Promoting the company’s ethos of establishing close working partnerships, CCTV design and manufacturing company, 360 Vision Technology, is celebrating a long-term technical relationship with IP CCTV and security system specialists, Check Your Security. Based in the east of England, with offices in London and Liverpool, Check Your Security offers a wide range of professional expertise and experience in delivering integrated security solutions, using best in class technology - and were the v...
The healthcare market is rife with opportunity for security systems integrators. Hospitals have a continuous need for security, to update their systems, to make repairs, says David Alessandrini, Vice President, Pasek Corp., a systems integrator. “It’s cyclical. Funding for large projects might span one to two years, and then they go into a maintenance mode. Departments are changing constantly, and they need us to maintain the equipment to make sure it’s operating to its full po...
Hikvision and Dahua have been added to a U.S. government list of entities “reasonably believed to be involved, or to pose significant risk of being or becoming involved, in activities contrary to the national security or foreign policy interests of the United States.” In effect, inclusion on the list restricts the export of equipment to the two companies because of their alleged involvement in “human rights violations and abuses” related to a Chinese government campaign...
Nedap and Touchless Biometric Systems (TBS) are hosting the first Security Integration Forum in the Middle East on 7th October 2019. Held at the Conrad hotel on Sheikh Zayed Road in Dubai, it will bring together technology businesses and experts. The aim is to enable discussion of the latest security industry trends and potential collaborations, and showcase advanced technologies and integrations. The highlight of this first Security Integration Forum is the live experience area. Here, in a liv...
Kestrel Guards, a SIA-approved security solutions specialist, has gained added visibility and control over its operation using employee scheduling and mobile workforce management software, SmartTask. By consolidating its requirements into a single system, the company has been able to streamline and simplify internal processes to help enhance service delivery, maximise productivity and better protect security officers. SmartTask workforce management software We looked at a number of systems, bu...
STANLEY Security, one of the security providers, launches a new website as part of its continued commitment to improving the security and safety of people and their environment. The website, which remains at the same address of STANLEYSecurity.co.uk, significantly improves access to information, products and services and features a modern, clean design style. The overall content of the new website has been totally transformed, for greater clarity. The focus is all around the visitor experience...
Axis Communications, one of the market pioneers of network video technology, has received two accolades from security authorities in the form of Cyber Essentials Plus, a scheme operated by the National Cyber Security Centre, and Secure by Default self-certification, organised by the Surveillance Camera Commissioner, Tony Porter. The awards demonstrate Axis’ commitment to cyber security and its dedication to mitigating cyber risks within the products and services it provides. The UK Surveillance Camera Commissioner (SCC) launched earlier in 2019, a voluntary set of minimum requirements to ensure that surveillance cameras and components are manufactured in a way that is secure by design and secure by default. This is a key element of UK government policy on technological innovation having announced a £70m investment in making the UK a world leader in eliminating cyber threats to businesses and consumers by developing more resilient IT hardware, with security and protection designed directly into the hardware and chips. Contribution against cyber security attacks Security must be at the heart of our shared ambition for a smarter, safer world" Tony Porter, Surveillance Camera Commissioner for England and Wales said, “Congratulations to Axis Communications in self-certifying their products as ‘secure by default’. It has been an enlightening and positive experience working with manufacturers toward a common goal and it’s a genuine first and further requirements will follow over the next couple of years. The certification mark demonstrates to customers and stakeholders alike that the products listed on my website meet the new minimum requirements I expect in terms of cyber-secure surveillance camera products. This is exactly the leadership I expect from a company like Axis.” Axis’ full range of camera products have been certified including Companion Series, M Series, P Series, Q Series and F Series and will mean that Axis’ products make a significant contribution to improving the UK’s resilience against cyber security attacks via video surveillance systems. The requirements of the scheme are an important step forward for manufacturers, installers and users alike in providing the best possible assurance for stakeholders that products aren’t vulnerable to cyberattacks. Steven Kenny, Industry Liaison, Architecture & Engineering at Axis Communications, commented, "Security must be at the heart of our shared ambition for a smarter, safer world. It is imperative that every project is approached strategically within specific security standards and frameworks, and implemented with a Secure by Default philosophy. Axis played a part in the development of the new security requirement for surveillance cameras and we welcome it, and also look forward to working with the Surveillance Camera Commissioner to take this to the next level in the future.”
VCA Technology, a UK video analytics provider, announces its global strategic partnership with camera manufacturer CPRO to integrate its unparalleled, AI-driven security surveillance and analytics solutions. This collaboration brings to market the widest range of analytics cameras currently available from one manufacturer, as well as providing customers with complementary servers, appliances and cloud-based analytics software. The agreement enables both organisations to offer pioneering solutions to facilitate state-of-the-art video monitoring and threat detection for businesses across a diverse range of industry sectors. Minimising false alarms They will also leverage AI-powered deep learning in order to increase quality of image analysis The new cameras will enable greater efficiency by reducing set up time thanks to simplified configuration, which will be applicable across the entire range. They will also leverage AI-powered deep learning in order to increase quality of image analysis, drive precision in detection and minimise false alarms. “This partnership signals our ambition – not only to provide our customers with the premier security infrastructure available, but to significantly grow our business in a fiercely competitive market through our new Secubest VCA brand of products. With a growing demand and need for intelligent analytics which drive value across all areas of the business, this agreement gives our customers that extra edge in terms of security provision” said YS Lee, CEO of CPRO. Widest range of analytics Equally, CPRO will benefit from VCA’s expertise in video analytics and market-leading solutions, with over 450,000 active channels globally. It will leverage VCA’s innovative edge video technology and cloud-based AI detection capabilities to launch the Secubest product line in Europe for the first time Their wide range of cameras complements the range and flexibility of our analytics" Kevin Waterhouse, Managing Director of VCA said: “Partnering with CPRO not only means working with a another major player in the CCTV industry but also strengthens our position as a leading provider of analytics at the edge. Their wide range of cameras complements the range and flexibility of our analytics and their plans to launch in Europe are very exciting. In addition, our Server, Appliance and Cloud based products means that our mutual customers have the widest range of analytics and AI options.” Avoiding false alarms The extensive choice of encoders, sensors, cameras and other CCTV tools will empower customers to select the most appropriate solution, depending on their specific business needs. From a security standpoint, customers will be able to effectively protect external boundaries from potential threats and use calibration to avoid false alarms – typically triggered by wildlife in rural areas, and by high footfall in urban locations. Businesses in the retail sector will be able to track conversion, analyse store traffic by area to improve product displays, and monitor till queues to optimise staff. Finally, in the field of transport, the new solutions can help manage traffic flow and ensure real time alerts for accidents, detect illegal activity, and count vehicles transiting to maximise car park capacity.
