Razberi Technologies has extended its software platform to integrate deeper with video management software (VMS) from Milestone Systems, providing increased uptime assurance, cyber threat protection and faster problem resolution. Monitor security network With Razberi Monitor™, security professionals can securely and remotely monitor their physical security network – especially relevant during these times of social distancing requirements. IT professionals can quickly review cyber s...
Telguard, a provider of security and life safety communications, announced that it’s partnering with sister company AMETEK Land to offer the VIRALERT 3 Integrated Human Body Temperature Screening System as part of its security distribution channel offering. The VIRALERT 3 is a non-contact temperature monitoring camera that detects body temperatures as people enter a building while maintaining appropriate social distancing. The VIRALERT 3 builds on AMETEK Land’s expertise in temperat...
Intelligent Insights is a new software tool that brings together every element from scene to screen, from intelligent cameras enabling video data capture and interpretation, to the visualisation and reporting of data in one simple overview. Using data to improve security, safety, and business decisions has become increasingly important to the market and continues to grow. Intelligent Insights Now, Bosch has introduced an affordable software solution, called Intelligent Insights that enables cu...
Custom Consoles reports strong demand for the Operator Safety Screen since its first shipment in early May. Customers to date include Al Jazeera, Amazon Prime, BBC Studioworks, BETV, CJP, Dega, Farnborough College, Gravity Media, IMG, Input Media, ITN, ITV, One Ten Productions, QVC, Racing UK, Solenis, STV, STV North and TimeLine. With over 300 sales in three months it is one of the fastest selling new products in Custom Consoles' history. “Broadcast media studios are gradually returning...
Pivot3, the provider of intelligent hyperconverged infrastructure solutions for mission-critical video, announces significant automation and intelligence enhancements to its Acuity software platform to address the system administration, maintenance and availability challenges often faced in large-scale video surveillance deployments. The new intelligent system health and best practices analysis features provide significant reductions in total cost of ownership, ensure 24 x 7 system uptime in la...
The thermal imaging camera automatically detects the hottest temperature within an area, set by the operator. A colour alarm makes it easy to decide whether a person needs further screening. A thermal imaging camera can be an effective screening device for detecting individuals with an elevated skin temperature. This type of monitoring can provide useful information when used as a screening tool in high-traffic areas to help identify people with an elevated temperature compared to the general p...
Building on the success of HID’s Mercury, HID Global, a worldwide provider in trusted identity solutions, has announced the HID Aero platform featuring its next generation of open-architecture intelligent controllers that increase choices for a wide range of businesses while future-proofing access control investments as requirements change. “HID Aero is providing a broader market with features that were generally available only in solutions for larger organisations, while eliminating the ongoing cost and complexity of designing, manufacturing and maintaining panel hardware at the same time,” said Jaroslav Barton, Director of Product Marketing at HID Global. “It also brings end-to-end security to everyday applications with encrypted communication and threat detection, and robust features to meet corporate compliance.” Access control software with low maintenance Based on HID’s Mercury hardware used in more than four million panels shipped globally, the HID Aero platform speeds development time for access control solution providers by including all required hardware, firmware, software and development tools. Benefits for users include: Easily adaptable to evolving requirements: Users can choose from a large variety of access control software providers when deploying solutions. Systems are also easy to migrate to new software and highly configurable to dynamically enhance situational awareness. Lower installation and maintenance costs: HID Aero enables remote management capabilities with HID readers supporting Open Supervised Device Protocol (OSDP), including its recently announced Signo readers with built-in support. This minimises the need for field inspection and reconfiguration. Key encryption and backward compatibilty End-to-end security from credential to host: HID Aero brings to smaller businesses many features generally available only in enterprise-class solutions, including host and controller authentication, encryption to protect keys and sophisticated threat detection. Trusted reliability, proven technology: Based on HID Mercury panel hardware and system technology, the durable controllers fit in the same footprint as earlier HID VertX® controllers and are backward compatible with HID VertX modules to simplify upgrades.
FLIR Systems, Inc. announced availability of the FLIR Occupancy Management Solution for FLIR Brickstream 3D Gen2 to automate occupancy counting within high traffic and capacity-limited areas. To support social distancing guidelines during and following the COVID-19 pandemic, the Occupancy Management Solution provides organisations with an easy-to-use, real-time capacity counting and display tool for multiple entries and exits. Organisations can automate capacity counting for high foot-traffic spaces to maintain social distancing compliance. “Many organisations are manually measuring occupancy, but this process is often inaccurate, cumbersome and expensive,” said Paul Clayton, General Manager, Components Business at FLIR Systems. Automated monitoring solution “FLIR addressed this challenge by introducing a cost-effective, scalable, self-contained, and automated monitoring solution suitable for a variety of locations from grocery stores, stadiums, theaters, transportation hubs, to manufacturing plants, and office spaces.” Current Brickstream 3D Gen2 customers can purchase and add this feature with via a remote firmware upgrade The Occupancy Management Solution is platform agnostic with an integrated IoT architecture, which can be implemented within existing Wi-Fi access points, offering a complete edge-based solution with the Brickstream 3D Gen2 hardware. It provides a simple display dashboard for capacity updates that can be viewed by staff or customers on devices with a web browser. Remote firmware upgrade It may be used as a standalone or integrated into existing perimeter systems, making it ideal for most environments where occupancy must be closely managed. Current Brickstream 3D Gen2 customers can purchase and add this feature with via a remote firmware upgrade. This solution is part of FLIR Systems’ COVID-19 response product portfolio, which includes the FLIR EST camera series, to help organisations improve safety in public places and other high traffic areas. The FLIR Occupancy Management Solution for Brickstream 3D Gen2 is available from FLIR and its global Brickstream distribution partners.
