The Z-Wave Alliance, a global membership organisation dedicated to advancing the popular Z-Wave wireless smart home protocol, will host the Z-Wave Pavilion at ISC West 2019 in Las Vegas, with Alliance members introducing and demonstrating their latest Z-Wave solutions. The Z-Wave Alliance offers security dealers and integrators the opportunity to interact with the latest Z-Wave technology in one central location as well as network with manufacturers that are leading the global smart home and IoT...
Hanwha Techwin Europe has further strengthened its Wisenet T Thermal camera range with the introduction of three new radiometric thermal models, each of which have a temperature measurement feature. The Wisenet TNO-4030TR, TNO-4040TR and TNO-4041TR are able to accurately detect if the air temperature is higher or lower than set parameters, e.g. above or below 40°C. They have been designed to help monitor areas which are vulnerable to fires, such as oil and chemical facilities, construction...
Recent technology advances – from the cloud to artificial intelligence, from mobile credentials to robotics – will have a high profile at the upcoming ISC West exhibition hall. Several of these technologies were recently designated by the Security Industry Association as the Top 8 security technologies for security and public safety. Some of them will also be a focus at the ISC West conference program, SIA Education@ISC, April 9-11 at the Sands Expo Center. This article will highligh...
ISC West in Las Vegas is the first of several major security trade shows planned for 2019 as part of the Reed Exhibitions ISC Security Events portfolio. Next up will be Expo Seguridad México in May in Mexico City, followed in June by ISC Brasil in Sao Paolo, and ISC East this fall in New York. Expo Seguridad México, May 7-9, will serve the important Mexican market for security goods and services. In Mexico City alone, a large population translates into plenty of buildings and fac...
Akuvox is pleased to announce its Android indoor monitor series were proven compatible with Savant smart home systems thanks to their openness and ease of integration. The integration is easily done by simply downloading and installing the Savant Pro app on Akuvox’s smart indoor monitor. Home automation services and intercom features The successful interoperability enables users to enjoy both home automation services and intercom features home automation services and intercom features,...
ReconaSense announces the latest release of its A.I. powered security platform for life safety and physical security, featuring risk adaptive access control and new IoT and building automation integrations that enable the secure flow of people, processes and information while keeping risks at bay. Digital transformation has increased the volume, variety and velocity of physical security event data being collected and stored, increasing the complexity of potential security risk factors as well a...
The new Wisenet TNV-7010RC 3 megapixel corner mount camera manufactured by Hanwha Techwin has been designed to meet the requirements of police, prisons and mental health institutions where there is a duty of care to prevent inmates and patients from self-harming. The Wisenet TNV-7010RC has a built-in 940nm IR emitter which projects infrared light up to 10 metres at a higher wavelength than traditional red glowing IR lighting. This is invisible to the human eye and avoids the risk of disturbing those sleeping in secure rooms. The true day/night camera which is able to capture clear, sharp colour images when the light levels are as low as 0.3Lux, also features Wide Dynamic Range (WDR), which performs at up to 120dB, to accurately produce images in scenes that simultaneously contain very bright and very dark areas. IK10+ vandal resistant camera The camera is IK10+ vandal resistant and has ingress protection rated at IP66 and IP6K9K"“Sadly, there are inmates and patients who try to self-harm and with this in mind, the corner mount housing of the Wisenet TNV-7010RC has been built to make it impossible for anyone to tie a ligature around it provided it is properly installed,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. “A lot of thought was also applied to the design of the housing to ensure it is sufficiently robust for secure room environments. It is, for example, IK10+ vandal resistant and has ingress protection rated at IP66 and IP6K9K, as well as a shock detection feature to alert control room operators if anyone is trying to damage it.” To protect an inmate or patient’s privacy, masking zones can be configured precisely over a specific area of the camera’s field of view, whilst a built-in microphone and audio support facilitates two-way communication. Additional features of the camera A ‘Hallway View’ provides a highly effective way to monitor narrow vertical areas such as corridorsThe multi-streaming H.265 Wisenet TNV-7010RC has a long list of additional features which will benefit operators monitoring the open areas of police, prisons and mental health institutions. These include a built-in suite of analytics such as Tampering, Loitering, Directional Detection, Defocus Detection, Fog Detection, Virtual Line, Enter/Exit, Appear/Disappear, Audio Detection, Face Detection, Motion Detection, and Sound Classification. A ‘Hallway View’ provides a highly effective way to monitor narrow vertical areas such as corridors as it enables cameras which can generate images in the 9:16 x 3:4 aspect ratio, to work effectively in tall and narrow spaces.
Maxxess Systems continues to drive the virtualisation of the physical security industry with the development and implementation of the industry’s most advanced enterprise level situational awareness and response coordination solutions. Enhancing Maxxess Systems’ momentum is the recent introduction of Maxxess InSite Awareness and Response Coordination System which meshes ‘system intelligence’ and ‘human intelligence’ to deliver an entirely new category of physical security and communications solution on a unified, easy to operate platform. Maxxess InSite joins the company’s highly touted eFusion Security Management Software and Ambit Communications Software, which are presently installed in thousands of facilities around the globe by many of the world’s leading brands. Developing sophisticated software solutions The solutions aren’t just evolutionary in nature, they’re revolutionary with new benchmarks in situational awareness, communications and personnel coordination"“Over the last decade, our focus has been on developing highly intuitive, integrated solutions for high-profile clients,” said Nancy Islas, President of Maxxess Systems, Inc. “This has allowed us to develop highly sophisticated software solutions based on the needs of high-profile users around the world. The resulting solutions we’ve developed aren’t just evolutionary in nature, they’re revolutionary with new benchmarks in situational awareness, communications and personnel coordination.” High-profile users of Maxxess Systems’ solutions include: the Alshaya Group, an international franchise operator with over 90 globally recognised brands; CAE, the pioneer in training for the aviation, defence, security and healthcare industries; Meraas, a developer of residential and commercial space in Dubai; Banco Central de Reserva del Peru, which mints and issues metal and paper money in Peru. Coppel, one of the largest retailers of clothing and household goods across Mexico; Regus, one of the world’s largest providers of flexible workspace; UDR, a real estate investment trust company in the US; the highly prestigious London School of Economics, and more than 50 companies in the renowned Emirates Group, among many others. Core software platforms Maxxess InSite combines ‘system intelligence’ and ‘human intelligence’ to detect and respond to unfolding events in real-timeThe Maxxess Systems portfolio is built on the following core software platforms: Maxxess InSite Awareness and Response Coordination System combines ‘system intelligence’ and ‘human intelligence’ to detect and respond to unfolding events in real-time – all of which is queued, organised and displayed on a highly-intuitive user interface. In doing so, Maxxess InSite truly enables early action, allowing IT, Operational Technology and Physical Security departments within organisations to correlate data, improve response coordination, and deal with issues when they’re small – before they become large and costly. Maxxess InSite features an open-architecture framework to accommodate virtually any security or business intelligence application with comprehensive functionality. Over 50 different leading manufacturers are already integrated into Maxxess InSite, providing more combined capabilities and functionality than any other cross-platform solution available. This allows Maxxess InSite to be configured for virtually all applications, employing any combination of software modules and hardware to deliver each user with a highly-customised solution and unparalleled efficiency. eFusion provides video and access system management and control capabilities along with alarm monitoringeFusion Security Management Software is a ‘system intelligence’ solution that integrates and correlates data from surveillance, access control and various other physical security related inputs onto a comprehensive monitoring and reporting dashboard. eFusion provides video and access system management and control capabilities along with alarm monitoring, access credentials tracking/authorisation/de-authorisation remotely, door status and more. eFusion can be deployed as a stand-alone control platform, or as a core component of Maxxess InSite. Ambit Communications Software is a ‘human intelligence’ solution that provides security managers communication and location knowledge for remote personnel through their personal devices for alerts, notifications, status assessment and access management. Ambit can be deployed as a stand-alone communications platform, or as a core component of Maxxess InSite. “The recent release of Maxxess InSite is the result of many years of software development and is based on the proven performance of our security and communications solutions,” continued Ms. Islas. “With the introduction of InSite, Maxxess Systems is bringing a completely new and unparalleled security and communications enterprise solution to the security marketplace.”