Revader Security, manufacturers of the Galaxy Mobile CCTV Tower have received a new order from Scorpion Security. Finished in the firm’s house colour with custom designed signage, Scorpion have named their towers ‘Stingers’. Scorpion Security purchased their first ‘Stinger’ at the end of last year. Based in Northampton, Scorpion has seen a dramatic increase in demand for its Stinger surveillance tower since the beginning of this year. Scorpion is fast developing its rental fleet of Stingers to augment its existing business of CCTV and alarm installations, manned security and mobile patrols. Power management system For rapid autonomous deployment, Revader Security’s mobile CCTV towers are unmatched" Mark Bennet, Managing Director at Scorpion Security had undertaken a survey of surveillance towers and found that the Galaxy Tower from Revader ticked all his boxes. He commented: “for rapid autonomous deployment, Revader Security’s mobile CCTV towers are unmatched. With continuous recording and transmission of video from five cameras, we are able to monitor very large areas reliably and without blind spots”. The mobile power base includes a diesel generator, fuel tank and reservoir batteries that will power the surveillance tower unattended for up to 60 days (load dependant). This unit is remotely monitored and controlled by its own power management system which sends warning emails, low fuel and battery power to CCTV operators when it necessitates human intervention. Ideal rental product Bennet added: “The Stinger is our secret weapon. With single person deployment and 24/7 operation, it significantly reduces overheads and makes for an ideal rental product for our company”. Revader Security, based in North Wales, has been manufacturing a range of mobile and redeployable CCTV products for the past 12 years. Revader Security is a small design and manufacturing company and is able to design new products utilising its technology base or customise any of its existing products.
IDIS is highlighting the more caring side of surveillance technology as it launches an initiative to support a deserving charity or community group with the donation of an advanced video system. While security professionals are already aware of the good that CCTV continually does, in the public imagination video footage is all too often associated with the darker side of human nature and criminality. But video surveillance can equally reveal the more selfless and caring things that ordinary people do, points out IDIS in a new video entitled Create a Better World – simple acts of kindness from returning dropped wallets to making room for strangers in crowded lifts. IDIS has a long tradition of supporting social welfare and community development projects" Social and community welfare projects To show support for the Korean technology provider's plan to donate a complete system to a deserving cause – and potentially win a European mini-break for two people – EU and UK security installers, systems integrators, end-users and industry professionals can simply add a comment and like the campaign on the IDIS Facebook page. The closing date is September 30th and the chosen community organisation will be announced by 14th October, along with the winner of the holiday. “IDIS has a long tradition of supporting social welfare and community development projects and we actively encourage employees in philanthropic activities near our facilities,” says James Min, Managing Director of IDIS Europe. “With our Create A Better World initiative we are looking to support projects that positively impact local communities by helping them with our expertise and technology.” The initiative builds on the success of a similar programme in the US, which saw IDIS America donate new video tech to the Salvation Army of North Texas.
Measuring just 99mm in diameter, the new super-compact 2 and 5-megapixel Wisenet Q mini domes manufactured by Hanwha Techwin are packed with features designed to ensure that end-users obtain maximum benefit from their video surveillance solutions. 40% smaller than previous models, the new H.265 mini domes deliver real-life practical benefits to a wide range of end-users and in particular, retailers who require aesthetically attractive cameras to be installed on walls and ceilings, in what could be confined spaces. License-free people counting analytics, as well as defocus, motion and tampering detection are built into all four new models as standard, whilst a new open platform chipset also provides the opportunity for third-party applications to run onboard the domes. Business intelligence for smarter retail Retailers can take advantage of the captured data to measure the impact of online promotions The people counting functionality built into the new Wisenet Q mini domes offer retailers the opportunity to monitor store efficiency in terms of the relationship of footfall data with actual sales. Retailers can also take advantage of the captured data to measure the impact of online promotions and other marketing activities on the number of people who enter their stores, as well as making best use of human resources in order to manage the peaks and troughs of customer flow at checkouts. Besides, the new mini domes have been integrated with Retail Insight, a shortly to be launched business intelligence solution which users will be able to purchase separately and which utilises people counting, queue management and heat mapping applications to provide Statistical Analytics via an affordable centralised dashboard software solution. Accessed from anywhere on the network, Retail Insight will consolidate data captured by up to 500 cameras and present it on an easy to understand dashboard to enable business managers to have a greater understanding of the customer-related activity. All four new models are true day/night (ICR) cameras which feature Lens Distortion Correction (LDC) and true Wide Dynamic Range (WDR) which performs at up to 120dB to produce clear images from scenes containing a challenging mix of bright and dark areas which normally results in overexposed or underexposed images. Multiple streaming with WiseStream II WiseStream II reduces the total cost of ownership of a video surveillance system The mini domes support multiple streaming with the choice of H.265, H.264 or MJPEG compression. Their bandwidth friendly credentials are enhanced by WiseStream II, a complementary compression technology which dynamically controls encoding, balancing quality and compression, according to movement in the image. Bandwidth efficiency is improved by up to 99% compared to current H.264 technology when WiseStream II is combined with H.265 compression. As such, WiseStream II reduces the total cost of ownership of a video surveillance system by minimising the storage and bandwidth requirements of high definition cameras. Other key features : Hallway View which provides a highly effective way to monitor narrow vertical areas such as shopping aisles and corridors. It enables cameras which can generate images in the 9:16 and 3:4 aspect ratios to work effectively in tall and narrow spaces, with the added bonus of minimising bandwidth and video storage requirements. MicroSD/SDHC/SDXC memory slot allows up to 128GB of video or data to be stored at the edge. Power over Ethernet (PoE) support which negates the need to install separate power supplies and cabling for each dome. The Wisenet QND-8011 and QND-8021 have an HDMI video output which enables images captured by the mini domes to be displayed on a public view monitor. The four ONVIF compliant new mini domes are : Wisenet QND-6011 2MP mini dome with fixed 2.8mm lens with max. F2.0 Wisenet QND-6021 2MP mini dome with fixed 4.0mm lens with max. F1.6 Wisenet QND-8011 5MP mini dome with fixed 2.8mm lens with max. F2.0 and HDMI output Wisenet QND-8021 5MP mini dome with fixed 4.0mm lens with max. F1.6 and HDMI output
