Infusion Direct Marketing, a public relations firm specialising in the security industry, announced that the company has kicked off 2020 with a new sales representative agreement in the Florida territory with Security Network Associates (SNA) of Colorado. In this new sales role, Infusion Direct will be responsible for supporting SNA’s sales efforts for IPVideo Corporation’s HALO IOT Smart Sensor in the state of Florida. HALO has taken off this year in response to the nationwide youth...
Professional security installers are the essential lifeblood of IFSEC and FIREX International, so they are delighted to announce their long-standing partners SSAIB as the official Installer Partner for the 2020 shows, taking place once again at London’s ExCeL from May 19-21. As the certification body for security and fire alarm installation professionals, manned guarding services and monitoring, SSAIB-approved companies are exclusively invited to IFSEC International and FIREX Internationa...
So many business processes are controlled, tracked, measured or monitored by software. So, it’s frustrating when multiple systems create double or triple the work. Unfortunately, not all of a user's software plays nice together. Web-enabled software for a CLIQ key-based access control system is an exception. No matter what the user’s business, the CLIQ Web Manager helps the user manage their access control quickly and efficiently. Now the user can also integrate their powerful acces...
Developed and launched in 2014, FERMAX FOR REAL, the Augmented Reality application for mobiles and tablets has now been released in a new improved version. It includes new products, a more modern design and a new marker to activate the augmented reality. End users can interact with the product as if it was real and see how Fermax video door entry systems would look like on the exterior and interior of their home. That is the great advantage of Augmented Reality: the possibility of combining the...
Pivot3, a provider of intelligent infrastructure solutions, announced the addition of new artificial intelligence (AI) and automation features to its Acuity software to address the data protection challenges often faced in large-scale hyperconverged infrastructure (HCI) deployments. These capabilities provide unprecedented resilience for large multi-petabyte environments, allowing customers who experience catastrophic hardware failures to quickly recover while ensuring high-availability with aut...
Essence Group, the global Internet of Things solutions provider, and Verisure Sàrl, a provider of monitored security solutions in Europe, are celebrating the 20th anniversary of their partnership. The successful cooperation between the two companies has proved to be mutually beneficial, leading to tremendous growth and the development of one of the world’s most used home security systems. At the beginning of the partnership, Verisure was a regional security provid...
Access Control is always a very critical aspect of an organisation's overall security strategy. Regardless of its size, it is inevitable for any organisation to have a flexible and comprehensive access control solution. To connect separate areas in the single location requires a standalone access control. For small and medium organisation, Matrix has designed a standalone Access Control solution for small organisations, while keeping security and simplicity in mind. This innovative solution works on industry standard IP protocol allowing organisations to expand easily even with a single door. This eliminates the need of installing any application software. Centralised monitoring and control Key Features: Automatic Fingerprint/Palm Distribution Access Control on: User, Zone and Time First-in User Rule 2-Person Rule Man-Trap Guard Tour Occupancy Control Blocked Users Route based Access Door Auto Relock Dead-Man Zone Anti-Pass Back Do Not Disturb (DND) Zone Smart Card based Identification Who's In Time Stamping Integration with Other Hardware Notifications on Exception Centralised Monitoring and Control Informative Reports
Qognify, the trusted advisor and provider of physical security and enterprise incident management software solutions will be present at Intersec 2020. The company will demonstrate the latest version of its state-of-the-art video management system, Cayuga as well as its newly released, web-based central management platform, Umbrella. Focusing on the outcomes of customers that place a premium on physical security, safety and operations, both products enable organisations especially in the logistics and retail sector to increase security and process transparency and derive valuable business insights. Cayuga (R14) video management system Qognify will showcase the current version of Cayuga (R14) and the new Umbrella software on booth SA-C41 at Intersec 2020, which takes place from 19 – 21 January 2020, at the Dubai International Convention and Exhibition Centre, Dubai, UAE. The company will once again be joined by its representative in the region, Electronic Design. The presentation at Intersec will highlight new trends in security management and how Qognify’s portfolio of premium solutions provides a central hub, from which all company-wide security-related systems can be managed. Enhanced cyber security Being developed at Qognify’s technology hub in Bruchsal, Germany, Cayuga R14 was launched earlier this year, bringing to market a professional next-generation VMS that not only supports more than 5,000 different devices from more than 80 different hardware manufacturers, but also provides cyber security for the growing number of IP video surveillance systems in use. Intersec 2020 is the ideal place for Qognify to demonstrate its latest innovations to end customers, partners" It builds the basis for Umbrella, a ground-breaking platform that can be deployed securely in the cloud or on-premise to enable centralised system monitoring, administration and license management for distributed Cayuga video systems. Intersec 2020 Kaj Svenningson, Director of Sales for the Middle East and Africa at Qognify, explains, “Qognify is one of the most renowned VMS providers and has been developing solutions for more than 20 years. Cayuga – and recently also Umbrella – have attracted a lot of attention from organisations operating in a wide range of sectors throughout the Middle East, most notably in logistics and retail.” Svenningson adds, “As one of the world’s largest trade fairs for security, safety and fire protection, Intersec 2020 is the ideal place for Qognify to demonstrate its latest innovations to end customers, partners and interested parties in the region.”