A landmark range of inexpensive, high-performance 2MP cameras has been launched by IDIS, for applications that demand zero-compromise surveillance quality within a tighter budget. The new value range includes both full HD dome and bullet cameras and still comes with many of the high-end features found in IDIS’s best selling products - including analytics, superior night time image capture, protection against image data loss as well as dual codec combined with IDIS Intelligent Codec to deliver significant bandwidth and storage savings. Varied lighting conditions The cameras deliver superior picture quality even at night, with IR image capture, and True Wide Dynamic Range (WDR) in varied lighting conditions Premium features built into the new range include IDIS Smart Failover as well as video motion detection, active tampering alarm and trip zone analytics which are not normally found at this price point. The cameras deliver superior picture quality even at night, with IR image capture, and True Wide Dynamic Range (WDR) in varied lighting conditions. Users also benefit from significant savings in storage, with IDIS Intelligent Codec dual H.264/H.265 technology delivering up to 90% reduction in bandwidth demand without any need to upgrade existing monitors and hardware. And for integrators, the cameras have been developed with ease-of-installation as a priority. The 3-axis mechanical design ensures more flexibility in mounting, and faster system set-up is achieved using DirectIP NVRs and PoE. Continued data capture IDIS, which is the largest manufacturer of surveillance technology in South Korea, says the new range is targeted at small-to-medium surveillance challenges, including security and health & safety, in commercial applications such retail, offices and residential blocks. In these applications, protection against image loss and gaps in recording are important so the cameras also feature IDIS Smart Failover technology. This guarantees continued data capture during a wide range of potential fault conditions, such as network instability, failover or recorder failure This guarantees continued data capture during a wide range of potential fault conditions, such as network instability, failover or recorder failure, ensuring that recordings are automatically updated without any gaps once the fault is resolved. Crystal clear images "Up until now customers have often only used Failover technology on the most critical cameras, because of the requirement for additional kit and the associated extra cost," says Harry Kwon, General Manager of IDIS Middle East and Africa. "However, with this new range they can extend Failover protection system-wide, with high quality video capture now an affordable option across all cameras." “Even with their value pricing they provide crystal clear images for live viewing, excellent recording performance and with all the advantages of high-end features as well as analytics.” The new range is among a number of important launches from the company at this year’s Intersec show in Dubai.
Matrix Comsec confirmes it will be hosting its maiden event Insight in Philippines on 24th January 2019. Solution experts will be exhibiting innovative unified communication, video surveillance, access control and time-attendance solutions at the event. They will also be highlighting the benefits of partnering with Matrix for the attendees. Matrix is well-known for its indigenous and innovative range of solutions for IP video surveillance, access control, time-attendance and unified communications. All our solutions are specifically designed to meet the imminent needs of large, multi-location enterprises, SME and SMB organisations. Typical deployment scenarios Matrix Comsec continuously works towards keeping abreast with the constantly upgrading technology by designing and manufacturing solutions that are equipped with the latest technology. Matrix solution experts will be explaining in detail our enterprise grade unified communication and security solutions at the Matrix Insight. Matrix Unified Communication, Video Surveillance, Access Control and Time-Attendance solutions will be key highlightsMatrix unified communication, video surveillance, access control and time-attendance solutions will be key highlights at the Matrix Insight Philippines. The solution experts will provide insights on key solution benefits, typical deployment scenarios, success stories and technology framework of our solutions. Matrix team will also explain how Matrix partners benefit in terms of growth, differentiated products, profit margins and OEM support. Automated cafeteria NVRX - The recently launched extreme series of Network Video Recorders will be exhibited at the event. These recorders come with 4K decoding capacity, allowing viewing high resolution live feed. IP cameras – Matrix IP cameras are equipped with the H.265 compression technique which saves up to 50% on storage space. Video Management System – The video management system of Matrix assists in centralised command and control of the entire surveillance. Time-attendance – Matrix time-attendance solutions allows organisations to collect and manage accurate attendance data of employees. Access control – Matrix access control solutions enhances security of organisations and meets their requirements irrespective of its size, layout, locations and timings. Cafeteria management – The solution offers automated cafeteria process right from placing an order to payment. Unified communication – This enterprise grade communication solution offers collaboration, communication, messaging and mobility. Network management solution – Matrix will be exhibiting its all-in-one solution for centralised control of every connected Matrix communication server and gateway within a single network. Video conferencing solution – PARISAT VC - the enterprise meeting solution sets a new benchmark by offering enhanced video and voice capabilities. Standard market requirements “Philippines is a growing market and a potential foothold for Matrix Comsec to spread its footprints. Our products meet the standard market requirements of the Philippines market. Moreover, Matrix Insight has served as a great platform for understanding the local market, study current and upcoming trends and design our solutions accordingly.” “We aim to expand our network and get a foot into the Philippines market”, commented Ganesh Jivani, MD Matrix Comsec.