Paxton welcomes a new Senior Product Manager to the United States team, bringing with him a wealth of knowledge and experience of the access control market. Jeremy Allison will be based in Greenville, SC, and will oversee the development of future products, making sure they meet the demands and expectations of the growing US market. With over 15 years’ experience in CCTV and control systems, Jeremy has worked as a product manager for a security company and has run his own integration company. Product management team The company has a really positive atmosphere and I can’t wait to get started" He said, “I’m excited to be working with such a creative and talented team at Paxton - this really is the perfect role for me. I’m looking forward to sharing my knowledge and experience, while further developing my skills using Paxton’s world-class systems. The company has a really positive atmosphere and I can’t wait to get started.” Paul Bannister, Paxton’s Research Director said, “I’m absolutely delighted that Jeremy has joined our product management team, heading up the US side of the department, and bringing 15 years of experience with him. We’re looking forward to working with Jeremy to deliver the world-class products our customers expect, resulting in continued growth for our important US market.” Access control industry Jonathan Lach, VP of Sales at Paxton Access, Inc. said, “Jeremy has a wealth of knowledge of the access control industry, and he will make a fantastic addition to the team.” Jeremy will be working to develop Paxton’s brands: Net2 – simple access control Net2 Entry - innovative video intercom PaxLock – access control in a wireless lockset
For those of you old enough to remember, video matrix switchers were once the heyday of surveillance camera control. These cumbersome antiques were at the heart of every major video surveillance system (CCTV at the time) in premier gaming properties, government installations and corporate industrial complexes. They required more physical labour to construct and configure than perhaps the pyramids – maybe not – but you get the picture. And then digital video made its way in to the market and everything changed, transforming the physical demands for camera control and management from a hardware-centric to a software driven process. We’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely There’s no doubt that this migration also presented significant challenges as many security professionals often struggled with all things IT and software programming being one of the industry’s soft spots. Fortunately, we’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely. However, the complexities of today’s VMS functionality can be intimidating for anyone tasked with installing one of these systems given all of the user-defined options available from the simplest camera sequencing and bandwidth allocations to mobile management and enterprise level integration. This is where truly advanced VMS solutions need to shine on both the operations and the design/build sides of the equation. Smart VMS design There are more solutions products labelled “VMS solutions” out there than ever before. The issue is the fact that many of these “solutions” really don’t fall into the category of a true VMS by today’s standards but offer basic camera and NVR control. No doubt that there is a place for such software programs in the market. However, VMS solutions from the likes of OnSSI and other industry-leading companies offer distinct and superior management and control capabilities for demanding security and business intelligence applications. Perhaps of equal importance, these top-tier VMS solutions incorporate provisions for installers, so they have a clear and easier implementation path. OnSSI offers VMS solutions with smart camera drivers Here are seven attributes that can assist with the design and implementation of an advanced VMS solution: 1) Open architecture platform We need the ability to easily integrate with other systems and scale for future developments and physical system growth The ability to easily integrate with other systems and scale for future developments and physical system growth is largely dependent on a systems platform architecture. Here’s where VMS solutions with open architecture provide a distinct advantage. Open-architecture solutions expand functionality by facilitating greater integration between multiple systems and components. This not only makes VMS solutions with open architecture easier to implement, it makes them extremely cost-efficient by eliminating the need for proprietary solutions. Open architecture systems also provide adherence to industry standards such as ONVIF and PSIA, as well as compression formats such as H.265 and MJPEG, and help ensure system integration and support of an extensive range of manufacturers’ cameras and off-the-shelf hardware. Be wary of VMS solutions with limited camera manufacturer support. 2) Simple licensing processes and pricing Camera licenses and pricing is always a touchy subject, as any misunderstanding of a specific VMS solutions’ licensing terms can prove to be costly after the fact. And it often seems that some VMS suppliers have gone to great lengths to complicate the process as to obscure actual Total Cost of Ownership (TCO). Perhaps the most direct, simple and straightforward camera licensing and pricing method is to have one license per IP address used by each camera/encoder on multi-channel devices. These should be perpetual licenses with no required annual fees or subscriptions. Additionally, the licensing agreement should be all inclusive without added fees for multiple clients, failover servers, active directory support, I/O devices, redundant management servers, technical support or security patches and updates. 3) Mixing and matching camera license types The ability to mix and match different camera license types within the same system helps facilitate a seamless and simple migration of new and pre-existing systems with minimal downtime or interruption in operation. The ability to mix and match camera licenses not only saves valuable design and installation time, it can provide considerable savings when integrating large, multi-tenant systems. Mix and match capabilities also allow system designers to apply specific feature sets to specific groups of cameras to best leverage functionality and budgets, as well as providing the flexibility to implement an on-site, virtual, or cloud-based VMS solution, without any additional cost. 4) Auto camera detection and configuration Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements. This functionality allows installers to instantly locate cameras on the network and configure them centrally so they can easily replace older cameras while seamlessly retaining video recorded from them. The auto detection capability should also include the ability to detect and import CSV files, which can then be stored and used to configure camera templates for future camera installation profiles. 5) Smart camera driver technology VMS solutions with smart camera drivers offer valuable assistance during system implementation, and any time new cameras are added to the network or replace older models. Manufacturer-specific smart camera drivers expand the range of model-specific static drivers. Instead of storing the device’s information (codecs, resolutions, frame rates, etc.) statically, a VMS with smart camera drivers queries devices for their capabilities using the manufacturers’ proprietary protocol. All that is required for configuration is that the camera is available on the network. Smart camera drivers eliminate the need to wait for model-specific drivers or installation of driver packs, allowing for newly released cameras to be used immediately. Network security is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers 6) Importance of network security Network Security is perhaps the greatest challenge faced by industry professionals today Network security is perhaps the greatest challenge faced by industry professionals today. This is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers. New security developments to look for include TLS 1.2 encryption protocols for camera-to-server communications (SSL 3.0 supported for older cameras), as well as server-to-server communications. Additional safeguards to consider include: randomised video databases with no camera identification information to secure recorded data; support for Active Directory authentication; AES encryption between servers and clients; and AES encrypted exporting. 7) Automatic updates Regardless of the supplier you select for your VMS solution, they should be consistently providing new updates and security patches on a frequent if not regular basis. Keeping up with these updates can be a burden and are often overlooked leading to system failures and breeches. Advanced VMS solutions now feature automatic update service checks on a system-wide basis, eliminating the need to manually update individual servers and devices. This ensures that your VMS system always has the latest drivers, fixes and updates which assures overall security while reducing TCO. So next time you’re getting a demo of the latest and greatest VMS solution, remember to ask what it offers in terms of design and implementation tools. Half the battle with new technologies is getting them installed and working properly. Without the right tools to accomplish these critical first steps, all the functionality in the world will do you little good.