CSM has dramatically improved visibility and control over its security operations with the adoption of employee scheduling and workforce management software SmartTask. Following a period of rapid expansion, the company needed to replace existing paper-based systems, so that it could better monitor and coordinate a team of around 100 security guards that work across Scotland. This has enabled CSM to improve service delivery, enhance duty of care and support business development while reducing its administrative burden by up to 35 hours a month. Highly-competitive marketplace We have expanded our business to service over 200 sites on behalf of a diverse range of customers" “We have expanded our business to service over 200 sites on behalf of a diverse range of customers, so we recognised that we had outgrown many of our existing manual systems,” explains Martin Heneaghan, Managing Director of CSM Facilities Management. “We not only needed a software solution that would automate and streamline these processes but also help us differentiate our offering within what is a highly-competitive marketplace. SmartTask is helping us transform our operation by delivering on these demands and offering huge opportunities moving forward.” Since the adoption of SmartTask, security staff now book on/off shifts and submit check calls via an automated telephone system using secure PIN codes. This is helping the company to capture precise time and attendance data to monitor the status of all frontline employees as they start, finish and complete work. Scannable NFC checkpoint tags CSM is planning to roll-out the SmartTask app so that staff can use a smartphone quickly confirm attendance along with a GPS timestamp. The company is also using scannable NFC checkpoint tags for a number of contracts for patrol monitoring and proof of attendance for supervisors. Work schedules have been communicated to staff either verbally or via text The intelligent rostering tool is enabling CSM’s central operations team to increase the speed and efficiency of workforce scheduling. As a result, the company quickly creates highly accurate rosters that automatically factor in holidays, available working hours and personal staff preferences. Work schedules have been communicated to staff either verbally or via text, but with the roll-out of the SmartTask app, staff members will soon be able to receive and confirm their individual schedules using a smartphone. Enhance performance monitoring Jack White, Operations Manager of CSM Facilities Management, commented: “By automating many of our manual, paper-based processes we have been able to massively streamline the management of our security teams, saving both time and money. It has also proven to be invaluable for internal reporting and customer communication because of its ability to electronically capture accurate operational data while minimising the risk of human error.” The advanced reporting functionality has allowed CSM to enhance performance monitoring The advanced reporting functionality has allowed CSM to enhance performance monitoring, both internally and for customers. A range of reports are automatically generated on a weekly, and monthly basis, so critical data can be shared with the finance, HR and senior management teams. Meanwhile, a web portal has been launched and already set-up for a number of customers so that they can view real-time and historical performance data for their cleaning or security operation. Coordinating security requirements CSM is also using SmartTask’s 24/7 virtual control room service to monitor missed shifts, check-calls, and any operational alerts. This has replaced an in-house control room and out-of-hours monitoring solution that was costly and difficult to manage. The managed service is providing the company with complete peace of mind that staffs are safe day or night while ensuring that customers are receiving the highest levels of service. “SmartTask is having a dramatic impact on how our central operations team, based at our Glasgow headquarters, is able to coordinate security requirements. The software has given us added visibility and control while freeing up time so we can make best use of the insight provided to target service and efficiency improvements. Moving forward, controlled access will also be given to supervisors and operations managers with live monitoring and reports linked to their areas of responsibility,” adds White.
Radiflow, a provider of cybersecurity solutions for industrial automation networks, and Asset Guardian, a dedicated provider of edge protection for process control and industrial software, jointly announced that the two companies have launched a joint solution to expand industrial asset monitoring, change management and risk assessment capabilities for industrial enterprises. Threat detection system Asset Guardian’s change management solution manages software and hardware configurations of industrial automation and controls systems. The Asset Guardian technology manages PLC, DCS and HMI/SCADA software assets and provides a single point of reference for current asset information, including operational status, location and controller logic versions. iSID can detect in real-time and counteract abnormal network activity, such as abnormal network access Radiflow’s iSID industrial threat detection system provides real-time visibility of networked industrial assets, ports and protocols on an OT network. By passively analysing all data traffic, iSID can detect in real-time and counteract abnormal network activity, such as abnormal network access or asset changes and changes in the sequence of SCADA processes. Detailed asset information In this new integrated solution, iSID’s asset inventory now incorporates the asset information stored in the Asset Guardian database, including the detailed asset information that is not available from traffic monitoring. With this new detailed asset information from Asset Guardian, such as logic version, ownership, geo-location and more, the result is a far more granular risk score calculated by iSID for each asset. Changes to assets, such as new firmware or PLC logic, are detected on the network in real-time by iSID and sent to Asset Guardian for verification, authorisation and validation against the ‘golden image’ of the binary stored in the Asset Guardian database. OT asset monitoring and risk assessment Our integration and joint offering with Asset Guardian will provide a higher level of OT asset monitoring" “Our integrated and comprehensive joint platform solution capability will provide greater insight, clarity and security to our global customer base to help protect the integrity of their OT ICS assets against ever increasing cyber threats to safeguard operational resilience, govern compliance, standards, security and deliver effective management of change and disaster recovery,” explained Ewan McAllister, CEO of Asset Guardian Solutions. “Our integration and joint offering with Asset Guardian will provide a higher level of OT asset monitoring and risk assessment,” said Rani Kehat, Vice President of Business Development at Radiflow. “These are key enhancements that will enrich our industrial enterprise customers with greater operational management value.” Joint solution with Asset Guardian Radiflow will be demonstrating its joint solution with Asset Guardian this week at the Industrial Control Systems Cyber Security Conference in Atlanta, United States. Radiflow is currently scheduling demonstration of its joint solution with Asset Guardian.
GeoVision Video Wall allows administrator to create layouts with a variety of displays including desired camera channels, zoom windows, scan windows, web pages, video playback and live view pop-up from E-Map. It’s able to support up to 57,000 live view channels simultaneously. GeoVision Video Wall Two main features GeoVision Video Wall offers: The ability of displaying a single live view channel across multiple monitors. The ability to project content onto the displays of another PC. A typical use case of this is the assignment of camera live views to security guard’s PC. GV-Control Center software solution GeoVision Video Wall is an add-on application to the company’s GV-Control Center software. It is an imperative component to include for large scale, central monitoring station with multiple monitors. Some case references where the GeoVision Video Wall has been installed are the Taiwan Well-known Business Complex, Malaysia City Hall, and USA Security Company.
