Linked to the CCTV system and triggered by Automatic Number Plate Recognition (ANPR) analytics, the barriers help care home management control vehicle access to the site. Smooth implementation of the access control JEWISH CARE is the largest health and social care organisation serving the Jewish community in London With over 70 centres and services touching the lives of 10,000 people every week, JEWISH CARE is the largest health and social care organisation serving the Jewish community in London and the South East. “We go to great lengths to ensure our clients feel safe and this is particularly important as many of them have disabilities, mental health needs or live with dementia,” said Lindsay Long, Facilities Manager at JEWISH CARE. “Investing in the latest generation of access control, door entry and CCTV solutions was therefore considered to be an essential requirement and we have been delighted with how Harvey Group, WLS and the various manufacturers involved in the project, have worked closely together to ensure a smooth implementation of the access control, door entry and CCTV systems.” Stopping unwanted visitors “The combined solution is enabling us to deter and stop any unwanted visitors from entering the building, as well as track and record people as they move around the building, without causing any inconvenience or disruption to colleagues, clients and genuine visitors.” A second phase of the project which is due to be completed by the end of 2020, will see WLS expand the security systems to cover the care home’s new independent living and communal facilities. As was the case during phase 1, WLS has also been tasked to install a TRIAX satellite TV system throughout new facilities, to enable to clients watch British and Israeli TV.
Round table discussion
There was a time when men dominated the physical security industry. On second thought, that time is today. Even with increasing numbers of women entering our community, it’s an industry that is still mostly populated by men. But change is coming, and the industry as a whole is benefiting greatly from a surge in female voices. We asked this week’s Expert Panel Roundtable: What is the changing role of women in security?
In the digital age, software is a component of almost all systems, including those that drive the physical security market. A trend toward hardware commoditisation is making the role of software even more central to providing value to security solutions. Software developments make more things possible and drive innovation in the market. We asked this week's Expert Panel Roundtable: How do software improvements drive physical security?