There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetisation Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is cha...
Insider threat programmes started with counter-espionage cases in the government. Today, insider threat programmes have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a programme, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emot...
CSM has dramatically improved visibility and control over its security operations with the adoption of employee scheduling and workforce management software SmartTask. Following a period of rapid expansion, the company needed to replace existing paper-based systems, so that it could better monitor and coordinate a team of around 100 security guards that work across Scotland. This has enabled CSM to improve service delivery, enhance duty of care and support business development while reducing it...
GeoVision Video Wall allows administrator to create layouts with a variety of displays including desired camera channels, zoom windows, scan windows, web pages, video playback and live view pop-up from E-Map. It’s able to support up to 57,000 live view channels simultaneously. GeoVision Video Wall Two main features GeoVision Video Wall offers: The ability of displaying a single live view channel across multiple monitors. The ability to project content onto the displays of another PC....
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowe...
A new cybersecurity service brings professional 24-hour monitoring within reach of SMEs for the very first time. bluedog Security Monitoring, which has been launched by Freeparking.com founder Paul Lomax and cybersecurity expert Tim Thurlings, offers smaller firms the type of managed detection and response service previously only available to large corporates. Highly trained cybersecurity team The launch of bluedog comes as SMEs face increased pressure from customers, regulators and investors The London-based company has developed a low-cost device called Sentinel which plugs into a customer's network and uses machine learning to spot unusual activity. It then alerts bluedog's security operations centre, where a highly trained cybersecurity team can analyse and respond to potential threats. The bluedog service can detect both external and internal threats, such as phishing emails or the download of video or audio files packed with malicious malware, which often bypass traditional endpoint security and firewalls. It not only offers enhanced security and rapid response to incidents, but also helps companies comply with standards such as GDPR, Cyber Essentials or ISO/IEC 27001:2005 and keeps a full audit trail for reporting purposes. The launch of bluedog comes as SMEs face increased pressure from customers, regulators and investors as well as cyber criminals seeking ‘soft' targets. Firewalls and endpoint protection The UK government's Cyber Security Breaches Survey 2019 shows that while the number of businesses being attacked has been falling - down from 46 per cent in 2017 to 32 per cent this year - the number of attacks each victim suffers has risen from two to six over the same period. It suggests businesses with weaker defences are being targeted repeatedly. bluedog's CTO Tim Thurlings, a former ‘ethical hacker' who helped develop the EU's TIBER threat intelligence framework, says: "Firewalls and endpoint protection which SMEs have traditionally relied on are no longer adequate as experienced hackers can easily find ways round them. SMEs need to take their cybersecurity to the next level, yet at present few have a dedicated professional.” Bluedog's innovative model combines machine learning and human expertise to offer exceptional service" "bluedog gives them 24/7 access to a whole team of cyber experts for less than the cost of employing one part-time staff member. Bluedog's innovative model combines machine learning and human expertise to offer exceptional service and peace of mind." Analyst firm Gartner believes that by 2020, 15 per cent of organisations will be using services such as managed detection and response, compared to less than 1 per cent today. Combining machine learning and human expertise bluedog CEO Paul Lomax, whose Freeparking.com business was the UK's first self-service domain registrar, and who has also founded two hosting companies, says bluedog is targeting a gap in the market for SME monitoring services. "While technology is becoming more sophisticated, it still requires people to analyse the data and act on it," he explains. "Ideally all businesses should have 24/7 monitoring but with salaries for skilled professionals running into six figures, it is an expensive resource that up until now has been limited to blue-chip firms.” "With bluedog, we have developed a smarter model which enables us to revolutionise pricing and bring services within reach of SMEs for the first time. This is a $10bn untapped market and no-one else is offering a solution. bluedog's model gives us a competitive advantage and makes us well placed to become a global leader."