Following on from the UK Government’s announcement of additional support for apprenticeship schemes, CEO Amthal Fire & Security, Jamie Allam shows the vital role Apprentices have played, and how their employment continues to be a key strategy to the company’s success. "Over 700,000 people are leaving education this year and many more are just starting out in their careers. Coronavirus has hit them hard. We cannot lose this generation." Fire and security industry This was the outlook of the Chancellor Rishi Sunak as he delivered his Summer Statement and offered employers a significant financial incentive for hiring apprentices over the next six months. Amthal has always been a big supporter of Apprentices as a way to create a more open business environment. Apprentices gave the company a new dimension to hone in skills and be able to adapt to new innovations Since the company started their apprentice programme over 15 years ago, they have employed, retained (and promoted) the majority of their Apprentices, who have been supervised by the company’s senior team, and now even form part of their management structure, because the company values the opportunity to encourage job-specific skills to achieve more of their customer demands, quickly and efficiently. And they would encourage others in the fire and security industry to consider the same outlook. Smart security technologies Apprentices for Amthal, have proven through the years, incremental to solving issues such as the skills shortage in the industry. People have no long-term experience and there has been a lack of engineers understanding the specific disciplines of the industry, instead being trained as ‘multi-disciplined’ which often does not suit the intricacy of design in security and fire safety. Apprentices gave the company a new dimension to hone in skills and be able to adapt to new innovations, and embrace smart security technologies. In fire safety, there is an essential way Apprentices can rise to a challenge and requirement for a clear understanding to help combat the findings such as those of Dame Judith Hackitt, which highlighted the shortcomings in the wider fire and security industries following the Grenfell Tower fire. Developing technical competence The whole of the industry needs to work together to correct years of training neglect by proving and developing the technical competence held by its existing operatives, so they can work on making such tragedies a thing of the past. New apprentices, with an ambition to learn a trade, can embrace the opportunity for change. The company has had to quickly understand modern methods of communication and embrace new technologies The essential requirements of key workers through lockdown to keep the UK safe and ‘protect what’s precious’ has filtered into the ‘new normal’ as companies and hospitality industries looked to achieve Government mandates on controlling the Coronavirus. Together, the company has had to quickly understand modern methods of communication and embrace the new technologies available quickly and efficiently. Body temperature monitoring systems Again, throughout this pandemic, they joined the country in learning new ways to communicate with their teams, embracing performance management and employee engagement technology that helped them grow stronger. The industry has had to meet the incredible uptake in demands for people counting and access control body temperature monitoring systems, together with latest thermal camera technology. Apprentices build on the creation of the positive business culture, upon which all their sustainable growth resides. Amthal has three Apprentices on their engineering team currently, one who starts college in September. They are looking for an additional Apprentice to support their growth in Building, Block Management and the facilities management industry. And in addition, another Apprentice will support their team in Finance. Fire safety Apprenticeships are an excellent way to get into a wide range of rewarding and valuable careers" In summary, the Government’s funding is limited and inevitably, now is the time for the fire safety and security industry to act before the opportunity is expired. For Amthal, the new generation and the apprentice programme, allows each individual to settle into their defined role, learn their skills and take responsibility with their dedicated line manager for their own growth. In the company’s experience, they would agree with Apprenticeships and Skills Minister Gillian Keegan who said: “Apprenticeships are an excellent way to get into a wide range of rewarding and valuable careers.” Technical challenges Amthal has, from early on in their business life, certainly reaped the benefits of introducing Apprentices to their company. And if the COVID-19 pandemic has taught them anything, it’s that future planning is not a luxury, but a necessity to be able to take on change and the technical challenges that their industry faces. For Amthal, whilst they may not have been able to celebrate their 20th anniversary as the company had intended, they look forward to their 25th and 30th with the same passion and drive as they do now, with Apprentices forming an essential part of the company’s team, product and service development.
A hotel environment is fast-paced and ever-changing, with staff and guests coming and going 24 hours a day. Despite this, it is a business owner’s job to ensure that the building - and everyone in it - is safe and secure. CLIQ® technology from security provider Mul-T-Lock offers a smart security solution for all types of hotels, resorts, holiday parks, B&Bs and short-break properties. eCLIQ for hotel chains and resorts Mul-T-Lock’s eCLIQ access control system utilises CLIQ® technology to allow hotel chains and holiday park resorts to manage access permissions remotely, from one central location, anywhere in the world. This includes the ability to schedule individual access permissions for each key, as well as to provide time-limited access. This is ideal for hotel chains with complex access and security requirements, as it allows tailored access for members of staff who may be coming and going at various times of the day, and also enables administrators to grant time-limited access to contractors and delivery drivers. If a key is lost or a member of staff leaves, access can also be revoked, which is particularly useful for chains and parks with a high staff turnover, or those that employ seasonal staff for busier times of the year. This not only offers enhanced security but also significantly reduces whole life costing, as it removes the need to replace physical locks; and keys can be validated daily, weekly or monthly to keep them continuously secure. The system’s audit trail capabilities also allow business owners to access comprehensive data Access Data can be used for audit The system’s audit trail capabilities also allow business owners to access comprehensive data illustrating who accesses which lock and when; ideal for those who are concerned about staff shrinkage or those who want to determine who should have access to certain assets. Working on a modular system, eCLIQ locks are quick and easy to install with no cabling required. Not only is maintenance not required for up to 200,000 cycles, but key batteries are also fast and easy to replace once every 30,000 operations, at a nominal cost to the business, with no need for specialist tools. CLIQ Go for B&Bs and short-break properties Just one key can access doors, cupboards, elevators, machines and many other locking devices With short-break properties, access is needed by a variety of personnel who all have their own individual requirements. Business owners, delivery drivers, cleaning staff and of course guests themselves, are just a few examples of people who each require specific access permissions. Mul-T-Lock’s CLIQ Go access control system allows small to medium-sized short-break property owners to remotely manage security ‘on the go’. It boasts all the benefits of eCLIQ, but can be managed by a designated administrator via the CLIQ Go app. This includes the ability to schedule individual access permissions for each key, provide time-limited access, and revoke access to particular keys as and when needed - making it particularly useful for properties that have a constant turnover of guests. One key for multiple access devices The high security locks are easy to configure, are suitable for all door types and can be easily fitted by a local locksmith. With no cabling, the cylinders can be retrofit to existing doors without causing any mess or disruption. All eCLIQ cylinders are suitable for a number of different applications, from drawers and cabinets housing confidential documents to all-weather padlocks for exterior gates. In fact, just one key can access doors, cupboards, elevators, machines and many other locking devices.