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all of which are commonly used to support security solutions. The underperformance, from June 15 to August 24, of U.S. stocks with high revenue-exposure to China, and that of Chinese stocks with high revenue-exposure to the United States was significant and almost identical at 3.2%, significant losses to some investors already involved in security industry M&A activity. Significant public safety Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety While it was not apparent that practitioners’ security program budgets kept pace with the growth of the more popular solution providers like video surveillance and cyber security, the ICT industries supporting the security economy continued to expand, especially in wireless and wired infrastructure, including preparations for 5G wireless rollouts. These omnipresent technologies drove significant public safety, smart city and public venue projects in 2018. Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety. In 2018, virtually every public presentation, webinar and published Q&A on social media monitoring and facial recognition technologies I worked on, involved significant pushback from privacy advocates, almost to the point of alarmism. Massive risk reduction Several solution providers in these areas have made significant strides on data protection, accuracy, powered by AI and documented crime reduction cases; however, this real news is quickly shadowed by privacy advocates, seemingly ignoring massive risk reduction, especially in the case of active assailants and gang-related crime. Will FR become mainstream? The cautious security industry may take a cue from the maverick retail industry, sports venue and VIP verification solution providers that grew in 2018. 2019 trends: presupposition or repudiation; winners and losers. Chinese tariffs have had a huge impact on the security industry, which can be seen from changes to U.S and Chinese stocks Although technology adoption forecasting is inexact, there are definitive opportunities in the security industry born on necessity. With the widespread problem of false alarm transmission and inability for first responders to ‘be everywhere,’ developers of solutions that provide automated verification and alternative security incident detection are expected to become mainstream. Promising detection systems The use of AI, NLP, LiDAR, UAS (Unmanned Aerial Vehicles aka drones) with surveillance and thermal imaging will grow, mostly due to higher acceptance in other industries like autonomous vehicles, rail safety, terrain and post devastation mapping/rescue. However, legacy ‘listing’ or certification organisations will be forced to make an important decision for their own survival: work toward integrating these promising detection systems into acceptance by insurance, licensing and standards development organisations. 2019’s ‘true’ Industrial Philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants 2019’s ‘true’ industrial philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants. For these use cases, 5G infrastructure rollouts, FR acceptance, lower cost perimeter detection and long range object and fire recognition by LiDAR and Thermal imaging will all be watched closely by investors. Should public agencies and philanthropical solution providers in the security industry cross paths, we may just yet see a successful, lifesaving impact. Cyber risk profile The ‘Digital twin’ refers to a digital replica of physical assets (physical twin), processes, people, places, systems and devices that can be used for various purposes. Your ‘Security Digital Twin’ has a similar physical and cyber risk profile, either through common threats, similar assets or both. Good news: managing your risk, protecting assets and securing your facilities in 2019 will get easier as security digital twin profiles will grow in maturity, while keeping their data sources private. This will be accelerated by the maturity of AI-based, auto-generated visualisations and image recognition, that happens to also drive the FR solutions. The 5G wireless infrastructure market is emerging as far more of a quantum leap in connectivity, like ‘wireless fiber optics’ performance, than an upgrade to 4G LTE. The 5G infrastructure market will be worth $2.86 billion by 2020 and $33.72 billion by 2026, growing at a compound annual growth rate (CAGR) of 50.9%. Intelligent applications The explosion of ingested voice, video, and meta-data, the interconnectivity of devices, people and places, and the integration of intelligent applications into expanding ecosystems all require faster communications. To be more accurate, 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity: 5G and FWA (Fixed Wireless Access). 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity Quite simply put, larger solution providers are gently coaxing practitioners into seemingly ‘open systems;’ the negative discovery during an M&A process, audit or integration with a smart city’s public/private partnerships will continue to be revealed, and related industries will force reform. Autonomous things will be enabled by AI and image recognition. With few affordable rollouts of security robots and outdoor unmanned ground vehicles (UGV) that leveraged platforms popular with research and even NASA, the autonomous security robot was mostly MIA from a security practitioner’s program in 2018. Perimeter intrusion detection One platform was even accused of intimidating homeless people in a public place, at a major city. Industries mutually beneficial are often unaware of each other; this will change gradually: one major domestic airport is currently evaluating a UGV platform performing perimeter intrusion detection, runway weather conditions and potential aircraft taxiing dangers. The platform is being used largely in transportation research, yet offers significant opportunities to the security industry. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR The ‘immersive experience’ of virtually any security or threat detection is a twist on virtual/augmented/mixed reality (VR/AR/MR) with additional sensory features. Although VR/AR/MR is well underway in other industries, there are several companies with solutions like VR-based active assailant training that could provide a fighting chance for practitioners, employees, visitors, faculty and children. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR. Security ecosystem members Not necessarily MIA, but of special mention is the need of security and safety practitioners to prioritise communications systems over ‘nice to have’ expansive video surveillance systems for mass casualty threats. This will eventually improve with 5G for Enterprise solution rollouts. At the past GSX and upcoming CES Technology trade shows, a new roundup of technologies is discovered: a wider diversity of protection promise to save ASIS members on their technical security program is realised. With each of the ‘winners,’ (5G, AI, NLP, LiDAR, UAS [Unmanned Aerial Vehicles aka drones], thermal imaging, digital security twins and smart-city-friendly technologies) it is both exciting and challenging work for both security practitioners and solution providers. All things equal and with the necessary technology acceptance testing processes, this is a truly great time for security ecosystem members.
The use of facial recognition has become a highly debated topic recently, and has increasingly and misleadingly been criticised by some for being an unethical tool used to spy on the public. The reason for such criticism is however largely due to lack of information and regulation around the technology. Used proportionately and responsibly, facial recognition can and should be a force for good. It has the ability to do a lot more to increase security in the future – from street crime to airport security, all the way through to helping those battling addiction, the technology can take security and operations to new heights. These systems can memorise the faces of persons of interest, networks of gang members, wanted criminals and those suspected of involvement in serious violent crimes The rise in knife crime Knife crime has dominated the headlines in the UK throughout the year. Recent statistics show the number of people being admitted to emergency care due to attacks by a sharp object to be up by nearly 40 per cent from two years ago, whilst the number of children under the age of 18 being admitted to hospitals with stab wounds is up by 86 per cent in only four years. This recent surge in knife crime has put police forces under immense pressure, and the intelligent use of facial recognition has a role to play in enabling more informed stop & search interventions. Currently UK police can stop and search an individual they suspect to be carrying drugs or weapons or both, or they can stop and search a person in a location where there have been or are considered likely to be “incidents involving serious violence.” In both cases they must do so with access to limited information, leaving themselves open to accusations of bias or discrimination. Knife crime dominated the headlines in the UK throughout 2018 Police systems benefiting crime investigations This is where facial recognition can offer up additional intelligence. These systems can memorise the faces of persons of interest, networks of gang members, wanted criminals and those suspected of involvement in serious violent crimes. Furthermore, these systems don’t need prior personal engagement to recognise an individual and see only data, not gender, age or race. Facial recognition thus helps eliminate both weapons and criminals off the streets and potentially prevent crimes before they have a chance to take place. The technology doesn’t take the decision away from the human police officer. However, it does bring greater transparency and context to the decision-making process of whether a stop and search intervention is justified. Similarly, the advanced technology can recognise and match an individual seen on a CCTV camera at a crime scene to someone the police encounters on the streets some time later, justifying a stop and search on that individual. Its ability to check in real time if a person is on a criminal watchlist adds an extra layer to the decision-making process prior to conducting a stop and search, lowering the likelihood of discrimination. Facial recognition thus helps eliminate both weapons and criminals off the streets and potentially prevent crimes before they have a chance to take place. Gambling addiction and how facial recognition can help There are an estimated 593,000 people in the UK currently battling a gambling problem, making it a serious public health issue in the country. Having understood the gravity of the issue, the UK gambling commission have set limits and advice in place to help those suffering this addiction; yet as with all addictions, gambling is a tough habit to beat. In order to put effective limitations in place and make a real difference, the gambling commission needs the right technology to protect those most vulnerable in the industry. Facial recognition technology is able to keep track of customers and thus help gambling companies in protecting their customers Facial recognition technology is able to keep track of customers and thus help gambling companies in protecting their customers to a higher degree. Monitoring those entering and moving around gambling areas is an extremely difficult task for human staff to do alone, especially in large crowded areas such as casinos. Facial recognition technology installed around the premises would be able to help the company and the staff to identify people who have registered as gambling addicts, and keep record of their day’s play in order to inform staff if and when it was time for them to stop. It would also be able to ensure effective self-exclusion procedures, by identifying a self-excluded individual via CCTV as soon as they entered the venue to then allow security staff to respectfully escort them out. Utilising facial recognition at airport security Facial recognition has by now become a normal sight at many airports around the world. Several people today hold a so-called biometric passport, which allows them to skip the normally longer queues and instead walk through an automated ePassport control to proceed to the gate faster without having to deal with control officers. Facial recognition used in this way has managed to significantly cut waiting times at the passport control, but it also has the ability to enhance security in and around airports. Facial recognition uses algorithms to match physical characteristics against photos and videos of people's faces Earlier this year, facial recognition technology managed to catch an imposter trying to enter the US at the Washington Dulles Airport. The false passport may have been uncaught by the human eye, yet due to the accuracy of the facial recognition technology it managed to help officers catch the imposter and bring him to justice. Facial recognition thus allows officers to identify an individual faster and more accurately than the human eye. Facial recognition uses algorithms to match physical characteristics against photos and videos of people's faces, which have been collected from visas, passports and other sources. Facial recognition allows officers to identify an individual faster and more accurately than the human eye At airports the use of facial recognition has proved to both enhance security as well as speed up processes such as check-inWhilst some critics may worry about issues of privacy related to the technology, at airports the use of facial recognition has proved to both enhance security as well as speed up processes such as check-in and, in the future, even boarding proceedings. If used correctly and proportionately, facial recognition can help safeguard the public and improve national security on several fronts. Whilst the many benefits of facial recognition are evident, the lack of regulation and understanding of the technology has led to misconception around how it works and what it is used for. Facial recognition technology can match faces in crowded public places against criminal watch lists, and register faces that match with those on criminal watch lists – whilst ignoring everyone else.