A new cybersecurity service brings professional 24-hour monitoring within reach of SMEs for the very first time. bluedog Security Monitoring, which has been launched by Freeparking.com founder Paul Lomax and cybersecurity expert Tim Thurlings, offers smaller firms the type of managed detection and response service previously only available to large corporates. Highly trained cybersecurity team The launch of bluedog comes as SMEs face increased pressure from customers, regulators and investors The London-based company has developed a low-cost device called Sentinel which plugs into a customer's network and uses machine learning to spot unusual activity. It then alerts bluedog's security operations centre, where a highly trained cybersecurity team can analyse and respond to potential threats. The bluedog service can detect both external and internal threats, such as phishing emails or the download of video or audio files packed with malicious malware, which often bypass traditional endpoint security and firewalls. It not only offers enhanced security and rapid response to incidents, but also helps companies comply with standards such as GDPR, Cyber Essentials or ISO/IEC 27001:2005 and keeps a full audit trail for reporting purposes. The launch of bluedog comes as SMEs face increased pressure from customers, regulators and investors as well as cyber criminals seeking ‘soft' targets. Firewalls and endpoint protection The UK government's Cyber Security Breaches Survey 2019 shows that while the number of businesses being attacked has been falling - down from 46 per cent in 2017 to 32 per cent this year - the number of attacks each victim suffers has risen from two to six over the same period. It suggests businesses with weaker defences are being targeted repeatedly. bluedog's CTO Tim Thurlings, a former ‘ethical hacker' who helped develop the EU's TIBER threat intelligence framework, says: "Firewalls and endpoint protection which SMEs have traditionally relied on are no longer adequate as experienced hackers can easily find ways round them. SMEs need to take their cybersecurity to the next level, yet at present few have a dedicated professional.” Bluedog's innovative model combines machine learning and human expertise to offer exceptional service" "bluedog gives them 24/7 access to a whole team of cyber experts for less than the cost of employing one part-time staff member. Bluedog's innovative model combines machine learning and human expertise to offer exceptional service and peace of mind." Analyst firm Gartner believes that by 2020, 15 per cent of organisations will be using services such as managed detection and response, compared to less than 1 per cent today. Combining machine learning and human expertise bluedog CEO Paul Lomax, whose Freeparking.com business was the UK's first self-service domain registrar, and who has also founded two hosting companies, says bluedog is targeting a gap in the market for SME monitoring services. "While technology is becoming more sophisticated, it still requires people to analyse the data and act on it," he explains. "Ideally all businesses should have 24/7 monitoring but with salaries for skilled professionals running into six figures, it is an expensive resource that up until now has been limited to blue-chip firms.” "With bluedog, we have developed a smarter model which enables us to revolutionise pricing and bring services within reach of SMEs for the first time. This is a $10bn untapped market and no-one else is offering a solution. bluedog's model gives us a competitive advantage and makes us well placed to become a global leader."
Insider threat programmes started with counter-espionage cases in the government. Today, insider threat programmes have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a programme, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organisation Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organisation. They can cause brand and financial damage, along with physical and mental damage. Insider threat programme Once you determine you need an insider threat programme, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a programme Next, get a top to bottom risk assessment to learn your organisation’s risks. A risk assessment will help you prioritise your risks and provide recommendations about what you need to include in your programme. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat programme will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a programme and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of programme needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the programme. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the programme, build the culture and promote awareness. Teach employees about the behaviours you are looking for and how to report them. Behavioural analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organisation need to detect insider threats? Organisations need software solutions that monitor, aggregate and analyse data to identify potential threats. Behavioural analysis software looks at patterns of behaviour and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behaviour of people and notifies security staff when behaviour changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviours and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behaviour, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behaviour. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organisation has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat programme. Big companies should invest in trained counterintelligence investigators to operate the programme. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behaviour Using the right technology along with thorough processes will result in a successful programme You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behaviour and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat programme. IT is the most privileged department in an organisation. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat programme takes time and patience. Using the right technology along with thorough processes will result in a successful programme. It’s okay to start small and build.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organisation. Time-intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralised operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analysed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood management assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental control assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway management and parking assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper experience assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognise and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing business intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A natural cross-over technology This trend towards integration has forever changed how organisations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyse what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalise on that connection is only limited by our imagination.