The same strength and reliability and durability experienced with Viking’s standard ADA compliant emergency phones is now available in a compact chassis. “All the function and long-lasting durability of a Viking emergency phone all wrapped up in a sleek compact chassis, plus – we have some new colours!” – Greg Yocom, Engineering Manager, Viking Electronics. Handsfree emergency communication When the button is pressed, the compact emergency phones automatically dial a pre-programed emergency phone number or central station number. The phones will roll to the next number if there is a busy signal or no answer, and will continue to dial until the call is answered. The red ‘Call Connected’ LED is built into the button and can be initiated manually or automatically to indicate the call was received. Viking’s compact emergency phones meet ADA standards for handsfree emergency communication in elevators, areas of refuge, or any place an emergency phone is needed. The ADA compliant phones provide a single push-button auto dialer, call indicator light, pre-recorded location announcement, and a tactile braille label. All programming parameters, including phone numbers and location numbers, are stored in non-volatile memory. The units are phone line powered, requiring no batteries or external power and are compatible with common Central Station Monitoring equipment. The compact phones are available in 6 different models: red, yellow, black, stainless steel, or blue chassis with ‘Emergency Phone’ verbiage, as well as a blue chassis with ‘Police’ verbiage.
Sonitrol of SW Ohio has acquired Sonitrol of Butler County and their non-Sonitrol company Southwestern Ohio Security. The acquisition officially closed effective July 6th, 2020. The firm, that operates an independent franchise of Sonitrol, has served the Greater Cincinnati and Northern Kentucky areas since 1971. Business expansion The expansion is reflective of both their ongoing commitment to local and surrounding communities as well as a market need in both the residential and commercial security sectors. Strategically, the acquisition affords consolidation, uniform local monitoring from their proven Central Station, and will establish additional market penetration in Southwest Ohio and Northern Kentucky. “We’re excited about the opportunity to do what we do best for even more people and businesses across Southwest Ohio and Central Ohio,” said Chip Shiver, President of Shiver Security Systems and Sonitrol of SW Ohio, adding “Our technology, our local monitoring station, and our ever-important partnership with local police are the key factors in our continued growth.” Strategic acquisition It’s always about people and we believe we have the very best talent in the region when it comes to professional security" Chip adds, “It’s always about people and we believe we have the very best talent in the region when it comes to professional security. Combining two organisations with a very similar footprint in relatively the same market makes this acquisition very exciting for us. Simply put, we are merging two longtime Sonitrol families, which create additional market penetration for the organisation.” Mike Pope, President of Sonitrol said, “The merger of our staffs will provide our clients with a local U.L. central station and an increased number of technicians to provide a level of service unmatched in Southwest Ohio and Northern Kentucky. Many of our family members over the decades have been a part of our organisation.” He adds, “Our dedicated and professional staff, which has been dependable and loyal for 48 years, is family too. Rex Shiver and Jim Pope built the foundation for both companies. I am sure that Rex and Jim are looking down and saying, Congratulations sons!" Sonitrol of Butler County Sonitrol of Butler County was established in the early 70’s by Mike Pope’s father, Jim Pope. Mr. Pope stepped in to take over from his father several years ago to grow and run their organisation. Pope and Shiver share a similar story of family leadership. The two also recount a bit of nostalgia as Shiver’s father sold Pope’s father his Sonitrol franchise nearly fifty years ago. Sonitrol of SW Ohio continues to add local security professionals to their roster making them one of the largest security firms in the region.
Insider threat programmes started with counter-espionage cases in the government. Today, insider threat programmes have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a programme, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organisation Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organisation. They can cause brand and financial damage, along with physical and mental damage. Insider threat programme Once you determine you need an insider threat programme, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a programme Next, get a top to bottom risk assessment to learn your organisation’s risks. A risk assessment will help you prioritise your risks and provide recommendations about what you need to include in your programme. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat programme will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a programme and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of programme needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the programme. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the programme, build the culture and promote awareness. Teach employees about the behaviours you are looking for and how to report them. Behavioural analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organisation need to detect insider threats? Organisations need software solutions that monitor, aggregate and analyse data to identify potential threats. Behavioural analysis software looks at patterns of behaviour and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behaviour of people and notifies security staff when behaviour changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviours and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behaviour, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behaviour. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organisation has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat programme. Big companies should invest in trained counterintelligence investigators to operate the programme. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behaviour Using the right technology along with thorough processes will result in a successful programme You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behaviour and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat programme. IT is the most privileged department in an organisation. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat programme takes time and patience. Using the right technology along with thorough processes will result in a successful programme. It’s okay to start small and build.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organisation. Time-intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralised operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analysed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood management assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental control assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway management and parking assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper experience assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognise and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing business intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A natural cross-over technology This trend towards integration has forever changed how organisations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyse what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalise on that connection is only limited by our imagination.