A week of mass shootings this summer has again spotlighted the horror of gun violence in public spaces. A 19-year-old gunman opened fire at the Gilroy Garlic Festival in California on July 28, injuring 13 and killing four (including the gunman). In El Paso, Texas, less than a week later, a lone gunman killed 22 people and injured 24 others. In Dayton, Ohio, a day later, a gunman shot 26 people during a 30-second attack, killing 9 and injuring 17. Rising active shooting incidents Beyond the grim statistics are three distinct incidents, linked only by the compressed timeline of their occurrence. Still, there is a tendency to want to find a pattern: Why do these incidents happen? How can we prevent them? In total, 91 people were killed and 107 more were injured in locations such as workplaces, schools, and public areas One attempt to analyse trends and commonalities among mass shooting incidents is a research report published by the U.S. Secret Service National Threat Assessment Center (NTAC) titled “Mass Attacks in Public Spaces – 2018”. Looking at the totality of major mass attacks last year, the report seeks to find patterns that can shed light on the attacks and suggest strategies to prevent and mitigate future incidents. Mass shootouts Between January and December 2018, 27 incidents of mass attacks – in which three or more persons were harmed – were carried out in public spaces within the United States. In total, 91 people were killed and 107 more were injured in locations such as workplaces, schools, and other public areas. The National Threat Assessment Center report considered all the mass attack incidents in 2018 and analysed some trends and statistics: Over half (59%) took place between the hours of 7 a.m. and 3 p.m., and 63% of the attacks ended within 5 minutes of when they were initiated. Most of the attackers were male (93%); the youngest was a 15-year-old student and the oldest was 64. Nearly a fourth of the attackers (22%) had substance abuse problems, and half (48%) had a criminal history, whether violent or non-violent. About two-thirds (67%) experienced mental health symptoms, commonly depressant and psychotic symptoms such as paranoia, hallucinations or delusions. Almost half (44%) had been diagnosed with a mental illness prior to the attack. The main motives were domestic, personal or workplace grievances (52%); followed by mental health/psychosis (19%); 22% had unknown motives. Most (85%) of attackers had at least one significant stressor in their lives in the last five years; 75% had experienced stressors that occurred in the previous year before the attack. Personal stressors included the death of a loved one, a broken engagement of physical abuse. Work- or school-related stressors included losing a job, being denied a promotion, or being forced to withdraw from classes. More than half of attackers (56%) experienced stressors related to financial instability. Personal issues such as homelessness or losing a competition were also stressors. Nearly all the attackers (93%) engaged in prior threatening or concerning communications. Most of the attackers (78%) also exhibited behaviors that caused concerned in others. For the majority of the attackers (70%), that concern was so severe that others feared specifically for the safety of the individual, themselves, or others. The Secret Service report also analysed the overall impact of several factors: Mental health and mental wellness - Mental illness, alone, is not a risk factor for violence, and most violence is committed by individuals who are not mentally ill. Two-thirds of the attackers in this study, however, had previously displayed symptoms indicative of mental health issues, including depression, paranoia, and delusions. Other attackers displayed behaviors that do not indicate the presence of a mental illness but do show that the person was experiencing some sort of distress or an emotional struggle. The importance of reporting - Since three-quarters of the attackers had concerned the people around them, with most of them specifically eliciting concerns for safety, the public should be encouraged to share concerns they may have regarding coworkers, classmates, family members, or neighbors. Need for a multidisciplinary threat assessment approach - There is a need to standardise the process for identifying, assessing, and managing individuals who may pose a risk of violence. Law enforcement and others are taking steps to ensure that those individuals who have elicited concern do not “fall through the cracks.” Law enforcement personnel should continue developing close partnerships with the mental health community, local schools and school districts, houses of worship, social services, and other private and public community organisations. Threat assessment Threat assessment refers to a proactive approach to violence prevention, an investigative modelMany of the resources to support the threat assessment process are already in place at the community level, but require leadership, collaboration, and information sharing to facilitate their effectiveness at preventing violence, according to the report. ‘Threat assessment' refers to a proactive approach to violence prevention, an investigative model originally developed by the U.S. Secret Service to prevent assassinations. It has since been adapted to prevent all forms of targeted violence, regardless of motivation, including K-12 school shootings and acts of workplace violence. When implemented effectively, a threat assessment generally involves three key components: Identify, Assess and Manage. Identify, assess and manage Public safety entities rely on people who observe concerns to identify the individual to law enforcement or to someone else with a public safety responsibility. In educational settings or workplaces, concerns may be reported to a multidisciplinary threat assessment team that works in conjunction with law enforcement when needed. The responsible public safety entity is then tasked to assess the situation to determine how they can manage any risk of violence posed by the individual.