Security expert Abloy UK is highlighting the importance of access control systems that offer dynamic lockdown, following recent reports that retail stores are being advised by counter-terror police launching the Protect and Prepare campaign, to develop emergency contingency plans recommending a 'sixty second' security checklist to avoid panic during reports of terror attacks. High street shops throughout the country hit their busiest period during Christmas. With large numbers of people around, counter-terror police are providing stores with a security checklist that can be implemented in sixty seconds to prevent widespread panic in terror or emergency situations. Threat awareness and preparedness To improve reaction times and ensure evacuations can take place as smoothly as possible, staff should know who is in charge of emergency plans, when it is appropriate to evacuate a store, when to order a lockdown, and the best places to hide in the event of an attack. An effective way for retailers to be prepared for such a threat is with Dynamic Lockdown An effective way for retailers to be prepared for such a threat is with Dynamic Lockdown, which is the ability to provide for basic life safety in the event of such eventualities as a terror attack or other unforeseen threats. It offers the capability to compartmentalise buildings and sites by controlling the flow of people by preventing access to unauthorised intruders, providing real physical security from the secure side of the door, while also allowing exit and escape where required. This can have vital importance in protecting members of the public by preventing access for threats to enter a building but at the same time allowing them to leave the building if necessary. Dynamic Lockdown applications With this in mind, Abloy UK has developed solutions that can provide for Dynamic Lockdown for a wide range of applications. For the retail sector specifically, Abloy systems are available to secure doors between public and non-public areas and exits from main staff areas. Products include Abloy’s range of compliant electric locks and the Escape Door System (EDS). Abloy continuously promotes the importance of emergency escape systems with free training on standards" Electric locks - such as the Abloy EL560 solenoid lock and EL520 motorised lock - work by controlling either the latch or the handle, or by motorising the bolt back once a proximity card is presented or a request to exit device is used. This ensures that only authorised personnel are able to gain access to the building, and the system will prevent any unauthorised persons from entering. Fail-unlocked locking element What’s more, the EDS offers blocking with a fail-unlocked locking element that does not require any mechanical input to operate, and intelligent control that allows connection to fire alarm systems or other building control systems to ensure escape in an emergency. The Trigger unit incorporates a key-switch and a push button that tells the controller to release the locking mechanism to allow safe escape. Pat Jefferies, Commercial Director at Abloy UK, commented, “This is a superb initiative by counter-terror police as it will make retailers more proactive and able to respond faster to potentially life-threatening events. Egress from a building can be a matter of life and death, so here at Abloy we continuously promote the importance of emergency escape systems with free training on standards and compliance via our Academy.”
This Christmas the risk to retailers’ margins from theft is greater than ever before, according to the Lodgic Intelligence Centre. The escalated threat results from three factors: increased activity by organised criminal gangs; reduced security staffing resulting from the hike in the minimum wage; and a decline in the response to shoplifting by the police - who may be unwilling to respond to the theft of items worth less than £200. Operating nationally Close to 80 percent of retail losses from crime result from ORC (Organised Retail Crime), committed by some 140 criminal gangs currently operating nationally, according to analysis at Lodgic, which is operated by security consultants Lodge Service. Shop staff are often distracted and many of the temporary personnel hired for the season are often poorly trained in detecting Gangs feel they can operate almost with impunity at Christmas. Their activities are hidden by large crowds in busy stores and shopping centres. Shop staff are often distracted and many of the temporary personnel hired for the season are often poorly trained in detecting and preventing the threat from shoplifters. But few retailers are aware of the scale of the problem from ORC. Often this is because seemingly small, isolated incidents are in fact related. Suspect transactions Criminals keep coming back to what they see as a soft target - and then heading off to another branch, perhaps in another city, to avoid detection. To counter gang activity, analysts at Lodgic intelligence centre are using data mining systems, working with a retailer’s on site and headquarter teams to investigate losses and track patterns of criminal behaviour. They can then link incidents to identified thieves, who usually have a string of aliases. The analysts look back at all suspect transactions to check names, addresses, dates, card details, locations, and other statistics. This data is used together with national crime reports, whistleblower and other sources, so they can anticipate where the criminal gangs are most likely to strike next. Unmanned checkouts The Lodgic intelligence centre then deploys store detectives on a daily basis to anticipate and stop crimes. Teams are trained to work undercover to identify criminals and undermine each threat to a store, shopping centre or logistics chain and then initiate a police arrest. Unmanned self-service checkouts are a recipe for shoppers to help themselves - according to research at Lodgic Britons are stealing £3.2 billion worth of goods from self-service tills each year. Unmanned self-service checkouts are a recipe for shoppers to help themselves - according to research at Lodgic. Almost 25 percent of people sampled in one survey admitted to stealing at least one item without paying. Another study shows theft from unmanned checkouts has more than doubled in the past four years. Detecting scan-avoidance Significantly, 40 percent of those who admitted to stealing said the reason was that they knew they could get away with it. With domestic budgets squeezed this Christmas, there is a sharp increase in incidents. The technology for detecting scan-avoidance is getting the full attention of the total loss community. This includes systems like Transpeye, that links transaction data with video and other systems, so that managers on site or located remotely get automatic alerts, supported by filmed evidence, when an ‘exception’ occurs. But current technology still might not be enough to protect the retailer facing this type of threat this Christmas. Costs of protection Problems include monitoring a transaction to see if a low value item is scanned but a higher priced product is bagged and taken from the store. Surveillance and analysis at the point of sale to confirm a physical match is a particular challenge. Any protection has to be proportionate. Losses must be measured against the costs of protection, including having more staff on the premises to either serve customers or observe. This is a key issue in 2018 and beyond with the increase in the minimum wage and other inflationary wage costs. A further strategy to consider is to train customers to stay honest, according to Lodgic. Fraudulent activity Clearly when people believe that they are not observed and unlikely to be stopped and questioned then the likelihood of theft increases Clearly when people believe that they are not observed and unlikely to be stopped and questioned then the likelihood of theft increases. A single incident of theft can develop into a habit for an otherwise honest customer. Strategies can include managing live transactions remotely, with supervisors monitoring and looking for patterns of behaviour that indicate fraudulent activity at the point of sale. Already with Transpeye software there is the capability to do this, with internet connection of video and data to the Lodgic intelligence centre. Measures might also feature further changes to store layouts and use of a range of behavioural cues and signals to increase the customer’s sense of being observed. This remedy might not be in time for Christmas this year, but perhaps it should be in a New Year’s wish list.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood management assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental control assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway management and parking assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper experience assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognise and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing business intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A natural cross-over technology This trend towards integration has forever changed how organisations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyse what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalise on that connection is only limited by our imagination.
Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2018. Looking back at the top articles of the year provides a decent summary of how our industry evolved this year, and even offers clues to where we’re headed in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2018 that generated the most page views. They are listed in order here with a brief excerpt. 1. U.S. President Signs Government Ban on Hikvision and Dahua Video Surveillance The ban on government uses, which takes effect ‘not later than one year after … enactment,’ applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. The bill calls for an assessment of the current presence of the banned technologies and development of a ‘phase-out plan’ to eliminate the equipment from government uses. 2. Motorola Makes a Splash with Avigilon Video Surveillance Acquisition Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as ‘a natural extension to global public safety and U.S. federal and military’ applications, according to the company. 3. Impact of Data-Driven Smart Cities on Video Surveillance One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyse data on large crowds at sporting events The IoT already accounts for swaths of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency 4. CES 2018: Security Technologies Influencing the Consumer Electronics Market Familiar players at security shows also have a presence at the Consumer Electronics Show (CES). For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? 5. SIA Predicts Top Physical Security Trends for 2018 Traditional security providers will focus more on deepening the customer experience and enhancing convenience and service. The rise of IoT also places an emphasis on cybersecurity, and security dealers will react by seeking manufacturers and technology partners with cyber-hardened network-connected devices. 6. High-Speed Visitor Screening Systems Will Improve Soft Target Security The system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. 7. How to Prevent ATM Jackpotting with Physical and Cyber Security A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and, in the last several months, the United States. Rough estimates place the total amount of global losses at up to $60 million. The safety and security world bring a complex problem to solve- how to pick out a face in a moving and changing environment and compare it to several faces of interest 8. Why We Need to Look Beyond Technology for Smart City Security Solutions Although technology is necessary for an urban area to transition in to a safe and smart city, technology alone isn’t sufficient. Truly smart cities are savvy cities and that includes how they employ software, sensing, communications and other technologies to meet their needs. 9. How New Video Surveillance Technology Boosts Airport Security and Operations Employing airport security solutions is a complex situation with myriad government, state and local rules and regulations that need to be addressed while ensuring the comfort needs of passengers. Airport security is further challenged with improving and increasing operational efficiencies, as budgets are always an issue. As an example, security and operational data must be easily shared with other airport departments and local agencies such as police, customs, emergency response and airport operations to drive a more proactive approach across the organisation. 10. The Evolution of Facial Recognition from Body-Cams to Video Surveillance The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve.
Governments and corporations face crisis events every day. An active shooter terrorises a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective response plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyse. Assessing threats for prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualise all this intelligence data within the context of an organisation’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social media monitoring Free tools like Google Maps or satellite imagery from organisations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis.Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organisations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating a threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualised on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organisations or communities they are protecting Acting and automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organisations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon security guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralised within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis of a threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate emergency response Virtually every organisation has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyse. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimise the impact by improving visibility, collaboration and response.
Security is arguably at the heart of the United States partial government shutdown: President Trump’s demand for $5.6 billion to start building a wall along the southern border with Mexico is the major bone of contention as gridlock in Washington prevents passage of a spending bill to keep the government in full operation. The partial government shutdown has affected security in other ways, too, and some of the impact could continue long after the impasse is settled. Some 800,000 federal employees are impacted, some on full or partial leave as a result of the shutdown and others working without knowing when they will get paid. Cybersecurity initiatives delayed Furloughed federal employees tasked with cybersecurity are not on hand to address the constant threat to government IT systems from possible hackers and other bad actors. In fact, hackers may decide the government shutdown is a vulnerable time to launch an attack. Data capture form to appear here! Hackers may decide the government shutdown is a vulnerable time to launch an attack Specifically, the new Cybersecurity Infrastructure Security Agency, launched last fall, is operating with a skeleton staff. If the shutdown encourages cybersecurity experts to seek other employment, the resulting drain of “knowledge capital” could be a lasting detriment. New cybersecurity initiatives are also being delayed, such as the 21st Century Integrated Digital Experience Act, aimed at creating a baseline of security defense across government web sites. Some government websites have had their Transport Layer Security (TLS) encryption certificates expire during the shutdown. Impact on TSA agents Although Transportation Security Administration (TSA) agents remain on the job at major airports, they will not be paid again until after the shutdown is over. The resulting negative impact on morale has arguably slowed down airport security operations, although airports have not reported any major problems. In addition, some agents have called in “sick” and/or sought other employment to provide income during the shutdown. In the Dallas-Fort Worth airport, the number of agents calling out sick reportedly increased by 200% to 300%. The absences can aggravate existing TSA staffing shortages. Impact on border protection agents Customs and border protection agents are also on the job with no assurance of when they will be paid. Other immigration agents in the Department of Homeland Security are also currently without pay. Hearings on immigration cases are being canceled, which can result in a large backlog to be addressed after the shutdown ends. Customs and border protection agents are also on the job with no assurance of when they will be paid What about worker documentation? A consequence of the shutdown is unavailability of the government’s E-Verify system, which is used to verify a worker’s immigration status prior to being hired by an employer. During the lapse in government appropriations, employers will not be able to access their E-Verify accounts, create an E-Verify case, edit company information, terminate accounts, run reports, etc. Long-term impact on government employment The longer the shutdown continues, the more employees will be encouraged to seek work elsewhereThe shutdown may lead federal employees to seek work in the private sector, where their paycheck is not likely to be delayed because of a political impasse. The longer the shutdown continues, the more employees will be encouraged to seek work elsewhere, whether on a temporary basis or as a permanent alternative. Manpower shortages can translate into security risks. Trump has argued for funding of the border wall on security and humanitarian grounds and has sought to put pressure on newly empowered Democrats. However, adding physical barriers at the border is only part of the solution to border security, says the conservative Heritage Foundation. Also needed are improved technology to monitor the border and appropriately equipped border patrol agents. Holistic approach to border security This holistic approach of combining barriers, technology, and people is the cost-effective way to secure the border, says Heritage Foundation. It’s also important to enforce immigration laws, and border security does nothing to stop visa overstays, another source of illegal immigration. The Democratic opposition has said Trump’s urgent call to build the wall is a “manufactured crisis,” and the wall would be “immoral” and “ineffective.” Weeks into the impasse, there is no end in sight.