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetisation Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is changing and evolving. New entrants in the monitoring space New entrants in the monitoring space face barriers to entry, in particular the need for more investment"“New entrants in the monitoring space face barriers to entry, in particular the need for more investment in infrastructure and expertise,” said Spencer Moore, Vice President of Sales and Marketing, Rapid Response Monitoring. ”Because of the expense of new technologies, more full-service monitoring companies are outsourcing the monitoring function to existing wholesale monitoring companies.” “The cost of entry has gone up, and companies are trying to preserve capital,” agreed Jim McMullen, President/COO at COPS Monitoring. “Larger companies are realising wholesale monitoring does a better job from a customer service viewpoint. We are more focused on monitoring and the quality of service. It takes a lot of money to keep up with the cyber world,” added McMullen. Wholesale monitoring companies Wholesale monitoring companies are finding that they need petabytes of storage space, among other expensive requirements. “The trend is toward technology evolving quicker, and that often requires investment and training in a monitoring center,” said Daniel Oppenheim, CEO of Affiliated Monitoring. “Because trying out new technology is so important, wholesale monitoring centers often find that they serve as a ‘laboratory’ to experiment with newer technologies. Limited trials often expand later to broader outsourcing of a company’s monitoring services”, said Oppenheim. Automated Secure Alarm Protocol “What people miss out on is that monitoring is quite complex, and there are specialised services and skillsets, and barriers to entry from a regulatory perspective,” said Moore. Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service. The national service saves time, improves accuracy and increases efficiency in communications between monitoring centers and public safety answering points (PSAPs). The service uses the Automated Secure Alarm Protocol (ASAP). Public Safety Answering Points Up to 60 PSAPS have joined the programme, although the low number is misleading, given that a single PSAP could represent the ‘City of Houston’. (There are an estimated 6,000 total PSAPs nationwide). It has taken six to eight years to develop the program from its genesis to where it is today, when more participation is finally creating a critical mass. Technology is fundamentally changing monitoring companies. “We used to be a services company powered by a little bit of technology, but we’re now moving toward a technology services company,” said Moore. Critical ‘filtering service’ Monitoring provides a critical ‘filtering service’ between public requests for emergency service and those tasked with providing the services. In effect, monitoring centers work with manufacturers to make them more resilient to false alarms. Monitoring companies also provide a human touch in a time of need, and emotional empathy. Today, emergency information is being transmitted to PSAPs electronically, which saves time and money. The current low-taxation environment means there are fewer resources for municipal governments, so cost savings make a difference. Monitoring, a specialised skillset Increasingly, monitoring is becoming a business that requires a more specialised skillset Increasingly, monitoring is becoming a business that requires a more specialised skillset. Regulation, and the need for increasing investment, is driving consolidation. “With a decreasing number of monitoring companies, there are fewer customers for software developers and other tools. Less outside innovation makes it more likely monitoring centers will have to ‘go it alone’ and develop software and other tools internally,” said Oppenheim. Importance of monitoring systems “In effect, consolidation will serve to limit technology choices, and to increase the need to in-source a lot of expertise”, agrees Moore. Tying monitoring systems into other software systems is another continuing challenge. “People want our system tied into their system,” said McMullen. “I have two people who focus full time to tie our systems into other systems. There will be more computers talking to computers.”
All schools and universities need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Data capture form to appear here! Facilitating visitor entry Electric strikes are able to control access via keypads, cards and proximity readers Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. More and more schools are installing visitor management systems to control who can and cannot get into the building. Access control solutions Finally, the third level – and the most vulnerable – refers to the core of the school that both students and staff occupy. These are internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. The access control system is linked to all doors within the school building A number of different access control solutions are beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralised systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralised systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Prevent unauthorised persons Mechanical solutions, which include a cylinder lock and key, are also suitable for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorised persons from entering. At one university in the United States, a smart RFID wire-free access control solution has been installed At one university in the United States, a smart RFID wire-free access control solution has been installed. The SALTO Virtual Network (SVN) wire-free system pushes and pulls data from the university’s ‘hot spot’ entry points to all their offline locks. By choosing a wire-free solution, the university only had to run wires to their exterior doors. The interior doors do not require wiring as these locks are stand-alone wire-free locks. Student accommodation block Securing access to student accommodates is another concern among colleges. One university in the United Kingdom wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. They chose Vanderbilt’s ACT365, which keeps audit trails by monitoring and recording fob activity. When another English university sought electronic locks for its newest student accommodation block, it turned to Aperio wireless locking technology from ASSA ABLOY. They used the wireless locks to extend the Gallagher Command Centre access control system to a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates. Aperio wireless locks are battery-powered and use less energy than wired magnetic security locks.