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetisation Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is changing and evolving. New entrants in the monitoring space New entrants in the monitoring space face barriers to entry, in particular the need for more investment"“New entrants in the monitoring space face barriers to entry, in particular the need for more investment in infrastructure and expertise,” said Spencer Moore, Vice President of Sales and Marketing, Rapid Response Monitoring. ”Because of the expense of new technologies, more full-service monitoring companies are outsourcing the monitoring function to existing wholesale monitoring companies.” “The cost of entry has gone up, and companies are trying to preserve capital,” agreed Jim McMullen, President/COO at COPS Monitoring. “Larger companies are realising wholesale monitoring does a better job from a customer service viewpoint. We are more focused on monitoring and the quality of service. It takes a lot of money to keep up with the cyber world,” added McMullen. Wholesale monitoring companies Wholesale monitoring companies are finding that they need petabytes of storage space, among other expensive requirements. “The trend is toward technology evolving quicker, and that often requires investment and training in a monitoring center,” said Daniel Oppenheim, CEO of Affiliated Monitoring. “Because trying out new technology is so important, wholesale monitoring centers often find that they serve as a ‘laboratory’ to experiment with newer technologies. Limited trials often expand later to broader outsourcing of a company’s monitoring services”, said Oppenheim. Automated Secure Alarm Protocol “What people miss out on is that monitoring is quite complex, and there are specialised services and skillsets, and barriers to entry from a regulatory perspective,” said Moore. Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service. The national service saves time, improves accuracy and increases efficiency in communications between monitoring centers and public safety answering points (PSAPs). The service uses the Automated Secure Alarm Protocol (ASAP). Public Safety Answering Points Up to 60 PSAPS have joined the programme, although the low number is misleading, given that a single PSAP could represent the ‘City of Houston’. (There are an estimated 6,000 total PSAPs nationwide). It has taken six to eight years to develop the program from its genesis to where it is today, when more participation is finally creating a critical mass. Technology is fundamentally changing monitoring companies. “We used to be a services company powered by a little bit of technology, but we’re now moving toward a technology services company,” said Moore. Critical ‘filtering service’ Monitoring provides a critical ‘filtering service’ between public requests for emergency service and those tasked with providing the services. In effect, monitoring centers work with manufacturers to make them more resilient to false alarms. Monitoring companies also provide a human touch in a time of need, and emotional empathy. Today, emergency information is being transmitted to PSAPs electronically, which saves time and money. The current low-taxation environment means there are fewer resources for municipal governments, so cost savings make a difference. Monitoring, a specialised skillset Increasingly, monitoring is becoming a business that requires a more specialised skillset Increasingly, monitoring is becoming a business that requires a more specialised skillset. Regulation, and the need for increasing investment, is driving consolidation. “With a decreasing number of monitoring companies, there are fewer customers for software developers and other tools. Less outside innovation makes it more likely monitoring centers will have to ‘go it alone’ and develop software and other tools internally,” said Oppenheim. Importance of monitoring systems “In effect, consolidation will serve to limit technology choices, and to increase the need to in-source a lot of expertise”, agrees Moore. Tying monitoring systems into other software systems is another continuing challenge. “People want our system tied into their system,” said McMullen. “I have two people who focus full time to tie our systems into other systems. There will be more computers talking to computers.”
All schools and universities need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Data capture form to appear here! Facilitating visitor entry Electric strikes are able to control access via keypads, cards and proximity readers Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. More and more schools are installing visitor management systems to control who can and cannot get into the building. Access control solutions Finally, the third level – and the most vulnerable – refers to the core of the school that both students and staff occupy. These are internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. The access control system is linked to all doors within the school building A number of different access control solutions are beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralised systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralised systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Prevent unauthorised persons Mechanical solutions, which include a cylinder lock and key, are also suitable for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorised persons from entering. At one university in the United States, a smart RFID wire-free access control solution has been installed At one university in the United States, a smart RFID wire-free access control solution has been installed. The SALTO Virtual Network (SVN) wire-free system pushes and pulls data from the university’s ‘hot spot’ entry points to all their offline locks. By choosing a wire-free solution, the university only had to run wires to their exterior doors. The interior doors do not require wiring as these locks are stand-alone wire-free locks. Student accommodation block Securing access to student accommodates is another concern among colleges. One university in the United Kingdom wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. They chose Vanderbilt’s ACT365, which keeps audit trails by monitoring and recording fob activity. When another English university sought electronic locks for its newest student accommodation block, it turned to Aperio wireless locking technology from ASSA ABLOY. They used the wireless locks to extend the Gallagher Command Centre access control system to a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates. Aperio wireless locks are battery-powered and use less energy than wired magnetic security locks.
BI-City Tokyo is located in Nur-Sultan (Astana), the capital city of Kazakhstan. It is a high-end residential complex of BI Group – a construction holding company in the Kazakhstan real estate market. At present, three apartment buildings with public areas and more than 400 apartment units have been completed. Aiming to create modern high-end intelligent buildings and residential areas, the BI Group wanted to upgrade the existing analogue video intercom system of BI-City Tokyo. Analogue intercom system The original analogue intercom system in this community is outdated and cannot meet the diverse security requirements of high-end residential areas. First, the original analogue intercom does not support retaining images and leaving messages. Second, this system only supports access cards to open doors, which is inconvenient for residents in case they forgot their card. Third, the original system cannot add IP cameras to monitor public areas such as children's playground, fitness areas, etc. Fourth, the cold winter temperature in Nur-Sultan requires high-performance equipment capable of operating in extreme environments. Cold winter temperature requires high-performance equipment capable of operating in extreme environments Faced with the abovementioned challenges, BI Group was also looking for a trustworthy brand that can provide not only modern smart system but also technical support and reliable after-sales service. Meeting all the above requirements, Dahua smart residential solution was chosen to be the security solution provider of BI-City Tokyo. Access ANPR Camera The complete solution deployed more than 300 pieces of Dahua equipment, including Indoor Monitor, Apartment Outdoor Station, IP Camera, Access ANPR Camera, Video Recorder, etc. The solution supports two-way audio intercom, real-time video and messaging feature. In addition, a variety of door opening methods were also implemented: door opening via remote calling, door opening using access card, and remote door opening via APP. Additionally, all the equipment can be visualised and integrated in the Dahua DSS platform for centralised management, operation and maintenance. Moreover, the temperature in Nur-Sultan can reach up to negative 40 degrees in winter season. This requires high-performance outdoor devices featuring dust and water resistance, and explosion-roof capability. In response to this pressing challenge, Dahua apartment outdoor station VTO1210C-X-S1 and access ANPR camera