Security is among the defining topics at the Consumer Electronics Show (CES) 2019 this week in Las Vegas. More than 4,500 exhibiting companies are participating, including some 1,200 startups, highlighting the next wave of innovation in consumer electronics – and security. Twenty-four product categories at CES feature solutions to transform how consumers live, work and play. Technologies being highlighted include 5G connectivity, artificial intelligence (AI), augmented and virtual reality, smart homes, smart cities, and machine intelligence. Video is an important element at CES. This year, the focus is on intelligent video. For example, Eyecloud.ai, Santa Clara, Calif., is displaying a home security camera with on-device face recognition that uses AI. Powered by a 12-core Intel Movidius VPU (video processing unit), the camera combines AI-on-the-edge with easy setup and wirefree operation for up to six months per battery charge. On-device artificial intelligence On-device AI is the next big trend in smart home surveillance, and deep neural networks will drive the future of do-it-yourself home automation SimCam, an Intel partner, demonstrates how the Intel Movidius VPU can turn a security camera into ‘the ultimate vision-based sensor’. On-device AI is the next big trend in smart home surveillance, and deep neural networks will drive the future of do-it-yourself home automation. A variety of other residential video systems are also on display at CES. For example, Swann Security is displaying 4K wired security systems featuring Google integration, a wireless smart security camera with True Detect heat-based PIR (photo infrared) motion detection, a video doorbell and chime with two-way talk, and indoor and outdoor wi-fi cameras with Alexa integrations. Intelligent automotive solutions Camera system-on-chip (SoC) company Ambarella is introducing the new CV25 camera SoC at CES. It combines advanced image processing, high-resolution video encoding and CVflow computer vision (video analytics) processing in a single, extremely low-power design. The CVflow architecture provides Deep Neural Network (DNN) processing required for a new generation of affordable and intelligent home monitoring, professional surveillance and aftermarket automotive solutions. CV25 offers half the performance of Ambarella’s previously released CV22 chip, but the new chip’s lower cost will bring intelligent cameras to a price point desirable for home systems. All Ambarella’s chips have hardware-based cybersecurity. A suite of advanced cybersecurity features protects against hacking, including secure boot, TrustZone, and I/O virtualisation. Based on 10nm ultra-low power processing technology, the CV25 chip is optimised for wirefree cameras applications that require long battery life and small form factors. Camera system-on-chip (SoC) company Ambarella is introducing the new CV25 camera SoC at CES Virtual security guards Elsewhere, the Deep Sentinel home security system applies video and AI to predict residential break-ins ‘before they happen’. The Pleasanton, Calif.-based tech startup uses ‘AI-infused security cameras’ to keep an eye on your home. Three wireless 1080p full HD cameras provide night vision and PIR motion sensing, connected by a smart hub. Using proprietary artificial intelligence, the cameras act as virtual guards, watching activity around a house and providing alerts to situations that may lead to burglaries, break-ins, package thefts and other dangers. My Safe Patrol is an AI-driven platform that analyses data aggregated from security personnel, citizen alert systems and IoT smart devices, and responds with geolocated alerts in real-time. My Safe Patrol effectively supports the security/safety ecosystem of a building, a campus, a city or a district through a dynamic dashboard that helps command and control operations manage and deploy security plans. AI-integrated devices Showcased solutions include Smart Living integration of video surveillance applications to enable real-time two-way audio and video streaming simultaneously MicroVision, Redmond, Wash., showcases an interactive display engine for AI-connected devices, providing an integrated solution for projected display and interactivity through multi-point touch and air gestures. MicroVision’s new consumer 3D LiDAR engine provides high-fidelity spatial awareness to smart home hubs, for input to smart devices such as lighting, security, entertainment, and thermostats. The Internet of Things (IoT) is another big topic at CES, and ThroughTek Co., Ltd., Taiwan, demonstrates IoT developments to transmit voice, video and data over both wide- and narrow-band channels in smart home applications. Showcased solutions include Smart Living integration of video surveillance applications combined with voice assistant to companion robots, wireless doorbells, and battery cameras to enable real-time two-way audio and video streaming simultaneously. Advanced Capacitive Touchscreen Decayeux Group, a European manufacturer of mailboxes and high security doors, is displaying MyColisBox, a secure and connected parcel box delivery system designed to provide online shoppers a secure pickup point accessible by a PIN code sent via SMS message to a smartphone. Walter is the new mobile app for MyColisBox. Kwikset, a division of Spectrum Brands, showcases its smart lock portfolio – including three new smart locks – in the CES Smart Home Marketplace. Kwikset is showing the SmartCode 888, Kwikset Convert, Obsidian, and new designs of the SmartCode 914 and SmartCode 916, as well as a new wi-fi lock. Baldwin, Kwikset’s ‘luxury lock’ sister company, is offering a preview of its new TouchScreen Collection, launching this summer, available in five styles and featuring Advanced Capacitive Touchscreen technology. The Internet of Things (IoT) is another big topic at CES, with many companies demonstrating IoT developments Cyber security standards Privacy is increasingly a concern in the consumer space, and Private Discuss, from PIMAN Security, is a premium, secure, white label communication solution. Their active AI-powered defense architecture provides encrypted audio and video calls, messaging and file sharing. It renders a confidential, secure messaging platform that adheres to the highest standards of cybersecurity. FLIR provides virtual reality demonstrations at their CES booth, allowing attendees to put on a virtual fire helmet and try out a FLIR camera in a real-world residential fire response scenario. Participants may also use a FLIR optical gas imaging camera virtually to stop fugitive emissions in a natural gas refinery. Booth visitors may also take “thermal selfies” to post on social media.