MOBOTIX has taken another step towards making its technology available and integrating it in partner systems. After extensive development processes and testing, all MOBOTIX IoT camera solutions have been integrated in Genetec’s cloud-based Stratocast video management system. Genetec, global provider of video management systems solutions, has been one of MOBOTIX’s most important technology partners for many years. Integration with MOBOTIX IoT camera solutions The integration of our camera systems in Stratocast, whose high level of cyber security is put to the test in annual stress tests" “The integration of our camera systems in Stratocast, whose high level of cyber security is put to the test in annual stress tests and evaluations, is another milestone in the long-term cooperative relationship between MOBOTIX and Genetec,” says Hartmut Sprave, CTO of MOBOTIX AG. “When we make our technology available and integrate it into other solutions, it is paramount to us that we do not compromise on the cyber security of our systems,” Thomas Dieregsweiler, Head of Product Management at MOBOTIX AG, adds. “Genetec and MOBOTIX speak the same language: We are one of the world’s first camera manufacturers to successfully integrate in Stratocast,” Dieregsweiler further points out. Stratocast cloud-based video management system The cloud-based video management system Stratocast (VSaaS) is designed especially for small and medium-sized businesses. When using Stratocast, customers can always rest assured that their company is protected and that seamless operation is ensured. Using a PC, laptop, tablet, or smartphone, Stratocast guarantees access to live videos and video recordings that are stored cyber-safe in the cloud. Many customers across the world rely on the cloud solution, which is tailored to small applications under 50 cameras, or in other words, small and medium-sized companies. The end customer themselves requires only basic computer expertise, as no computer infrastructure such as additional servers have to be installed on site and no maintenance or updates are required. This makes the solutions affordable and very transparent for the customer. They only pay by usage. Genetec and MOBOTIX technologies synergy Stratocast allows the customer to circumvent typical server-based problems such as additional IT infrastructure or employees, lack of storage space, loss of records, and unscalable prices or functionalities. The scope of functions provided can also be extended by using the Genetec Security Center for central monitoring. This means the cloud-based network can grow and develop according to the customer’s needs. As is the case for MOBOTIX, cyber security and data protection are the highest priority at Genetec. For example, all communication between the on-site system and the cloud is fully encrypted with TLS (Transport Layer Security). Genetec guarantees 99.5 percent availability (availability and access to video). Data back up and cyber security Camera solutions from MOBOTIX have an excellent reputation around the world for good reason All data is backed up three-fold in the cloud. Genetec works exclusively with hardware and software partners who meet the high quality standards for cyber security and data protection. Camera solutions from MOBOTIX have an excellent reputation around the world for good reason. They are robust, durable, and cyber-safe. No successful hacking attacks have been recorded anywhere in the world to date. “We have integrated our technology into Stratocast’s technology over the last six months. All test series were completed successfully,” explains Thomas Lausten, CEO of MOBOTIX AG. He adds, “The excellent quality of our video solutions combined with a keen focus on cyber security and our global sales network is how we became one of the first camera manufacturers to integrate our technology in the cloud-based Stratocast video surveillance system from globally renowned video management solutions firm, Genetec. It proves once again that the decentralised intelligence of our camera systems makes MOBOTIX one of the most important players on the global market.”