Commenced in 2016, the large business club was built with smart infrastructure and modern amenities, in the futuristic town of Kolkata, to provide leisure-cum-business conducive atmosphere to their members and visitors. The contemporary building of business club is spread over 10 acres area and serves as a cultural, commercial, and business hub in the region. Having a beautiful landscape, it attained tremendous popularity due to its high-end specifications, green landscape, wedding lawn, tennis court, cafeteria, business centre to name a few. Missing real-time video surveillance With a consistently large volume of patrons visiting the business club for various events, security is the vital component of the successful operations at the site. The customer has been relying heavily on analogue video surveillance to secure its facilities and workforce. Due to its limited scalability, there was no way to do real-time surveillance throughout the premises. Moreover, every incident recorded by the video cameras required time-consuming manual investigation, therefore, causing delay in decision-making. Aiming to advancing the surveillance solution, the customer wanted to make an investment to maintain a watchful eye, manage threats/incidents proactively along with integrate existing and new system into the unified interface. Videonetics Unified Video Computing Platform Intelligent Video Analytics (IVA) is helping operators detect vehicles wrongly parked in ‘restricted’ or ‘no parking’ zones After a thorough evaluation of various solution offered by various companies, it was Videonetics that came out on top. Thanks to Videonetics Unified Video Computing Platform (UVCP™) that blends Intelligent Video Management Software (VMS), Intelligent Video Analytics and seamless integration of existing analogue system into one user-friendly solution, able to grow effortlessly with customers’ need over time. Incident response management Videonetics Intelligent VMS is managing 100+ cameras including PTZ network camera, dome cameras, fixed cameras, and bullet cameras, installed throughout the interior as well as exterior of the premises. In addition, 32 legacy analogue cameras are also integrated into the unified solution, eventually providing centralised control of the cameras to the security operators. The in-built failover and redundancy features of Intelligent VMS ensure the operators to always have access to live and recorded video. This means if any incident occurs, they can always have evidence of it. Zero Blind Spot at Entrance The Intelligent Video Analytics (IVA) is helping operators to detect vehicles which are wrongly parked in ‘restricted’ or ‘no parking’ zones, at the outside of premise. For the perimeter security at entry & exit gates, the PTZ camera tracking helps in detecting unusual behaviour of the person and provides alert to security operators for faster action. At the entrance, face capture has been installed to detect a person in the scene and locates his/her face, which is saved in the database, indexed and time stamped. In addition, vehicle capture is deployed to track and record license plates of vehicles along with time and date, entering the premise. Zone monitoring Operators will be notified if a person stays beyond a certain duration in a user-marked zone The business club needed a solution that could help it identify theft, intrusion and trespassing throughout its facilities. In the first phase of the project, Videonetics along with stakeholders of business club and system integrator identified sensitive areas, that requiring immediate security system. To monitor suspicious activities, zone monitoring has been enabled at the fence of tennis court, lawn, emergency gates and open field area. Operators will be notified if a person stays beyond a certain duration in a user-marked zone. To combat unauthorised entry in generator room, operators gets alert if any intrusion happens in a marked area. Similarly, unusual activities are also being monitored in this area through loitering detection. Trespassing detection Operators can handle alarms and manage events, reducing manual checks of cases and helping to expedite investigations At the peripheries of the business club, trespassing detection has been deployed to detect if any person intrudes into a premise. The system is well capable to trace trajectory of the trespasser and prevent incident before it occurs. The authorities wanted to have alert in case any mob formation happens at the field area, known as forbidden region, of the club. Crowd formation detection has been deployed that estimates density of people in a scene and generated an alert as soon as the density in any defined area crosses a certain limit. Empowering with mobile application The ease of use of Videonetics unified solution has been instrumental to the business club. The operators and senior authorities are efficiently accessing videos anytime and anywhere, thru an intuitive interface of IVMS web and mobile applications. At the time of incidents, operators can handle alarms and manage events, therefore, reducing manual checks of cases and helping to expedite investigations. After various phases of implementation, installation, and testing, the Videonetics unified solution went into live operation. Since upgrading to Videonetics unified solution, the business club has been able to better handle incidents of thefts/intrusion and apprehend suspects. Therefore, the level of security has been lifted by allowing the early detection of incidents and monitoring the premises round-the-clock, even in the harsh environmental condition. Furthermore, the added layer of security has been significant in business club’s efforts to attract more members and sustain business relations with existing members. Detecting patterns Now the operators use the information being collected in the unified interface to better understand the environment. They are successfully detecting patterns on how visitors/members access and move through the club. Thus, using these insights to develop strategies that maximise the use of space and keeps everyone safe. The open architecture of Videonetics unified solution allows customer to integrate with third-party systems such as access control, emergency system and much more. “To go from conventional to a professional and scalable surveillance system was a huge improvement for our client. It has enhanced our client’s reputation for providing safe and secure environment to visitors, employees, and members. Commendation to Videonetics for providing their unified video computing platform that empowered security operators by improving their efficiency in monitoring the premise and handling threats swiftly. I deeply appreciate their dedication and untiring efforts for making it a reality”, said Gaurav Das, Director, Webdesk Technologies Private Limited.
With Razberi Monitor™, security professionals can securely and remotely monitor their physical security network during a time of social distancing. IT professionals can quickly review the cyber posture data in case of a cyber-breach. Razberi Monitor™ provides secure, remote visibility into the availability, performance, and cyber posture of servers, storage, cameras, and other networked security devices. Remote monitoring The tool simplifies the monitoring and support of a multi-site enterprise security system, predicts and prevents problems for security professionals while providing a centralised view that benefits both IT and Physical Security departments. We have listened to the surveillance industry and created our software platform to enhance relationships" According to Tom Galvin, Chief Product Officer, Razberi Technologies, "We have listened to the surveillance industry and created our software platform to enhance relationships and align Physical Security and IT departments. Razberi Monitor allows security professionals to be proactive by predicting problems." Aligning network and surveillance departments Razberi Monitor's software platform, paired with Razberi's video recording and switch appliances, has enabled Tropical Shipping to save on the cost of sending maintenance crews to check on potential issues in their US and Caribbean facilities. "Our network is highly distributed across the US and Caribbean with up to 125 users viewing camera feeds at one time. Razberi Monitor has helped us increase our camera uptime assurance and align our network and surveillance departments," said Chad Nelson, Director of Security, Facilities and Cargo Compliance, Tropical Shipping. "They now have a clear view of all operations, and it puts me in the driver's seat to be able to provide specific alerts to each port remotely, quickly and more efficiently than sending a tech to troubleshoot."