The U.S. House of Representatives has voted 351-61 to ban federal agencies from buying Chinese-made surveillance cameras. The measure was passed May 24 as an amendment to House Bill 5515, the Fiscal Year 2019 National Defense Authorization Act (NDAA), which is the funding plan for the military that also maps out a variety of policy priorities. The bill is at least several months away from becoming law, and it must still be considered by the Senate and then by a House-Senate conference committee before final passage. Changes can be made at each stage. It would also have to be signed by President Trump. The amendment targeting video surveillance cameras was offered by Congresswoman Vicky Hartzler, a Missouri Republican. “Video surveillance and security equipment sold by Chinese companies exposes the U.S. government to significant vulnerabilities and my amendment will ensure that China cannot create a video surveillance network within federal agencies,” says Hartzler in a press release. Companies affected by the ban The proposed ban appears to lump our industry’s familiar video surveillance players together with other companies that the U.S. government has targeted for security concerns. Also mentioned in the amendment are Hytera Communications, a Chinese digital mobile radio manufacturer previously charged with patent infringement; and ZTE Corp., a Chinese telecommunications company accused of violating trade-sanction agreements and posing a threat to U.S. national security. The bill also mentions Huawei Technologies Co. Ltd., a Chinese telecommunications manufacturer previously investigated as a national security threat.The proposed ban appears to lump our industry’s familiar video surveillance players together with other companies that the U.S. government has targeted for security concerns Two familiar companies in our industry – Hikvision and Dahua – are mentioned in the bill by their full names, Hangzhou Hikvision Digital Technology Co. and Zhejiang Dahua Technology Co. In addition to their branded video lines, the two companies also are the largest providers of OEM/'white label' cameras and video systems that are sold under other brand names, such as Honeywell, Stanley and UTC. The bill specifically mentions the inclusion of white label technology in the ban. Addressing concerns In the case of Hikvision, one concern is whether the company is owned by the Chinese government. Hikvision has previously addressed this issue, emphasising its ownership by “a diverse set of private and public entities” with the largest share belonging to a Chinese state-owned enterprise (SOE). Hikvision declined to comment for this article. However, the company has published a statement (“Special Bulletin”): “We are actively working to assure our North American stakeholders that Hikvision strictly abides by the laws and regulations of each country in which it operates. We also affirm the fact that we hold our products to the industry’s global cybersecurity standards, including North America.” The Hikvision statement continues: “As we continue to monitor and further deploy the necessary resources to address this matter over the coming weeks and months, please know that we will vigorously defend Hikvision from dangerous and unproven accusations about the cybersecurity of our products and solutions.” If SIA decides to take a position based on member feedback, it will occur during the normal legislative process" Commitment to compliance Dahua answered our requests for a comment with the following official response: “Dahua Technology is a commercial enterprise with a high level of business integrity. The international company [is] committed to compliance with all applicable laws and regulations in the countries in which it does business.” The company’s response continues: “Dahua Technology dedicates 10 percent of its revenue to research and development annually. Dahua has designated cybersecurity as a top priority and takes a comprehensive and systemic approach, with complementary and redundant safeguards built into its technology, services and organisational practices. Dahua Technology is positioning itself as a cybersecurity leader within the video surveillance industry.” The Security Industry Association (SIA) has submitted the House amendment to its government relations committee for review and consideration. “Any recommended position by the government relations committee will be referred to the SIA Executive Committee for their consideration and approval,” says Don Erickson, CEO of SIA. “If SIA decides to take a position based on member feedback, it will occur during the normal legislative process as the bill is considered by the Senate, and then ultimately by a House-Senate conference committee.” Impact on global video camera supply Congresswoman Hartzler’s amendment is aimed at “ensur[ing] federal agencies do not purchase Chinese-made surveillance cameras,” according to the press release from her office. Obviously, there are more than just the two mentioned companies manufacturing surveillance cameras in China, so the question becomes whether the intent is to ban all Chinese cameras from government use. Such a proposal would create an even larger issue, given that 60 to 65 percent of the global supply of commercial video cameras are manufactured in China, according to one industry source.60 to 65 percent of the global supply of commercial video cameras are manufactured in China, according to one industry source The bill does not address the possible use of Chinese-made components in cameras that are assembled elsewhere in the world (but technically are not 'made in China'). “Those types of issues are commonly explained in implementation guidelines that would be created afterwards if the proposed language becomes law,” says Erickson. The NDAA is unlikely to become law for several months. A version previously passed by the Senate Armed Services committee must be presented to the full Senate, where it can also be amended. Then the House and Senate bills must be reconciled.
LOCKEN has been selected to modernise access management for half of all substations in Enedis’ national network. Following a test phase it has opted for the latest-generation intelligent key by Iseo, which uses contactless induction technology to guarantee instant access. The EDF subsidiary supplies electricity to consumer meters, through extremely high-voltage lines, located at its many substations. The solution is currently being introduced and full deployment across 1,100 substations will take place throughout 2019. Effective solution The construction principles for this type of structure require wide open spaces to keep people and equipment safe Substations transform the power from very high-voltage lines (90,000 V or 225,000 V) to high-voltage (20,000 V most often) and through to private homes (230V). Some sites may be located in urban settings. In this case, the substations are installed in underground infrastructure, like in Paris and its inner suburbs. But most are found in rural or semi-urban areas, covering a half or full hectare. The construction principles for this type of structure require wide open spaces to keep people and equipment safe. With perimeter security accessible through an outside gate, substations comprise a technical room and a number of transformers, which may be outside or under shelter. These facilities have many access points which must be secured. Without an effective solution, key management is complex and operational efficiency is reduced. Centralised management software Substations are sensitive sites with strictly controlled access. Given the exposure to electrical risk, intrusions present potentially lethal consequences. This is where the LOCKEN solution comes in: a single key with associated rights allows employees to open any area they require (and are authorised to access) as part of their job. A lost key is easily disabled within the centralised management software. The solution is particularly appropriate given the number of maintenance officers required by substations. Users are not all Enedis employees, explains Maxime Leboeuf, Project Manager at Enedis. “Although site workers are mostly Enedis employees, the sites must also be accessible to subcontractors for extension and renewal work and a number of maintenance operations, by employees of RTE, the electricity transmission system operator responsible for the very high-voltage lines which end at substations.” Electronic access management “Electronic access management drastically reduces the risk of intrusion associated with mechanical keys. With the Locken system, we can now authorise subcontractor access for a specified period and location. In the Enedis setup, the access rights memorised by the electronic keys must be updated daily by the key's user using the dedicated devices.” Keys are deactivated almost immediately once the process is initiated in the Locken Smart Access (LSA) central management software" “Keys are deactivated almost immediately once the process is initiated in the Locken Smart Access (LSA) central management software. This also provides a reliable crisis management tool.” At Enedis, LOCKEN has fitted outdoor access points in often isolated, rural areas. The key supplies the energy to open the cylinder so no wires are needed for doors. Extending electronic key The cylinder is approved to resist extreme weather conditions, especially the effects of water. Contactless technology also shields it from dust and oxidation. Enedis is considering the possibility of extending electronic key use to the most sensitive parts of its technical rooms, especially access to control and command rooms, the nerve centres of the substations. Enedis also plans to replace all substation cylinders to minimise the risks associated with joint activity, meaning a number of operations carried out by different engineers can take place simultaneously at the same substation.