ITC237-PW1B-IRZ that support wide working temperature were installed at the entrance of the apartment building for a more effective visitor and vehicle management. Built-in intelligent video analytics When a visitor arrives at the entrance of the apartment building and dials a resident’s room number through the Dahua apartment outdoor station, the camera installed at the entrance will synchronise the video with the visitor’s image captured in the resident’s indoor monitor. Once the visitor’s identity is confirmed, the resident just needs to press the button on the indoor monitor to open the door remotely. With Dahua app, users can even answer calls and open doors remotely when they are out for work or travelling. As for vehicles, Dahua access ANPR camera ITC237-PW1B-IRZ is designed for extreme temperature environments (temperature range of -40°C to +60°C). With built-in intelligent video analytics, the camera has the ability to detect and recognise moving vehicle's plate number within low speed. IR Mini-Bullet Network Camera The camera uses a set of optical features to balance light throughout the sceneFor both approaching and departing vehicles, the access ANPR camera takes a snapshot of the number plate and vehicle overview picture, as well as records corresponding surveillance videos. By setting a whitelist, the camera can automatically control the barrier or gate to open if a plate number recorded in the whitelist has been recognised. The public areas including children's playground, fitness areas, as well as the lobby are covered by 2MP IR Mini Dome Network Camera IPC-HDBW4231E-ASE, 2MP and 3MP IR Mini-Bullet Network Camera. The Starlight Ultra-low Light Technology of IPC-HDBW4231E-ASE offers light sensitivity, capturing colour details under low light condition up to 0.002lux. The camera uses a set of optical features to balance light throughout the scene, resulting in clear images in dark environments. Smart residential solution Dahua smart residential solution provides an integrated management platform for the management personnel of BI-City Tokyo. It assists in the remote and visual management of the property and improves the services and facilities they offer. Security guard at the entrance is not needed anymore to manage entering and exiting vehicles, which saves labour costs, reduces the waiting time of vehicles and improves traffic efficiency. In addition, the all-round monitoring of the public areas within BI-City Tokyo greatly improves the safety level of the entire community. The video intercom system of the building provides a variety of convenient door opening methods, enhancing the resident’s living experience. "We adopted analog solution in the first phase. From the second phase, we replaced all of analogue system with Dahua’s IP video intercom solution. We hope that Dahua will help us complete the solution planning of the three, four, five, and six phases”, said Arman, General Manager of BI Group.
Kumbh Mela is one of the most sacred pilgrimage festivals of India and is organised at a grand scale at Nasik, Haridwar, Ujjain and Prayag. As Kumbh Mela is celebrated after a period of 12 years in Nashik, 100 million people visit and therefore security is a major concern for the Government bodies. Railway stations are highly congested areas. So, one of Matrix Comsec's biggest challenges was to install devices and set up a control room for monitoring railway station entrances, platforms and connecting bridges at the busy Nashik railway station. Moreover, a restricted bandwidth for the video surveillance solution made the entire process all the more challenging. And lastly, the authorities also wanted the storage of the entire 4 month period as evidential proof. 24*7 video surveillance solution Matrix’s complete Video Surveillance solution was a highly efficient and cost-effective one Matrix used its unique Cascading feature to connect all the devices with sequencing for central monitoring on TVs in the control room to reduce the overall solution cost. Also, Matrix Comsec provided 4-months scheduled backup of all cameras configured centrally for storing all the streams. Moreover, Matrix Comsec completed the entire installation within 20 days with the help of highly skilled manpower. Being an Indian brand, efficient pre-sales and post-sales support was already a part of the solution. Matrix left no stone unturned in making sure that the visitors suffered no hassles during their Kumbh Mela visit. To facilitate this, Matrix Comsec secured the Entry & Exit from the city with our 24*7 Video Surveillance solution. Centralised monitoring software This led to enhanced security and smooth execution of the event. Moreover, the solution was highly cost-effective as the need of security manpower was replaced with centralised monitoring of all locations. Also, due to the use of IP cameras, the wiring cost of such an extensive installation was also reduced. So, all in all, Matrix’s complete Video Surveillance solution was a highly efficient and cost-effective one. Products Offered: SATATYA HVR1624P SATATYA CIBR13FL40CW SATATYA CIDR13FL40CW SATATYA CIDRP20VL130CW SATATYA Centralised Monitoring Software (CMS)
One of Europe’s largest architectural and commercial projects, Port Praski occupies an area of 38 hectares that overlooks the Vistula River in the heart of Poland's capital city, Warsaw. Likened to a ‘city inside a city’, this ambitious European multi-stage development project provides more than 160,000 sq. meters of residential accommodation space, along with 190,000 sq. meters of corporate office space. Areas for retail establishments, hotels and restaurants, extensive green spaces and a purpose-built media park are also on offer for the Port Praski project. Enhanced video security Creating a safe and secure environment to live, work and relax in was a priority for Port Praski’s developers Creating a safe and secure environment to live, work and relax in was a priority for Port Praski’s developers. To achieve this, Bosch Building Technologies was selected to provide an integrated solution that spans fire detection systems, video security and a site-wide building management platform. So why choose Bosch? First and foremost, Port Praski’s developers needed a trusted partner with the scale, technical expertise, resources and track record to provide support through all phases of such a large, multi-stage project over an extended period of time. Recognition and trust of the Bosch name was also a big advantage for the port, reflecting the high expectations of residential and commercial clients for the quality and exclusivity of their environment. Bosch Video Management System Round the clock security is provided by a blend of bullet-, dome- and PTZ moving IP cameras by Bosch that keep watch over outdoor and underground areas, building entrances, garages and elevators. Centralised control of cameras, storage and recording systems is streamlined by the intuitive, easy to use Bosch Video Management System (BVMS) that can scale as needed to accommodate video, audio and data from thousands of cameras. Port Praski required a video security solution that would ensure privacy and discretion for its up-scale residents who include VIPs and celebrities. To achieve this, camera images are carried over a totally private IP network that’s isolated from the Internet to prevent hacking or interception of sensitive data. Extra peace of mind for occupants is assured by the video management platform’s masking function that obscures apartment windows and other ‘private’ areas from the outdoor cameras’ field of view. Fire detection and alarm system deployed They have chosen the Modular Fire Panel 5000 Series from Bosch, which meets latest legislative requirements The developers of Port Praski also demanded a state-of-the-art fire alarm system to maintain round-the-clock safety of residents, businesses and visitors. Therefore, they have chosen the Modular Fire Panel 5000 Series from Bosch, which meets latest legislative requirements. What’s more, it gives occupants and tenants the assurance of a reliable solution to minimise false alarms, together with effective redundancy across the system to avoid any single point of failure. Protection of at-risk areas includes optical and optical-thermal detectors in garages and smoke aspiration system in lift shafts, plus further detectors in inter-ceiling spaces. Building Integration Platform BIS The system is complemented by the Building Integration Platform BIS, which supports centralised management and monitoring of distributed security systems across the entire site. Port Praski is growing all the time. That is why site developers required a future-proof solution with the capacity, bandwidth and flexibility to scale smoothly with plans for the port’s further expansion. As an illustration of this, video security systems can be upgraded as required by adding higher resolution cameras, without requiring replacement of the current IP network infrastructure and BVMS. Similarly, further phases of construction may see the number of installed security cameras – already numbering in the hundreds – increase significantly over the next few years.