Video wall and visual display experts Ultimate Visual Solutions (UVS) have developed a unique alarm system that alerts clients to on-screen colour changes. The system, which operates within UVS’ Lucidity video wall controller and control software, was developed following a request from a major financial institution based in New York. Once installed, it will be used to alert staff to major downturns in financial and shares markets, when stocks or currencies starts to be displayed as red rather than green. But the alert system can also be used in any control room where on-screen colour changes represent major fluctuations, such as power stations or traffic monitoring centres. Staff can set pre-set alarm points on the video wall screen and are alerted by a visual and audio alarm. UVS Managing Director Steve Murphy said: “The client has requested that our Lucidity video wall solution provides an audible and visual alarm on the video wall to indicate that, for example, an alarm window has changed from green to red state showing a severe currency change.” Lucidity control software UVS develops its Lucidity video wall controller solution based on requests that clients are keen to utilise" “But this system can also be used in a process control application or in any control room where display colour changes are significant. We are now adding this feature as an option to the standard Lucidity control software or as a standard feature within our specially priced ‘Pro’ version.” UVS launched its Lucidity brand of video wall controller and control software to fill a gap in the market for projects which do not require the full functionality of high end solutions. Steve Murphy added: “UVS continues to develop its Lucidity video wall controller solution to suit specific requests, we are finding that clients have been very keen to utilise our ability to take a request or requirement and develop a solution quickly within Lucidity.” The Lucidity brand is aimed at clients who require a solution where full command and control components are not needed. The range is available from UVS to AV system integrators for resale to their end clients. It is not designed to compete with existing high end, full enterprise functionality video wall solutions, which the company continues to promote and supply. Audio visual solutions UVS, formerly eyevis UK, is based at Business First Burnley Business Centre and provides video wall displays and audio visual solutions to a range of clients across the UK. It is led by four senior colleagues who, between them, have more than 70 years’ combined Audio Visual, Control Room and Visual Solutions experience. It has also opened a new London demonstration venue at Woburn Place, a short walk from Euston Station, to cope with increased demand for its technology. Eyevis UK changed its name to Ultimate Visual Solutions (UVS) last September following the acquisition of eyevis GmbH by the Leyard group. The rebranding has allowed the company to offer an expanded range of products and services and remain at the forefront of providing turnkey solutions for all types of audio visual and visual display applications
Razberi Technologies has extended its Razberi Monitor™ solution with new video health monitoring features. Razberi leverages its patent-pending deep packet inspection technology to assure security professionals that their cameras are providing secure and reliable audio and video streams. Razberi’s latest software automatically reboots cameras and sends alerts when problems are detected. Razberi Monitor provides complete system health and cyber monitoring solutions for video surveillance systems. Camera health and cybersecurity solution Razberi Monitor integrates video health with award-winning Razberi CameraDefense for a complete camera health and cybersecurity solution. Razberi Monitor also detects video server, storage and malware issues in real-time. The camera reboot feature automates a major remediation step, saving Razberi customers time and money" Video health monitoring with the camera reboot feature is immediately available with Razberi’s EndpointDefender™ and ServerSwitchIQ™ intelligent edge video appliances. According to Stephen Schwartz, VP of Product Development at Razberi Technologies. “The camera reboot feature automates a major remediation step, saving Razberi customers time and money.” Video health monitoring Razberi’s EndpointDefender and ServerSwitchIQ with video health monitoring enables Cook Security Group to save on the cost of sending maintenance crews to check on potential downed cameras. The camera reboot feature eliminates the need to physically check a camera for data loss and automates the process. “This feature will greatly benefit our customers, along with our NOC, many times a camera needs a simple reboot to restore functionality,” said Daniel Smallwood, VP of Product at Cook Security Group. “Solutions like this are exactly why we partnered with Razberi!”
Aqua Security, the platform provider for securing container-based, serverless, and cloud native applications, announces that the company’s flagship platform, Aqua CSP, is available on VMware Cloud Marketplace™. VMware Cloud Marketplace enables customers to discover and deploy validated, third-party solutions for VMware-based platforms – across public, private and hybrid cloud environments. Once validated, partners can easily publish their solutions for VMware customers across platforms. Customers will be able to access these third-party partner solutions directly from their cloud environments, while also being able to experience the convenience of features such as notifications, reporting, and analytics. Software development lifecycle As a VMware PKS Partner, Aqua CSP was architected specifically to address the challenges of visibility, control, and isolation in container environments, while remaining transparent and non-intrusive to DevOps, allowing organisations to reap the business benefits of containers while improving their security posture. Using Aqua CSP on VMware and Pivotal PKS provides enterprise users with an end-to-end security solution, including: Aqua Security is very excited to be a part of the VMware Cloud Marketplace"Image scanning for known vulnerabilities, malicious code detection, and enforcement of image integrity throughout the software development lifecycle Vulnerability shielding, using a form of virtual patching to detect and prevent attempts to exploit known vulnerabilities Assessment of the security posture of Kubernetes clusters against the hundreds of tests of the CIS Benchmark for Kubernetes Penetration testing of Kubernetes against dozens of attack vectors Runtime controls to monitor container activity in real time, based on custom policies and machine-learned behavioural profiles, to alert on or block suspicious activities and processes Enterprise grade software “Aqua Security is very excited to be a part of the VMware Cloud Marketplace,” said Upesh Patel, VP of Business Development for Aqua Security. “We believe that this marketplace will make it easy for VMware customers to deploy enterprise grade software in a complex computing environment.” Patel goes on to note that, “customers can build mission critical applications on Pivotal or VMware PKS and will be able to secure their entire application lifecycle in a scalable way, while automating DevSecOps processes.” “We are pleased to see Aqua Security CSP available on VMware Cloud Marketplace,” said Milin Desai, GM, Cloud Services, VMware. “Validated technologies, such as Aqua CSP, enable IT teams to reduce cost, increase efficiency, and create operational consistency across cloud environments. We’re excited to work with partners such as Aqua Security to empower customers to fully leverage their cloud investments.”