Gunshot detection today is part of more physical security systems than ever before, and many manufacturers are developing interfaces to the latest gunshot detection technologies. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform, Security Center. Thanks to this integration, police departments and security professionals will be able to receive more actionable information, gain rapid access and detailed location insights when a gunshot situation occurs. Cloud-based analysis software ShotSpotter uses wide-area acoustic surveillance that automatically gets activated when gunfire occurs ShotSpotter uses wide-area acoustic surveillance that automatically gets activated when gunfire occurs, providing comprehensive outdoor coverage on campuses and in complex urban geographies. ShotSpotter sensors and cloud-based analysis software triangulate and pinpoint the precise location of each round fired within seconds, the number of shots fired and provide an immediate gunfire alert with an audio clip. Data capture form to appear here! Detailed incident data is immediately sent to SST’s Incident Review Center (IRC), a secure data processing and alert validation facility, where acoustics experts analyse the data and qualify the incident in real-time 24/7. Once validated, an alert is sent directly into Genetec’s Security Center, all in under a minute. Once the alarm is triggered within Security Center upon gunshot detection, operators can quickly access video and other related data surrounding the location of a gunshot alert, and immediately visualise it on Security Center maps, leveraging the dynamic visualisation capabilities of the Security Center Plan Manager. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform Gunshot identification software Stanley Security has announced a partnership with Shooter Detection Systems LLC (SDS), gunshot detection solutions provider. As an authorised dealer, STANLEY Security is now certified to sell, install and service SDS products and services. SDS’s Guardian Indoor Active Shooter Detection System combines acoustic gunshot identification software with infrared gunfire flash detection for a fully automated gunshot detection and alerting solution. The Guardian System immediately detects gunshots and simultaneously alerts building occupants The Guardian System immediately detects gunshots and simultaneously alerts building occupants and first responders within one second and with zero false alerts. Johnson Controls has announced that its exacqVision video management system now integrates with Databuoy Corp.’s ShotPoint acoustic gunshot detection and localisation system to speed response time and heighten the decision-making process for local responders during active shooter situations. Integrated security systems Johnson Controls has also released the Detect360 Active Shooter Response (ASR) system, combining reliable gunshot detection with notification technology to provide immediate warning when a gunshot is fired within a building. By providing early notification and precise location of the shooter, the ASR system gives occupants time to find safety and allows police and security personnel to mitigate the threat up to 60 percent faster. Detect360 ASR gives first responders information as it develops at the scene, including shot location, number of shots, location of the shooter in near real-time and the ability to remotely monitor the situation through integrated security systems. It also collects forensic information that can later be used by law enforcement. The system supports multiple integration options, including video feeds from existing CCTV and intrusion systems, mass notification systems, access control systems and panic button/manual initiation systems. Detect360 ASR gives first responders information as it develops at the scene Public safety access points Listed as one of the most important new technologies debuted at CES 2019 by the Wall Street Journal and NBC News, Safe Zone also showcased its Safe Zone Gunfire Detector (GFD) at ISC West 2019. Priced at $149 per unit, the Safe Zone Gunfire Detector combines infrared and sound detection technologies with immediate cloud-based data analysis that can analyse more than 3,000 data points of each loud noise that exceeds ambient levels by a certain threshold. The system determines the location of shots fired, the number of shots, and the type Utilising the data from multiple detectors simultaneously, the system determines the location of shots fired, the number of shots, and the type and calibre of gun being used. Within 10 seconds of the trigger pull, an alert is sent to Public Safety Access Points in the appropriate dispatch center, giving local 911 dispatchers all critical information on their computers. Reseller recruitment programme Shot Tracer has launched a reseller recruitment programme with a highly attractive on-boarding proposition for qualified dealers. Qualifying resellers can receive a Gunshot Simulator Kit valued at $1,000 when they commit to becoming a Shot Tracer dealer. Shot Tracer’s Eagle Gunshot Detection System easily integrates with virtually any security, alarm, surveillance and access system via contact closure – or wirelessly via IP integration. In fact, Shot Tracer gunshot detection sensors are as easy to install as a smoke detector, so there’s virtually no learning curve for installing dealers. The new Shot Tracer Reseller Recruitment Program includes an exclusive offer for installing dealers to receive a free Gunshot Simulator Kit, valued at over $1000, which is essential for demonstrating Shot Tracer Eagle Gunshot Detection sensors. Terms and conditions apply for qualifying resellers.
Police in the United Kingdom have been testing the effectiveness of live facial recognition (LFR) for several years now, but future uses of the technology have been called into question. The Information Commissioner’s Office (ICO), an independent authority that seeks to uphold information rights in the public interest, has weighed in on issues of data privacy related to LFR, and Members of Parliament (MPs) have called for a moratorium on uses of the technology. The big question is whether the benefits of LFR outweigh its impact on privacy rights. Live facial recognition I believe that there needs to be demonstrable evidence that the technology is necessary" The House of Commons Science and Technology Committee has expressed concerns about bias, privacy and accuracy of facial recognition systems and urged the U.K. government to issue a moratorium on further live facial recognition trails until regulations are in place to address bias and data retention. According to Elizabeth Denham, U.K. Information Commissioner: “[Police trials of LFR] represent the widespread processing of biometric data of thousands of people as they go about their daily lives. And that is a potential threat to privacy that should concern us all.” Denham says live facial recognition (LFR) is a high priority area for ICO. “I believe that there needs to be demonstrable evidence that the technology is necessary, proportionate and effective considering [its] invasiveness,” she says. Potential public distrust “Any organisation using software that can recognise a face amongst a crowd and then scan large databases of people to check for a match in a matter of seconds, is processing personal data,” says Denham. General Data Protection Regulation (GDPR) wording specifies biometric data as a ‘sensitive’ category of personal information. London’s Metropolitan Police Service performed 10 trials of live facial recognition at various venues in 2016, 2017 and 2018. The London Police Ethics Panel reviewed the trials and concluded that additional use of the technology would be supported if certain conditions were met. One condition is if the “overall benefits to public safety [are] great enough to outweigh any potential public distrust in the technology.” Each deployment should be assessed and authorised as necessary and proportionate. Operators should be trained to understand associated risks and to be accountable, and there should be evidence that the technology does not promote gender or racial bias. Develop strict guidelines Met Police used NEC’s NeoFace technology to analyse images of the faces of people on a watch list The Ethics Panel also specified that both the Metro Police and Mayor’s Office for Policing and Crime should develop strict guidelines to ensure that deployments balance the benefits of the technology with the potential intrusion on the public. “We want the public to have trust and confidence in the way we operate as a police service, and we take the report’s findings seriously,” said Detective Chief Superintendent Ivan Balhatchet, who led the trials. In its 10 trials of live facial recognition, Met Police used NEC’s NeoFace technology to analyse images of the faces of people on a watch list. The system measured the structure of each face, including distance between eyes, nose, mouth and jaw to create facial data, which was used to match against the watch list. The system only kept faces matching the watch list, and only for 30 days. Non-matches are deleted immediately. More accurate identification An independent review of the trials, commissioned by the Metropolitan Police, concluded it is ‘highly possible’ that the Met’s ‘trial’ deployments would not satisfy the key legal test of being considered ‘necessary in a democratic society’ if challenged in the courts, according to U.K. human rights advocacy group Liberty. South Wales Police have partnered with NEC to formally pilot facial recognition technology. NEC’s real-time solution enables trained officers to monitor movement of people at strategic locations. “Facial recognition technology enables us to search, scan and monitor images and video of suspects against offender databases, leading to faster and more accurate identification of persons of interest,” says Assistant Chief Constable Richard Lewis. “The technology can also enhance our existing CCTV network in the future by extracting faces in real time and instantaneously matching them against a watch list of individuals, including missing people.” U.K. human rights advocacy group Liberty has taken legal action on behalf of one Cardiff resident against South Wales Police Intrusive technology “We are very cognisant of concerns about privacy, and we are building in checks and balances into our methodology to reassure the public that the approach we take is justified and proportionate,” says Lewis. U.K. human rights advocacy group Liberty has taken legal action on behalf of one Cardiff resident against South Wales Police over its use of facial recognition. “Facial recognition is an inherently intrusive technology that breaches our privacy rights,” says lawyer Megan Goulding at Liberty. “It risks fundamentally altering our public spaces, forcing us to monitor where we go and who with, seriously undermining our freedom of expression.” ICO’s Denham says any judgment resulting from the legal action will form an important part of ICO’s investigation and will be considered before ICO’s final findings are published. Information management South Wales Police offers the following assurance: “Data will only be retained as long as is necessary for a policing purpose, as per guidance within the Authorised Policing Practice on information management.” Facial recognition systems are yet to fully resolve their potential for inherent technological bias" One concern is that live facial recognition ‘discriminates’ against women and people of colour because it disproportionately misidentifies them, thus making them more likely to be subject to a police attention. ICO’s Elizabeth Denham comments: “Facial recognition systems are yet to fully resolve their potential for inherent technological bias; a bias which can see more false positive matches from certain ethnic groups.” Taking regulatory action ICO has also considered data protection ramifications of commercial companies using LFR. Denham says: “The technology is the same and the intrusion that can arise could still have a detrimental effect. In recent months, we have widened our focus to consider use of LFR in public spaces by private sector organisations, including where they are partnering with police forces. We will consider taking regulatory action where we find non-compliance with the law.” A 27-page U.K. Home Office Biometrics Strategy sets out an overarching framework within which organisations in the Home Office sector will consider and make decisions on the use and development of biometric technology. However, Biometrics Commissioner Paul Wiles says the document “doesn’t propose legislation to provide rules for the use and oversight of new biometrics, including facial images. Given that new biometrics are being rapidly deployed or trialed, this failure to set out more definitively what the future landscape will look like in terms of the use and governance of biometrics appears to be short-sighted.”