Sitting on the banks of the river Niger in West Africa is Niamey, Niger’s capital city. The capital city faces some unique challenges to the safety of its local residents and visitors. To help tackle these issues, the government of Niger is working with Hikvision’s West Africa team to install a state-of-the-art, cutting-edge video surveillance solution across the region. Niamey has a history of trade and commerce. Its large and bustling open air market – the Grand Marché – sells everything from clothes, to jewelry, to food, and attracts an estimated 20,000 tourists a year. But while the city has long been known as one of the more relaxed capitals of West Africa, in recent years Niamey has received high profile attention due to criminal incidents in and around the capital city. African Union Summit The city would also receive high profile guests from around the world, including key personnel from the UN and WTO When it was announced that Niamey would host the 33rd Session of the African Union (AU) Summit for the very first time, the Government of Niger decided to seize the opportunity to establish a complete urban video surveillance network. It was vital that this high profile event could run for the full five days without any disruption or untoward incidents, as Niamey would attract visitors and heads of states from across the continent. The city would also receive high profile guests from around the world, including key personnel from the United Nations and World Trade Organisation. Complete video surveillance solution Vincent Wang, Technical Support Engineer for Hikvision West Africa, says, “The AU Summit is a key event in Africa’s diary, and always requires a high security presence. It gave us the ideal springboard for launching a complete surveillance solution that would provide security to those in attendance, while giving the city a robust set of tools to help prevent and manage security incidents long into the future.” When seeking out the ideal surveillance solution for this project, the Government of Niger learned about several similar projects that Hikvision had already completed in African cities and was impressed how well the solution is running. “They wanted to emulate a project, so that’s what we set about doing.” says Vincent. Hikvision high resolution cameras Vincent and the team worked with technology partners, ITS Solutions to design a complete urban surveillance network in Niamey, which would protect residents and visitors across the whole city during the summit and beyond. Central to the solution was the installation of more than 100 Hikvision high resolution cameras for 24-hour monitoring of the city. Along the 12 main roads, and at key intersections throughout the city, the government’s security team installed the Hikvision DarkFighter 2 MP Speed Dome Cameras (DS-2DF8225IX-AEL). These cameras are designed to deliver high quality images in low light or dark environments. They are also equipped with license plate recognition technology so as to effectively identify vehicle violations, such as over speeding or other traffic rules violations, even at midnight with no light. Hikvision PanoVu Series 180° Panoramic + PTZ Cameras Security personnel can also know close-up details of the scene with the 180 degree panoramic PTZ cameras Meanwhile, Hikvision PanoVu Series 180° Panoramic + PTZ Cameras (DS-2DP0818ZIX-D/236) were installed at the entrances and exits of the main government offices and hotels, for reliable surveillance and overall protection of all visitors with panoramic view at the time of the summit event. Security personnel can also know close-up details of the scene with the 180 degree panoramic PTZ cameras. And the high speed PTZ also offers the function of fast detail positioning over the panoramic area. In the control center, security teams were given Hikvision iVMS-8600 video management software (VMS) in conjunction with large LCD monitor screens, to display a live stream from all the city’s surveillance cameras. Hikvision’s urban video security solution also includes mobile surveillance, allowing law enforcement or government officials to use a mobile device to see a live stream from any Hikvision camera installed in the city, even while on the move. Enhancing network infrastructure The installation was thoroughly planned. “The existing local infrastructure provided some challenges,” says Vincent. “But we investigated it fully during our test phase, so we could design a surveillance network to suit”. “For instance, we found a few potential issues with the local power supply, but to remedy this we installed a UPS network to guarantee power to the cameras for at least 2 hours should the grid fail. We also assessed the local network infrastructure, and the ambient lighting at night. This work was fully completed during our proof of concept several months before the summit.” Hikvision surveillance solution for smart city The African Union Summit was well received and passed without event. The Hikvision surveillance solution undoubtedly played a key role. “The people of Niger feel a certain confidence when talking about the summit,” says S.E Brigi Rafini, the Premier Ministre, at the government of Niger. “It couldn’t have happened without the support of Hikvision technology. The comprehensive security solution was central to the event’s success.” Counseil de Bureau de Securité at the Government of Niger kept positive attitude towards the future potential of this solution. “Thanks to Hikvision technology, Niamey now has a comprehensive city safety solution that will help us to both prevent crime, and respond in real time when incidents do occur. It’s a landmark project for our country and the region as a whole, and we are very interested to see how this innovative technology can help our city and our people to be safer.”