Johnson Controls introduces the new exacqVision C-Series, taking the guesswork out of sourcing a system for a live video monitoring station. Built to achieve the kind of performance that the video security industry demands and guaranteed to achieve specific decode and display frame rates, the new C-Series monitoring station is the best way to experience exacqVision VMS. Delivering optimal performance Tailor-made to meet the needs of video surveillance market, the C-Series supports 16-32 video streams at full HD and ensures smooth playback during live monitoring or search. The C-Series offers three options - Standard, Pro, and Pro Plus - each with a unique processor and RAM capacity, designed by the same team who built the exacqVision client software. Available with a Windows 10 or Ubuntu 18.04 operating system, these video monitoring stations are designed by Exacq to deliver optimal performance and are easy to install. VESA-mountable, the C-Series systems can easily be placed on the back of a display monitor, wall, or other environment with space constraints. For exacqVision NVR customers, the C-Series brings an automatic advantage of consistency to the hardware ecosystem currently in place, streamlining installation, setup, and the customer support experience - all from one vendor - and ships with a 3-year warranty.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood management assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental control assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway management and parking assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper experience assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognise and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing business intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A natural cross-over technology This trend towards integration has forever changed how organisations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyse what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalise on that connection is only limited by our imagination.
Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2018. Looking back at the top articles of the year provides a decent summary of how our industry evolved this year, and even offers clues to where we’re headed in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2018 that generated the most page views. They are listed in order here with a brief excerpt. 1. U.S. President Signs Government Ban on Hikvision and Dahua Video Surveillance The ban on government uses, which takes effect ‘not later than one year after … enactment,’ applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. The bill calls for an assessment of the current presence of the banned technologies and development of a ‘phase-out plan’ to eliminate the equipment from government uses. 2. Motorola Makes a Splash with Avigilon Video Surveillance Acquisition Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as ‘a natural extension to global public safety and U.S. federal and military’ applications, according to the company. 3. Impact of Data-Driven Smart Cities on Video Surveillance One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyse data on large crowds at sporting events The IoT already accounts for swaths of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency 4. CES 2018: Security Technologies Influencing the Consumer Electronics Market Familiar players at security shows also have a presence at the Consumer Electronics Show (CES). For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? 5. SIA Predicts Top Physical Security Trends for 2018 Traditional security providers will focus more on deepening the customer experience and enhancing convenience and service. The rise of IoT also places an emphasis on cybersecurity, and security dealers will react by seeking manufacturers and technology partners with cyber-hardened network-connected devices. 6. High-Speed Visitor Screening Systems Will Improve Soft Target Security The system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. 7. How to Prevent ATM Jackpotting with Physical and Cyber Security A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and, in the last several months, the United States. Rough estimates place the total amount of global losses at up to $60 million. The safety and security world bring a complex problem to solve- how to pick out a face in a moving and changing environment and compare it to several faces of interest 8. Why We Need to Look Beyond Technology for Smart City Security Solutions Although technology is necessary for an urban area to transition in to a safe and smart city, technology alone isn’t sufficient. Truly smart cities are savvy cities and that includes how they employ software, sensing, communications and other technologies to meet their needs. 9. How New Video Surveillance Technology Boosts Airport Security and Operations Employing airport security solutions is a complex situation with myriad government, state and local rules and regulations that need to be addressed while ensuring the comfort needs of passengers. Airport security is further challenged with improving and increasing operational efficiencies, as budgets are always an issue. As an example, security and operational data must be easily shared with other airport departments and local agencies such as police, customs, emergency response and airport operations to drive a more proactive approach across the organisation. 10. The Evolution of Facial Recognition from Body-Cams to Video Surveillance The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve.