Following a competitive tender process Corps Security has been awarded a three-year contract to provide security services to Registers of Scotland at Meadowbank House, in Edinburgh. A team of 10 officers will provide guarding services with a focus on front-of-house, customer service, CCTV monitoring and patrols. Like-minded organisation Registers of Scotland is the public body responsible for compiling and maintaining registers relating to property and other legal documents in Scotland. Mike Bullock, Chief Executive of Corps Security, said: “We are delighted to be working with such a like-minded organisation. Corps Security is a trust which was set up to provide employment for ex-servicemen returning from the Crimea. We share values with Registers of Scotland and look forward to working closely together.”
IP video intercom systems are becoming more popular not only in industrial environments but also in residential projects. Security business has moved towards IP technology. Video intercom, on the other hand, is a key system that should be considered as a link between the user and the security systems due to its integration capabilities. With MEET, it’s easy to integrate video surveillance systems and receive alarms at home. It can be integrated with third-party home automation systems and access control solutions. Face recognition, CCTV visualisation MEET system is a 100% IP technology based on a Point-to-Point infrastructure MEET, the most advanced IP system from FERMAX, was specially designed for residential communication. Secure, reliable and with cutting-edge functionalities, it ensures an outstanding high-quality audio & video, featuring call divert. Moreover, it is easy to install and maintain, with almost unlimited capacity. The system is a 100% IP technology based on a Point-to-Point infrastructure, highly efficient, flexible and powerful. As pointed out by Juan Madrid, Business Development Director and IP Product Manager at FERMAX, “MEET second-generation technology allows our customers to benefit from a top-notch 100% full IP system, even compatible with GPON infrastructure, and a broad range of built in security functions as proximity reader, lift control, face recognition, CCTV visualization and alarm detection”. Monitoring CCTV cameras The devices communicate directly, so MEET does not require central units or servers which could compromise the availability of the system in the event of an unforeseen error. MEET allows the installer to freely assign the range of IP addresses according to the needs of each project, and thus facilitate the control of the networks in every building. MEET system, has already been successfully adopted by FERMAX integrators worldwide MEET system, launched in January 2018, has already been successfully adopted by FERMAX integrators worldwide. “The market feedback has been very positive, especially due to the flexibility of the system, its capability to integrate with Wiegand controllers or readers and to monitor CCTV cameras through RTSP protocol. All these features allow the system to fulfil project requirements from different markets around the world” assures Francisco Alapont, Solutions Department Director and Digital Business at FERMAX. Home automation integration MEET is the system that brings to life the state-of-the-art digital panels which include a triple access control system: face recognition, keypad and proximity. The system’s range is made up of digital panels, one-button panels, touch screen monitors, concierge stations and various accessories. KIN panel, for instance, is an interactive approach featuring touch screen. While being elegant and customizable, it allows the visitor to interact in a simple way with its user interface. MILO panel and MEET Guard Unit are outstanding due to their design and intuitive interaction features. When it comes to the apartments, MEET offers indoor monitors with a simple and compact design. WIT PoE monitor, with its technology and exclusivity, is specially designed for home automation integration and suitable to fit in the most sophisticated environments; MIO monitor, is a symbol of urban and modern residences, represented by its compact and simple design. Single internet connection Our customers will benefit from a wide variety of intercom and security functions in all MEET products" Call Divert function to smartphone has been one of the key goals achieved thanks to MEET ME App, which features a high-resolution image even in portrait mode. It is not only an additional gadget; it is a part of the core features of MEET, which implements by default this function at zero cost. “Connectivity is the cornerstone of FERMAX´s strategy. With MEET system we can offer a seamless and enhanced experience to our installer, connecting our MEET monitors by default without any additional costs related to servers, gateways or licenses. Only one single Internet connection for the building is required.” adds Francisco Alapont. Competitiveness is key for FERMAX and MEET IP technology allows to offer a complete bundle of features already built in the product without increasing its price. “Our customers will benefit from a wide variety of intercom and security functions in all MEET products. This adds value to the MEET system and revert back to the installer as a turnkey solution in terms of easiness of installation and cost reduction” says Juan Madrid.
Comelit 4 camera wireless CCTV system has been selected on site at the iconic, Grade II listed Chichester Cathedral, to protect the retail area and provide 24x7 high-quality monitoring capability and extra peace of mind for staff. Wireless CCTV surveillance This magnificent Cathedral has stood at the centre of Chichester for over 900 years. With unique architecture from each century of its life, this Cathedral is both ancient and modern, where original medieval features sit alongside world famous contemporary artworks. Any works needed to consider the sensitivities of working in such a historic building. A representative from Chichester Cathedral commented, “When it came to upgrading CCTV for the retail area, we contacted Envisage Technology Ltd who recommended Comelit’s 4 camera wireless CCTV system. It has proven to be the perfect solution, with the system proving simple to install. Staff now have access to monitors by the till points that also act as a significant visual deterrent. The high-quality images available add extra peace of mind.” Four camera wireless CCTV Kevin Brown, Managing Director, Envisage Technology added, “Chichester Cathedral is one of the most prestigious visitor sites in West Sussex. Comelit’s wireless CCTV specification, coming from such a renowned brand, provided the necessary infrastructure to embrace the need for delicate installation, minimising the need to run cables, and still provide the high-quality footage. We can support the ongoing maintenance process to ensue volunteers, customers and staff are kept safe and secure.” Comelit’s simple four camera wireless CCTV system provides a clear, detailed and well-defined high-resolution image Comelit’s simple four camera wireless CCTV system provides a clear, detailed and well-defined high-resolution image. Installed outside of opening hours to avoid disruption to the retail environment, monitors were positioned directly by the till points, enabling staff to have full visual access of the complete area at all times. Retail surveillance Tim Edmonds, Comeilt CCTV Manager concluded, “The retail area, established in such a significant Cathedral is a great example of how Comelit’s wireless CCTV system can be used to protect any environment.” “Working with Envisage, the solution was presented as a simple, yet effective option, installed with absolutely no impact on the surrounding building. The result is a powerful visual deterrent and peace of mind that staff in store, and in back offices can keep an eye on operations quickly and easily, on a 24x7 basis.”