When it comes to airport security, there is a critical need for technologies that detect exterior threats and protect the perimeter. By using an advanced FLIR perimeter intrusion detection system, airports receive unmatched threat recognition, target tracking, perimeter defence and response capabilities. The result is greater efficiency, exceptional safety and enhanced customer experience for passengers, employees, aircraft and facilities. Norman Y. Mineta San Jose International Airport (SJC) is the gateway to Silicon Valley, providing transportation to 15 million passengers annually. SJC is recognised within the industry as one of America’s fastest‐growing major airports over the past four-year period, based on percentage increase in passenger seat capacity. Perimeter security upgrade Located in San Jose California, SJC is a robust engine of economic stimulus, transportation and international commerce. The airport is within an 18-mile radius of 6,600 technology companies in Silicon Valley and serves travellers employed by many of the world’s Fortune 500 enterprises, including Apple, Google, Facebook and Intel. Ensuring secure operations is critical to the success and customer experience of SJC users. The airport occupies 1,050 acres of land and its perimeter spans six miles. With such a vast property and a high throughput of traffic, protecting the perimeter from external threats is essential. Driven by high-profile intrusion incidents, perimeter security has become a top priority for airports in recent years. From 2004-2016, there were 345 perimeter breaches at 31 major U.S. airports, according to a report by the Associated Press. Like many airports around the country, SJC also faced challenges and crises of illegal trespassing of unauthorised individuals, despite the airport meeting all federal security regulations. This raised concerns about passenger safety. Mineta San Jose International Airport With a heightened need for better perimeter protection, SJC launched a multi-million dollar, three-phase initiative to upgrade its entire outdoor perimeter security system. The first two phases focused on physical upgrades to the fence line, raising 10,000 linear feet of fence from seven feet to 11 feet in critical areas of the airport. FLIR Elara FC-Series ID, ioi HD Analytics, Triton PT-Series cameras with FLIR Latitude Network Video Management System FLIR Elara FC-Series ID, ioi HD Analytics and Triton PT-Series cameras with FLIR Latitude Network Video Management System provide multiple layers of protection. Phase three was designated for fence technology enhancements through state-of-the-art video surveillance and detection systems. “In response to the cluster of perimeter breaches within a relatively short time period, our evaluation showed that the airport perimeter, with its seven-foot-tall fence, was indeed technically in compliance with current federal security requirements,” said Airport Deputy Director of Operations Bob Lockhart. “However, we also recognised some opportunities to improve the effectiveness of our perimeter, both from a perception perspective, as well as an actual strengthening of some of our perimeter,” he continued. Trial with various security solutions To find the best fence line analytic detection technology, SJC consulted National Alliance for Safe Skies, Inc. (Safe Skies), which is a federally funded non-profit organisation that assists airports in the research, testing and evaluation of security technologies. SJC’s partnership with Safe Skies began in 2014 when the non-profit first discussed the airport’s perimeter security needs. Safe Skies was later tasked to review a variety of perimeter defence systems to determine what solutions would be most effective at SJC. Safe Skies tested and evaluated six different types of technology on-site including, thermal cameras, thermal cameras with video analytics, behavioural video analytic systems, pressure sensor buried cables, laser detection systems and wireless cameras. Each system was tested for two weeks, and Safe Skies presented a performance report to SJC for each one. After a detailed analysis, SJC selected an end-to-end perimeter intrusion detection system (PIDS) from FLIR Systems Inc. FLIR PIDS solution The FLIR PIDS solution is composed of 57 FLIR Elara FC-Series ID thermal analytic cameras and 50 FLIR ioi HD Analytics Bullet cameras along the fence line. The system also includes four FLIR Triton PT-Series dual sensor cameras with thermal and visible light sensors with pan-tilt tracking. For the SJC deployment, Latitude VMS integrates with the Software House’s C-CURE access control platform All of this technology fully integrates into the existing FLIR Latitude Network Video Management System, which is part of the FLIR United VMS family of products. As an ONVIF Profile S compliant platform, Latitude VMS enables seamless integration with edge devices and third-party systems. For the SJC deployment, Latitude VMS integrates with the Software House’s C-CURE access control platform. Distinguishing between an animal and human “The additional thermal and infrared camera coverage has greatly enhanced our abilities to detect unauthorised activities around the perimeter of our airfield,” Lockhart explained. Ken Castle, Vice President of business development at Ojo Technology, the systems integrator for the project, also described the advantages of the FLIR thermal technology. “Thermal cameras provide the data and visual confirmations that are lacking from so-called traditional fibre-based ‘shaker fence’ systems, which generate alarms when objects strike a fence or something creates vibration,” Castle explained. “The problem is that such alerts could be caused by dogs, wildlife, bicyclists bumping into the fence, tree branches or winds—none of which pose security threats.” Castle continued, “With thermal cameras, the embedded analytics can immediately distinguish between an animal at 50 yards and a human at 300 yards, following their direction of movement. The viewing trajectory can be narrowed to cover just the fence, or widened to include territory in front of or behind the fence. The bottom line is that thermal analytics provide definitive visual information and virtually eliminate unnecessary or inconsequential alerts.” Thermal cameras continue to be the industry standard for 24/7 perimeter monitoring and the technology is a key part of SJC’s PIDS solution. Installation of a perimeter fence technology system In September 2016, the U.S. Department of Transportation and the Federal Aviation Administration awarded SJC an $8.1 million grant for the design, purchase and installation of a perimeter fence technology system. Deployment of the FLIR PIDS solution began shortly thereafter. The project had an initial 150-day or a five-month turnaround with work beginning around the holidays in December 2016. As the systems integrator, Ojo Technology oversaw the phased commissioning of the project. Ojo engineers preconfigured the cameras and servers, programmed the analytics for all thermal cameras, tested the functionality of each camera under a variety of lighting conditions, and worked with the airport security command centre and its systems subcontractor to incorporate the new cameras into the existing network. Installation was completed in the fall of 2017, and, afterward, Ojo worked closely with FLIR and SJC to fine-tune the system for optimal functionality. Integrator for PIDS “With such an aggressive schedule, Ojo Technology was instrumental in seeing the PIDS solution deployment through,” said Daniel Gundlach, Vice President and General Manager of security at FLIR. “Likewise, the collaboration, technical skill and ingenuity among the FLIR, SJC and Ojo teams was remarkable and a key reason why the project is such a success.” Upon detection of an object approaching the fence line, the FC-Series ID thermal camera, initiates an analytic alarm hand-off “The success of a technical solution like the San Jose Airport