Idesco devised a transparent reader to simplify Infobric’s construction site system management, making it powerfully adaptable to widely different market needs and technology standards. For a while, construction sites have provided a textbook example of how much electronic access control systems can benefit managers. Controlling access to a site, including restricted zones, machinery access (such as lifts and elevators), increases both security and safety, while also helping track authorised personnel and even equipment utilisation. Ensuring regulatory compliance Infobric Ease possesses a wide range of functionality, from site access to energy control and much more An automatic, electric system, with that much functionality combined in a single service meets a high-value need in the construction industry. Today, Infobric provides a cloud-based digital platform, Infobric Ease, to help construction site managers monitor and secure key elements, such as site safety, while increasing worker productivity and ensuring regulatory compliance. Infobric Ease possesses a wide range of functionality, from site access to energy control and much more. In addition to simplifying site management and boosting worker productivity, it simplifies sites’ compliance with staff ledger regulation across a number of European countries. Worker productivity has been enhanced by the elimination of queues to register new staff on site and attendance. Lastly, controlled access increases worker safety while reducing theft and vandalism. Simplifying worker attendance monitoring Cloud management contributes even more to time and labour cost savings while also letting site owners conveniently fulfil their law-mandated employer obligations. To prevent tax avoidance and illegal workers, some European countries require construction site managers to upload the employee data registered in their staff ledgers – which Infobric Ease also provides, thereby also simplifying worker attendance monitoring. In short, the digital tracking of all this data saves significant time and money. The RFID industry commonly labels this type of reader ‘transparent’, because it seamlessly transmits transponder data Infobric integrated Idesco’s 9 CD 2.0 Slim Pin T reader into Infobric Ease as its vital front-end interface with construction workers. The RFID industry commonly labels this type of reader ‘transparent’, because it seamlessly transmits transponder data – fully-encrypted to ANSSI Level 1 Architecture specification – directly to a system, without any mediating keys. This lets systems themselves directly control all aspects of transactions – including data collection and reader response – resulting in both a highly secure and a cost-effective solution. Several identification card standards For integrators like Infobric, 9 CD 2.0 Slim Pin T’s direct, ‘transparent’, interaction between transponder and system not only simplifies transactions. It also lets them use more of the available features in the chips in workers’ transponders. This further benefits site owners and security managers because system updates can be implemented with greater agility and cost savings. “There are several identification card standards we adapt our products and systems to work with. So, we really wanted a card reader we could use in all our markets, without needing different hardware updates after a system upgrade or launching a new functionality across our different markets. The ‘transparent’ reader from Idesco turned out to be the perfect solution”, says Björn Hilliges, IT & Electronics Director at Infobric. Product design and expertise Every month, the Infobric Ease system handles approx. 11,000,000 card readings" “Infobric and Idesco have been co-operating for more than 10 years and through several product development projects. Over the years, Idesco repeatedly demonstrated their excellent quality in both product design and expertise, always providing us with products and solutions that reliably withstood very rough, inclement conditions amid frequent use at our customers’ construction sites,” says Björn Hilliges, IT & Electronics Director at Infobric. “Every month, the Infobric Ease system handles approx. 11,000,000 card readings. So, Idesco is a key partner for Infobric, and each day their readers fill a vital role at approx. 15,000 construction sites,” says Björn Hilliges, IT & Electronics Director at Infobric. Convenient regulatory compliance Infobric ease benefits for construction sites Convenient regulatory compliance on staff ledger registration in numerous European countries Increased productivity by reducing administrative tasks Time savings from agile system updating (despite differing card standards in different markets) because reader updates are no longer needed Enhanced reader functionality for workers with included keypads Reliability of Scandinavian-designed readers that are robust, weather-proof, maintenance-free Sites can now substantively help prevent undocumented labour and unprofessional contractors Infobric Ease features: Cloud-mediated service Seamless data collection Energy control Regulatory-compliant staff ledger Automated electronic access Mobile attendance & access Staff access control Vehicle access control Machine control Smart locks Making construction sites safer Infobric designs systems that make construction sites safer, more productive and reduce costs. Infobric’s solutions ensure the right people are in the right place at the right time at the site. Infobric provides with the best-working solution for the worksite, for both work hours and after, in packages that have been serving successfully on European construction sites large and small. Their goal is to become the digitisation partner for the construction industry in the Nordics. With 30 years of experience, RFID technology pioneer Idesco Oy makes RFID readers, transponders, controllers and touch screen devices. Every day, for customers around the world, their devices collect data and enhance security for a variety of access control, vehicle identification, logistics and inventory systems.