New Covent Garden Market is the largest wholesale fruit, vegetable, and flower market in the United Kingdom. Redevelopment work launched in 2015 included a new security monitoring system, as well as a migration from analogue security equipment to an IP solution from FLIR Systems. New Covent Garden Market is a phenomenon in London, to say the least. The world-famous wholesale market provides 40 percent of London’s fresh fruit and vegetables eaten outside the home and serves 75 percent of London’s florists. With more than 175 affiliated businesses, New Covent Garden Market is the largest wholesale market in the UK. IP-based security system Redevelopment construction works started in 2015 and should continue until 2022 When London authorities decided to redevelop the entire site on Nine Elms and Battersea in order to meet future needs, it was clear that New Covent Garden Market was facing a huge operational challenge. Redevelopment construction works started in 2015 and should continue until 2022. In addition to a better road layout, improved waste management, and upgraded parking facilities, the market authorities wanted better security so that employees, tenants, customers and suppliers would feel safer. The organisation wanted to upgrade its legacy analogue CCTV technology to an IP-based security system capable of incorporating future upgrades. Surrey-based company Phoenix Integrated Security Limited, which had been the security solution provider for New Covent Garden Market for years, oversaw the security overhaul, as well. Future-proof system “We designed a security system together with the end customer and the site constructor so that it could meet today’s security standards again,” said Trevor Hearn, Director at Phoenix Integrated Security Limited. “We were looking for a future-proof system that was able to monitor this complex site and that was easy to work with for our security guard personnel. We looked at various manufacturers for this, but FLIR Systems was the only company that ticked all the boxes.” Phoenix opted for FLIR United VMS, which includes FLIR’s enterprise-level software solution Latitude, and a wide range of FLIR IP cameras. At the end of 2018, New Covent Garden Market already had more than 300 IP cameras installed across the entire site it intends to gradually upgrade all analogue systems over a five-year period. Wide range of cameras The image quality of the FLIR IP cameras represents a huge improvement over analogue The site combines a wide range of cameras, including the FLIR Quasar 4K fixed box camera, the FLIR Ariel Quad HD bullet camera, and the Quasar 1080p PTZ camera. The cameras offer high evidentiary detail and discreet, compact form factors. According to Hearn, the image quality of the FLIR IP cameras represents a huge improvement over analogue. Image quality is not the only benefit of using United VMS. Another valued feature is the platforms scalability. From 2016 onwards, New Covent Garden Market has been gradually replacing analogue cameras and storage equipment across the entire site, and Latitude has the flexibility to incorporate an unlimited number of channels. Body-worn cameras Operators have the flexibility to present their video sources on screen where they want and define user profiles to see only specific video sources from a given particular building, for example. “This project is an engineer’s dream,” said Hearn. “The FLIR Latitude system allows New Covent Garden Market to easily expand their camera network whenever they feel the need and to connect with practically any camera they want, including body-worn cameras. The Latitude system is also easy to couple with third-party systems, such as intercom and access control systems.”
K9 Fuels are a family run, fuel distribution business providing an efficient and customer focused service in and around Lincolnshire. Since moving to their new premises on an industrial site, they weren’t able to leave their fuel trucks in the yard because of constant break-ins and theft. CCTV was installed but wasn't enough of a deterrent. Seeing a Gallagher monitored pulse fence at nearby TC Harrison, K9 Fuels wanted more information on how a similar system could benefit them. Monitored building alarm A simple stand-alone, four zone system linked to their existing monitored building alarm was installed. There is potential to upgrade this to a network based system, using the same F32 fence energisers, if the company expands. System height is 3.0m (32 wire), with a fence length of approximately 200 metres including one sliding gate and one double leaf gate. The break-ins stopped after the monitored pulse fence was installed and K9 Fuels are at ease knowing that their premises are monitored and protected 24 hours a day.
AT Brown (Coaches) Ltd is a premier coach company based in Telford, England that has been operated by the same family for over 100 years. After moving to larger premises in the town’s Hortonwood Industrial Estate in 2005, AT Brown began suffering from constant diesel theft. Installing a Gallagher monitored pulse fence stopped the thieves overnight. Despite having installed CCTV cameras and employing mobile patrols, AT Brown owner Ewen MacLeod says the diesel theft problem continued for the first eight years on the new site. “Thieves were coming through the security fence and syphoning fuel out of the coaches. The investment in CCTV cameras and mobile patrols wasn’t paying off.” Perimeter security solution Gallagher Security partnered with SPG Security Systems UK Ltd to provide a perimeter security solution that would let AT Brown get back to running their business. A Gallagher monitored pulse fence was installed around the whole site, including the large double leaf access gates. The monitored pulse fence was easily retrofitted to AT Brown’s existing security fence, making it a cost-effective option that could be quickly installed without any disruption to the business. SPG and Gallagher very quickly got to know what our requirement was and installed it around us" “SPG and Gallagher very quickly got to know what our requirement was and installed it around us,” says Ewen. “There was no impact whatsoever on us running the business.” Gallagher Security strategic business development manager Kevin Godfrey says the monitored pulse fence provided deterrence and detection for the whole site. Building alarm system “It’s a really simple, effective solution that has negated the need for guard patrols and a CCTV system.” The fence can be armed or disarmed with the building alarm or a keypad, and any break-ins are notified on a phone, through the building alarm system. Since the monitored pulse fence was installed in 2013, there have been no further incidents at AT Brown. The fence provides a powerful visual and practical deterrent to would-be thieves, preventing further break-ins and resulting in happy staff, and children getting to school on time in the mornings. “Everyone feels more secure, which is a very important factor,” says Ewen. “Now we can just carry on running our business the way we want to.”
Round table discussion
When it comes to security and to ensuring the integrity of gaming operations, today’s casino market is risk-averse. Regulations direct the required surveillance of table games and slot machines, while modern casinos are often sprawling complexes that have a variety of other risks to be addressed, too. We asked this week’s Expert Panel Roundtable: What are the challenges of the casino market relating to security and surveillance technology?
Physical security technologies operate successfully in many different markets, but in which markets do they fall short? Physical security is a difficult challenge that can sometime defy the best efforts of manufacturers, integrators and end users. This is especially the case in some of the more problematic markets and applications where even the best technology has to offer may not be good enough, or could it be that the best technology has not been adequately applied? We asked this week’s Expert Panel Roundtable to reflect on instances when the industry may fall short: Which segments of the physical security industry are most under-served and why?
In the simplest terms, video systems capture and record video. But supporting these basic operations are a growing number of other functions that expand usefulness and the ability to interact with related elements in a larger system. As video system functionality expands, we asked this week’s Expert Panel Roundtable: What is the most important function of a CCTV system and why?
CCTV surveillance: Manufacturers & Suppliers
- Dahua Technology CCTV surveillance
- LILIN CCTV surveillance
- Visionhitech CCTV surveillance
- Bosch CCTV surveillance
- Hikvision CCTV surveillance
- Hanwha Techwin America CCTV surveillance
- Bolide CCTV surveillance
- Vicon CCTV surveillance
- Arecont Vision CCTV surveillance
- FLIR Systems CCTV surveillance
- eneo CCTV surveillance
- Videcon CCTV surveillance
- Geutebruck CCTV surveillance
- Vanderbilt CCTV surveillance
- Sony CCTV surveillance
- videotronic infosystems CCTV surveillance
- Panasonic CCTV surveillance
- Pelco CCTV surveillance
- Videotec CCTV surveillance
- GBC CCTV surveillance