Six CNI utilities sites across South West England and Wales have been secured from terrorist attacks and ongoing criminal threats in a £3.25 million security project. Gas distributor Wales & West Utilities appointed principal contractor Chubb Systems and Littlewood Fencing to work collaboratively on a fully-integrated perimeter protection upgrade. Littlewood secured the perimeter with a Lochrin Bain ‘Combi’ CPNI Approved palisade fence system enhanced with Gallagher monitored pulse fencing (MPF) to 4m high. They also installed Crime & Fire Defence Systems MAP vault panels, CCTV towers, security and field marshalling kiosks along with associated concrete and civil works. Collaborative project management Littlewood Security Division manager David Jackson said: “We’ve worked with Wales & West for many years as the incumbent supply and installation partner for perimeter security systems, but this latest project with Chubb also included the integration of access control, CCTV cameras, reporting systems and networks that enable remote monitoring from a central control station.” A large element of the package involved civil works that had to be completed mainly by hand In total, more than 2500m of fencing were installed along with twelve CPNI BASE vehicle gates and six Crime & Fire MAP vaults. With a number of sites located on the Brecon Beacons, access issues and inclement weather conditions made collaborative project management essential. A large element of the package involved civil works that had to be completed mainly by hand. This was achieved with a strong emphasis on health & safety ahead of programme and to a high standard. Strategically important sites Gallagher business development manager Jason Hunter said: “A Gallagher MPF delivers safe and controlled, energised pulses. If seeing the fence and warning signs isn’t enough of a deterrent then receiving a short sharp shock should definitely deter. “The system is also connected to our Command Centre, which will alert the security team that there has been a breach so they can react quickly and effectively.” Wales & West Utilities security manager Ian Raclette said: “Gallagher’s MPF meets the CPNI criteria we demanded and helps us to detect criminal or terrorist activity in real time, reducing further any threat on these strategically important sites.” Wales & West Utilities covers a sixth of the UK, serving a population of 7.5 million. It launched on 1 June 2005, having formerly been part of National Grid Transco, and is now valued at £1.2billion.
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, working alongside Sonitrol of Fort Lauderdale, is pleased to announce the completion of a highly-anticipated security system upgrade for Junior Achievement of South Florida (JASF) at the organisation’s JA World Huizenga Center at the Lillian S. Wells Pavilion (JA World). JA World is located on the Broward College North Campus in Coconut Creek, Florida. With over 60,000 square feet of learning areas, rentable meetings rooms, and the Huizenga Catering Kitchen, JA World is the largest Junior Achievement facility in the world. Each year, more than 21,000 5th grade and 20,000 8th grade students from Broward and south Palm Beach counties visit the facility. The 5th graders learn basic economic concepts, workplace skills, and personal and business finances in a simulated city built for young students; the 8th graders focus on how their educational choices will impact their future earning potential, managing a budget and learn about high growth industries to help spark their career exploration. The initial security system included remotely managed access control, verified audio intrusion detection, and analogue camerasRequirement of IP camera technology “Each day, 450 students participate in JA BizTown and JA Finance Park simulations at JA World. Their safety and the safety of our volunteers, staff, and guests is of the utmost concern to us,” said Laurie Sallarulo, President & CEO, JASF. Sonitrol of Fort Lauderdale started working with JASF in 2008, in the early design/build phase of the facility, and through its completion in 2009. The initial security system included remotely managed access control, verified audio intrusion detection, and analogue cameras. At the time, IP cameras were considered too expensive. “Previously, we had 18 analogue cameras on the system,” explained Leni Smith, Director of Operations for JASF. “As time went on, it was clear that we needed to bring more areas inside and outside the building under surveillance, we wanted to access more cutting-edge IP camera technology, and we wanted to have all our surveillance under one Video Management System (VMS).” Installation of 3xLogic hybrid NVR Sonitrol of Fort Lauderdale installed a 3xLOGIC hybrid NVR, enabling JASF to protect their analogue camera investmentWorking in tandem, Sonitrol of Fort Lauderdale and 3xLOGIC designed a system upgrade that, through a combination of discounts and donations, JASF could afford. It also helped that John Ray, President of Sonitrol Fort Lauderdale, is a long-time, active JASF Board member. In order to fit JASF’s budget, Sonitrol of Fort Lauderdale installed a 3xLOGIC hybrid NVR, enabling JASF to protect their analogue camera investment, while adding in higher-resolution IP cameras for expanded coverage. The hybrid solution also creates a migration path, allowing JASF to continue improving visibility with new IP cameras over time as their budget allows. “As part of ongoing security and safety improvements, our staff participates in an annual active shooter training,” explained Monica McNerney, VP Operations, “and during those trainings, two things became clear. We needed to cover more areas with surveillance, and we needed to partner more closely with local law enforcement to give them real-time access to our system in case of an emergency.” Viewing discrete areas with VIGIL software JASF has a number of discrete areas under surveillance and manages to view them through use of the 3xLOGIC VIGIL server softwareJASF has a number of discrete areas under surveillance and manages to view them through use of the 3xLOGIC VIGIL server software. These include the reception area, two loading dock areas, other exterior doors, their large meeting rooms, and the student areas, known as JA BizTown and JA Finance Park, where 450 young people spend most of their time each day at JA World. The receptionist controls public access to the building by viewing who is requesting entry, and buzzing that person in. The receptionist also monitors the loading dock area and notifies the appropriate staff member when a delivery has arrived. Leni Smith, who manages day-to-day security matters, reviews video after an incident is reported to her. “I really like how with the upgraded system, I can use motion detection alarms to hone in on exactly the video I need to review—I bet we’ve cut the time for review easily in half, if not more. I also really value how I can draw a box in a camera view and zoom into that area easily and quickly to find out exactly what happened.” Working with community partners We work very closely with our community partners to help them understand and access our facility and security system"Monica McNerney expanded on how the upgraded system is positively impacting another aspect of the JASF security program. “We work very closely with our community partners like Broward College security and local law enforcement to help them understand and access our facility and security system. We also routinely ask for their expert feedback on whether we’re managing our security effectively. “So far, they’ve told us we’re doing exactly what we need to be doing, and they’re excited about the expanded access they have to our camera views, although we hope that no event ever warrants that need.” TotalGuard solution for emergency situations Jennifer Thomas, Vice President of Operations for Sonitrol of Fort Lauderdale, also discussed continued improvements that are planned for JA World. “We are actively designing phase II of the camera upgrade, which will include improved coverage and image clarity for camera views outside the front doors. TotalGuard allows JASF personnel to alert the Sonitrol central station and transmit real-time audio and video to the monitoring centre “We are also ready to deploy our latest technology for the main lobby area—TotalGuard. TotalGuard is a great solution for emergency situations, it allows JASF personnel to alert the Sonitrol central station and transmit real-time audio and video to the monitoring centre, for prioritised verified police response.” Sallarulo had a final thought on how things have been going with the system upgrade, “As for Sonitrol of Fort Lauderdale, they always provide us an amazing response. As a non-profit, we could not do what we do without the help of partners like Sonitrol. We are very grateful for their support and service.”