Hanwha Techwin America, a global supplier of IP and analogue video surveillance solutions, announces that Planet Fitness, with the help of their preferred system integrator Adirondack Direct, recently incorporated a video surveillance solution from Hanwha Techwin and Genetec that not only enhances security but also improves operations. Each of Planet Fitness’ corporate-owned clubs throughout North America is outfitted with approximately eight to 15 video cameras that provide around the clock coverage of the parking lot, lobby, break room, the fitness area where members workout and other key areas – without invading private areas, such as locker rooms and other intimate spaces. Intelligent motion detection Hanwha’s SNF-8010 5 MP 360-degree fisheye camera provides 5MP at 20FPS which captures smoother video After issuing a Request for Proposal, Planet Fitness Senior Vice President of Corporate Club Operations Jim Esposito said they tested several of the camera and Video Management Systems (VMS), but ultimately decided on Hanwha video surveillance cameras managed by the Genetec Security Center unified platform. Esposito said they wanted to use Hanwha’s 360-degree cameras in particular because they provide more coverage, yet they save in hardware expenses because fewer cameras are needed. Hanwha’s SNF-8010 5 MP 360-degree fisheye camera provides 5MP at 20FPS which captures smoother video at a higher framerate with true day and night function. Built-in on-camera de-warping allows instant access to PTZ, quad view, and panorama views. Alarm triggers for the Hanwha SNF-8010 include intelligent motion detection, audio detection, tampering detection, alarm input and network disconnection. Providing bookmarks of recorded incidents A typical system setup at Planet Fitness includes placing cameras 25 feet from the wall and 50 feet apart which provides almost 2,000 square feet of coverage per camera. Club managers, regional managers and corporate employees manage the system via the Genetec Security Center which provides convenient bookmarks of recorded incidents so that – instead of time spent searching through video – events are already tagged. Adirondack Direct also offers a 24-hour monitoring service and liaisons with law enforcement when needed. “We knew that Planet Fitness would need thousands of video surveillance cameras for this project and it’s very important to consider reliability and functionality as well as durability,” said Adirondack Direct Director of Security and Technology, Tim Collins. “Hanwha has the lowest customer return number and that means that they manufacture products that aren’t sidelined by constant replacement and repairs.” Video surveillance management Anyone engaging in obnoxious behaviour will likely be the recipient of a Lunk Alarm and the flashing lightsCollins said Adirondack Direct has long recommended Security Center from Genetec for video surveillance management because it provides the best open-architecture platform, robust features and is easy to use. Security Center blends IP security systems within a single intuitive interface to simplify operations and empowers organisations through enhanced situational awareness, unified command and control and connectivity to the cloud. While the Hanwha-Genetec solution has provided an excellent security system – as well as protection against liability for slip and fall incidents – it’s also improved operations in multiple ways by providing invaluable business intelligence, said Esposito. Planet Fitness has a judgment-free environment for individuals who want to work out, but don’t want to have to endure the negatives so often found in gyms: loud grunts, the clanging of dropped weights and aggressive behaviour. Anyone engaging in obnoxious behaviour will likely be the recipient of a Lunk Alarm and the flashing lights, sirens and unwanted attention that accompanies it. Providing video evidence When a Lunk Alarm is pressed, Security Center creates a bookmark of the event Use of the Lunk Alarm – or lack of use – can be an indicator of how the club is operating. In order to monitor and evaluate the use of the Lunk Alarms, Adirondack Direct has integrated the Lunk Alarm into the Hanwha-Genetec video solution. When a Lunk Alarm is pressed, Security Center creates a bookmark of the event which provides video evidence of what preceded the alarm and how it was managed. Gyms typically have automated external defibrillators (AEDs) in the event a member suffers a medical emergency. At Planet Fitness facilities outfitted with the Hanwha-Genetec solution, once an AED is removed from its cabinet, a sensor is activated to shut off the music in the club to provide a calmer atmosphere. The system also creates a bookmark in the VMS and notifies managers and regional managers that an AED has been deployed. Identifying areas of improvement The Hanwha-Genetec Planet Fitness solution also provides key employee analysis that can help managers identify areas of improvement. Each facility has rubber floors that must be cleaned daily and Adirondack Direct has placed a sensor on a floor scrubber that creates a bookmark and recording in Security Center when the device is moved. Video evidence verifies whether the floor was actually cleaned or if the scrubber was just relocated. Planet Fitness management can re-orient that employee on the proper policies and procedures Each break room is outfitted with a sensor that creates a video bookmark every time the door is opened. If an employee visits too often, Planet Fitness management can re-orient that employee on the proper policies and procedures. For day to day efficiencies, video analytics can be a valuable tool. If an employee is constantly leaving the front desk to go to a storage closet for a particular item, they can make changes including moving the item closer to the front desk. Losing sales opportunities “If during an overnight shift the camera indicates that there was no motion at the front desk for a prolonged period of time, then that’s a problem,” said Esposito. “We expect someone to be in that position greeting and welcoming members so if someone isn’t there, the video can help us understand why.” A big question for Planet Fitness is have they been losing sales opportunities without realising it? A big question for Planet Fitness – that can be answered via video analytics – is have they been losing sales opportunities without realising it? “What we’re exploring now is a virtual line that counts the number of people that come and go in the club,” said Esposito. “We know how many people check-in. So, if a club checks in 500 people in a day, but there are 600 people that enter the door, that can be lost revenue.” Delivering a safe environment Esposito said they chose Hanwha cameras and the Genetec platform because they knew that they needed a solution that was at the forefront of technology, with the flexibility to grow with them and meet their future needs. He added the solution delivers a safe environment that is appreciated by everyone. “It’s somewhat of a security blanket for our members and employees,” he said. “They appreciate our no intimidation mantra and the fact that we have created this safe and secure environment that offers a judgment-free zone where people can do their own thing.”
Round table discussion
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
You could say concerns about privacy are “trending” in our increasingly data-driven world. Unease about how Facebook and other high-tech companies use and share data dominates the news, and the full impact of new European Union (EU) regulations is about to be felt around the world. By May 25, companies that collect data on EU citizens will need to comply with strict new rules around protecting customer data, as enumerated in the General Data Protection Regulation (GDPR). But how do the new regulations, and broader concerns about privacy, affect the physical security market? We asked this week’s Expert Panel Roundtable: How do privacy issues and regulations, such as GDPR, impact physical security systems and how they are managed?