PIDS project is dependent upon a strong partnership among all participants—from FLIR as the manufacturer to the integrator to the end user,” said Neil Roberts, FLIR security director for the PIDS deployment. “In this case, all parties were committed to seeing this project through to the end and addressing any technical needs that arose along the way.” Threat recognition and response The advanced FLIR PIDS solution is designed to deliver superior threat recognition and response. Upon detection of an object approaching the fence line, the FC-Series ID thermal camera, initiates an analytic alarm hand-off to the PT-Series camera for auto-tracking. The FLIR HD cameras provide a colour visual of the target for identification and verification. Through Latitude VMS, security operators manage response capabilities such as alarm functions, notifications and real-time interactive alarm maps. Video monitoring with perimeter intrusion detection “SJC has used FLIR cameras and Latitude products for many years,” said Lockhart. “We appreciate our FLIR end-to-end solution and the ability to expand our current camera system with new perimeter cameras to enhance our current video monitoring and provide additional perimeter intrusion detection.”The safety of passengers, airline employees and service workers is greatly enhanced" A defining feature of the airport’s PIDS solution was that all technology components were provided by FLIR, which created an advantage for integration and solution performance. Open platform software management system “An all-FLIR system provided a tight integration to accomplish the goal of heightening security for the airport,” Castle said. Castle continued, “In theory, an open platform software management system can accommodate a variety of camera manufacturers and models in addition to ancillary security systems such as access control, intrusion alarms, public address and intercom systems, and blue light emergency phones. However, in actuality, the integration of various third-party components can be challenging as different brands of firmware in varying camera models and manufacturers don’t always provide consistent levels of performance, such as resolution and other features. This can be avoided entirely by deploying one end-to-end solution from a single manufacturer.” “The upfront and early design services that FLIR offers through sales support engineers and through our Raven Site Planning Tool help reduce the risk of non-conformance and ensure design stays on budget. The end result is optimal system performance and peace of mind,” Roberts from FLIR explained. “At FLIR, we strive to be the airport’s trusted partner not just for today’s security needs, but also for the future.” Enhanced security and safety at the airport “The solution provides ongoing visibility of vehicle and cycling traffic along the outer fence line, as well as the movement of aircraft, cargo loaders, delivery trucks and service vehicles within the perimeter,” Castle said. He added, “Bottom line is that the safety of passengers, airline employees and service workers is greatly enhanced, and the expanded situational awareness gives the airport more options for responding to potential areas of concern.” Having successfully implemented a robust FLIR PIDS solution to protect the airport perimeter, SJC plans to execute more security improvements on the interior side of the airport. Future upgrade SJC has a robust network of security cameras throughout ticketing areas, Transportation Security Administration entry points, terminals, concourses and additional newly built airport areas. The airport is continually evaluating camera locations for upgrades to newer equipment to provide increased coverage or higher resolution camera views. Storage archivers and updated client workstations are also planned for as budgets get approved. By partnering with FLIR, SJC is able to utilise the advanced technology available on the market to provide safety and security and ensure the airport remains a thriving transportation hub that attracts new travellers.
With more than 2,200 locations and 41,000 associates, Panda Express is America’s family-owned and operated Asian dining concept. Challenged with losses at the point of sale (POS) and growing false alarm penalties, the company turned to Interface Security Systems, a managed services provider delivering managed network, interactive alarm monitoring, video surveillance and business intelligence solutions to help them dramatically decrease shrink and resolve security inadequacies. False alarms and fines Panda store managers faced continuous distractions from false alarms, receiving calls from the legacy alarm company at all hours of the night and incurring fines from local law enforcement for needless police dispatches. Interface monitoring centre instantly verify any alarm from a Panda store “When an alarm went off overnight, our managers would always err on the side of caution, send police in, or go in themselves. That was dangerous in itself if there was actually a burglary happening inside the store,” says Lyle Forcum, Executive Director of Asset Protection at Panda Restaurant Group, parent company of Panda Express. “Additionally, we were losing significant amounts of money on false alarm charges.” Suspicious transaction notification To address the false alarm challenge, Interface installed a next-generation IP Interactive Monitoring system with live video and two-way audio, which offers a virtual, guard-like level of protection in every Panda location. Operators in the Interface monitoring centre instantly verify any alarm from a Panda store with live streaming video, eliminating false alarms. Forcum reports that Panda is saving over $100K per year in false alarm fees Panda had also implemented a customised, exception-based POS reporting system, which notifies Panda management whenever a suspicious transaction takes place at the register. Interface took the tool a step further by integrating it with the video surveillance and alarm systems at each of the Panda locations, allowing management to immediately connect to the video of any problematic transaction. Identify anomalies and prevent shrink The solution enables loss prevention professionals to quickly identify anomalies and prevent shrink. Top offenders from thousands of employees doing millions of transactions can easily be bubbled up to the top. The combination of business intelligence and video surveillance resulted in a massive reduction in shrink and cash shortage at the register. The business intelligence provided allows for focused tracking and improved store operations With Interface, Panda has experienced vast improvements in security for its associates, customers and assets. Forcum reports that Panda is saving over $100K per year in false alarm fees and thousands of dollars per month per store in reduced shrink at the POS. Monitoring intrusion data The business intelligence provided allows for focused tracking and improved store operations, including people development, store performance data comparison, optimised store efficiencies, monitored intrusion data, and cash tracking. Panda and Interface have successfully partnered to create a potent security and loss prevention tool in the Quick Service Restaurant space. “Interface is a partner that's been collaborating with us on our needs from day one,” says Forcum. “The company understands what we need, and then it develops solutions towards that end. It doesn’t just come up with an off-the-shelf product and expect us to purchase it. Interface has shown a real commitment to our business. We meet with them regularly to collaborate on new initiatives and on emerging issues that Panda faces. The company has truly become part of that solution voluntarily and eagerly. Other business partners do not do that. Interface is, in fact, a true part of the Panda team.” A more detailed case study and video testimonial on Panda Express can be found on the Interface website.