Manufacturer ROCKWOOL International A.S. has chosen Nedap’s Global Client Programme to secure its offices and factories worldwide. AEOS, the physical security platform by Nedap, installed during the programme, enables ROCKWOOL to establish a truly global security policy and unified work processes. An advanced project rollout, the Global Client Programme is developed for large multinationals and offers several benefits, including standardisation across sites, shorter implementation times and cost efficiencies. Standardising company’s security measures The Global Client Programme connects all of ROCKWOOL’s factories and office premises, and standardises the company’s security measuresROCKWOOL has 28 factories across the world. The Global Client Programme connects all of these factories and ROCKWOOL’s office premises, and standardises the company’s security measures throughout the world. Fokko van der Zee, managing director at Nedap Security Management, says: “The implementation of a standardised security solution across the world is a complex process. It involves a large project spanning many years and involving many stakeholders, and demands a high level of project management. In the absence of a structured program with defined guidelines, a global security rollout is likely to be a stressful execution. That’s why we set up our carefully designed Global Client Programme.” ROCKWOOL Digital Service Lead, Matthew Thorne, agrees: “We’ve worked with Nedap over the past few years and recently became a member of their Global Client Programme. Now we’re equipped with the people and tools we needed to standardise our physical security solution. The Global Client Programme also minimises risk and guarantees compliance. It really meets our needs in every possible way.” Central security platform saves money The programme helps achieve cost savings by avoiding initial setup costs per site and having one central security platform instead of severalThe Global Client Programme is designed to ensure monitoring and control during every step of the rollout process. Timon Padberg, responsible for business development at Nedap Security Management, explains: “The repetitive nature of local site deployments allows us to work with models and templates, such as standard proposal and calculation documents. We can therefore produce a scalable process that ensures uniformity and a consistently high quality of implementation across each site.” By using the Global Client Programme, ROCKWOOL is aiming for uniformity and alignment across all sites. The programme also helps achieve cost savings by avoiding initial setup costs per site and having one central security platform instead of several. Moreover, there are significant savings on operational and maintenance costs due to shared services and economies of scale.
A manufacturing giant in Maharashtra has the distinct mark of making India’s 1st Diesel Engine and Iron Mold Ploughs. The company’s legacy dates to 1922. This company is the reason behind a new wave of industrialisation in some of the towns in Maharashtra while preserving their rich heritage. Wide area monitoring The company is spread across a wide area, employing more than three thousand people. Being an established and trusted brand, maintaining quality is crucial and therefore, every area needs to be under surveillance. For this reason, cameras producing high resolution images and covering a greater area for monitoring was the primary requirement. The company is divided into various branches that are located at various places in Satara, Maharashtra. This gave rise to the need for a centralised solution at a centralised location from where all other sites can be monitored at a time. Matrix IP bullet and dome cameras To cover the large monitoring area, Matrix provided IP bullet and dome cameras that have greater field of view when compared to other brands. According to the requirement, various cameras were installed at different locations such as reception area, canteen, security area, entrance, production area, etc. These cameras also provide exceptional low light images that aid in night time surveillance and provide enhanced security. For storing the streamed videos, Matrix offered network video recorders. These NVRs have features such as adaptive recording which aids in storing more data in a defined space. Moreover, it has intelligent video analytics such as intrusion detection and motion detection which were also applied. Instant notifications and alerts ensured real-time security of the premises.
A Manufacturing giant in Maharashtra has the distinct mark of making India’s 1st Diesel Engine and Iron Mold Ploughs. The company’s legacy dates to 1922. This company is the reason behind a new wave of industrialisation in some of the towns in Maharashtra while preserving their rich heritage. Centralised surveillance solution Large area to monitor - The company is spread across a wide area employing more than three thousand people. Being an established and trusted brand, maintaining quality is crucial and therefore, every area needs to be under surveillance. For this reason, cameras producing good quality image and can cover a greater area for monitoring was the requirement. Centralised control - The company is divided into various branches which are located at various places in Satara. This gave rise to the need for a centralised solution at a centralised location from where all other sites can be monitored at a time. Low light images for enhanced security Matrix provided IP Bullet and Dome cameras that have greater Field of View when compared to other brandsTo cover the large monitoring area, Matrix provided IP Bullet and Dome cameras that have greater Field of View when compared to other brands. According to the requirement, various cameras were installed at different locations such as reception area, canteen, security area, entrance, production area, etc. These cameras also provide exceptional low light images which aid in providing high-class security. For storing the streamed videos, Matrix offered Network Video Recorders. These NVRs have features such as Adaptive Recording which aid in storing more data in a defined space. Moreover, it has Intelligent Video Analytics such as Intrusion Detection and Motion Detection which were also applied. Instant notifications and alerts ensured real-time security of the premises. Results: Centralised Control 24x7 Real-time Surveillance Higher Security with Intelligent Video Analytics
Round table discussion
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
You could say concerns about privacy are “trending” in our increasingly data-driven world. Unease about how Facebook and other high-tech companies use and share data dominates the news, and the full impact of new European Union (EU) regulations is about to be felt around the world. By May 25, companies that collect data on EU citizens will need to comply with strict new rules around protecting customer data, as enumerated in the General Data Protection Regulation (GDPR). But how do the new regulations, and broader concerns about privacy, affect the physical security market? We asked this week’s Expert Panel Roundtable: How do privacy issues and regulations, such as GDPR, impact physical security systems and how they are managed?
Companies in fast-moving industries tend to want half or more of their revenue to come from products released in the last three or so years. The logical extension of that philosophy is the demise of product "cash cows" that remain in a company's portfolio for many years. Where better to witness the shortening life cycles of technology products than in the smart phone market, where most of us buy into the hype of the "latest and greatest?" But does acceleration of new product introductions translate into shorter product life cycles in the field? We asked this week's Expert Panel Roundtable: What is an acceptable life cycle for a physical security system? Is there a trend toward systems being replaced more, or less, often?