Synectics has secured a multi-site protection contract for a customer whose infrastructure assets are considered critical to national security. Responsible for maintaining an energy network that supplies over 3.9 million homes and businesses, the customer required a centralised system to guard against both physical and cyber threats at five key sites – each recognised as a national asset with corresponding levels of access clearance. The Synectics solution, driven by its Synergy 3 command and control platform, integrates third-party sensors, analytics, cameras, systems, personnel databases, and edge devices. The resulting level of situational awareness gives the team – based at the customer’s state-of-the-art Alarm Receiving Centre (ARC) – complete oversight and control of security, safety, and site-management systems at each facility. Electrified perimeter-fence systems As part of the contract, Synectics will also provide a redundant ARC solution for failover scenarios. The core integrations included as part of the project ensure alerts and responses are linked to, and can implement direct control of, door-access systems, intrusion-detection systems, intercom technology, and the electrified perimeter-fence systems deployed at each location. Synectics will conduct a complete system FAT, which includes all specified third-party software and hardware, at its dedicated UK testing facilities. Given the high-risk, high-security nature of the project, the provider’s ability to system-test at such scale was a crucial factor in the contract being awarded. The five locations to be monitored from the ARC are government-authorised to trigger armed response units to deal with imminent or actual threats. Command and control system In addition to meeting technical resiliency specifications, Synectics will be providing cyber security consultation The solution will, therefore, employ customised workflows to support incident (alarm) validation and protocol-compliant responsive action. The solution will also see each site equipped with its localised command and control system for on-site management, with the ability to manually and automatically escalate incidents to the ARC team as required. Cyber security was a specific focus of the brief. In addition to meeting technical resiliency specifications with authentication and encryption solutions, Synectics will be providing ongoing cyber security consultation, working in partnership with in-house specialists to ensure the continuous development of protective measures. Third-party system Martin Bonfield, UK Sales Manager at Synectics, commented: “The perfect alignment between customer requirements and Synectics’ track record in CNI meant the lead integrator came directly to us with this exciting project. Our credentials and expert team, coupled with Synergy 3’s ability to remotely integrate and interoperate with any third-party system vital to effective operations, meant we ticked multiple boxes." "We are regarded in the industry as a safe pair of hands with the relevant experience, and an innovator with the forward-focused technology required to meet all aspects of the brief.”
Welch Sand & Gravel, a family-owned operation serving the Cincinnati, Ohio region of the US. Welch harvests gravel and sand from the water and transports all the material via hundreds of feet of conveyor to be processed and delivered to all its construction customers. The 500 plus feet of conveyor is riddled with an array of copper and metal wiring that yields big dollars on the market, making it quite vulnerable. The surrounding rural area is extremely challenging to protect, as it includes multiple acres and many access points, including the water. Optex photoelectric beams installed Sonitrol of Butler County was brought in to provide a solution to Welsh's security needs. With the assistance of Optex, Sonitrol designed an outdoor security system that was comprised of hardwired and wireless Optex photoelectric beams to secure the property. All of the Optex Beams were connected to various pan-tilt-zoom (PTZ) cameras on the property Optex’s 200 ft. battery-powered, wireless photoelectric beams were strategically placed to provide perimeter detection along the property line and not allow access to the desired wiring on the conveyer belt. In addition, interior traps were placed to provide back-up protection to Welch Sand & Gravel. All of the Optex Beams were connected to various pan-tilt-zoom (PTZ) cameras on the property, and Sonitrol of Butler County now provides 24-hour monitoring of all the cameras. Optex - Sonitrol monitored solution The moment an Optex beam detects movement, the PTZ cameras are activated and the Sonitrol Central Station immediately views the activity on site. The operator can quickly assess the situation and dispatch the proper authority if necessary. The Optex security/Sonitrol monitored solution has saved the customer thousands of dollars in loss and hundreds of dollars a month in guard service costs. Since the system was installed, no additional loss has been experienced on the site.
Round table discussion
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
You could say concerns about privacy are “trending” in our increasingly data-driven world. Unease about how Facebook and other high-tech companies use and share data dominates the news, and the full impact of new European Union (EU) regulations is about to be felt around the world. By May 25, companies that collect data on EU citizens will need to comply with strict new rules around protecting customer data, as enumerated in the General Data Protection Regulation (GDPR). But how do the new regulations, and broader concerns about privacy, affect the physical security market? We asked this week’s Expert Panel Roundtable: How do privacy issues and regulations, such as GDPR, impact physical security systems and how they are managed?