Governments and corporations face crisis events every day. An active shooter terrorises a campus. A cyber extortionist holds a city for ransom. A hurricane washes away a key manufacturing facility. Not all critical events rise to the level of these catastrophic emergencies, but a late or inadequate response to even a minor incident can put people, operations and reputations at risk. Effective response plan In 2015, for example, the City of Boston experienced several record-breaking snowstorms that forced the city to close the subway system for three days. The extreme decision cost the state $265 million per day and was largely attributed to a lack of preparation and an inadequate response plan by the transportation department. The reputation of the head of the transportation department was so damaged by the decision she was forced to resign. Being able to better predict how the storms would impact the subway system’s aging infrastructure – and having a more effective response plan in place – could have saved the state hundreds of millions of dollars (not to mention the transit chief’s job). A comprehensive critical event management strategy begins before the impact of an event is felt and continues after the immediate crisis has ended. This full lifecycle strategy can be broken into four distinct phases – Assess, Locate, Act and Analyse. Assessing threats for prevention Security teams might have complained about not having enough intelligence data to make accurate predictionsIdentifying a threat before it reaches critical mass and understanding how it might impact vital assets is the most difficult challenge facing security professionals. In the past, security teams might have complained about not having enough intelligence data to make accurate predictions. Today, the exact opposite might be true – there is too much data! With crime and incident data coming from law enforcement agencies, photos and videos coming from people on the front line, topics trending on social media and logistical information originating from internal systems it can be almost impossible to locate a real signal among all the noise and chatter. Being able to easily visualise all this intelligence data within the context of an organisation’s assets is vital to understand the relationship between threat data and the individuals or facilities in harm’s way. Social media monitoring Free tools like Google Maps or satellite imagery from organisations like AccuWeather, for example, can help understand how fast a storm is closing in on a manufacturing facility, or how close an active shooter is to a school. Their usefulness, however, is limited to a few event types and they provide only a very macro view of the crisis.Data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile Critical event management (CEM) platforms, however, are designed specifically to manage critical events of all types and provide much greater visibility. Internal and external data sources (weather, local and national emergency management, social media monitoring software, security cameras, etc.) are integrated into these platforms and their data is visualised on a threat map. Security teams can quickly see if there are actual threats to the organisations or communities they are protecting and don’t lose time trying to make sense of intelligence reports. The more they can see on a ‘single pane of glass,’ the faster they can initiate the appropriate response. Locating a threat Once a threat has been deemed a critical event, the next step is to find the people who might be impacted – employees/residents in danger, first responders and key stakeholders (e.g., senior executives or elected officials who need status updates). Often, this requires someone on the security team to access an HR contact database and initiate a call tree to contact each person individually, in a specific hierarchical order. This can be a time-consuming and opaque process. There is no information on the proximity of that person to the critical event, or if a person has skills such as CPR that could aid in the response. Ensuring ahead of time that certifications, skill sets, or on-call availability is included with contact information can save valuable time in the middle of a crisis response. Going even further, data from building access systems, wifi hotspots, corporate travel systems, among others, can be used to create a profile of where a person just was and where he or she might be going in a CEM platform. This information can be visualised on the threat map and help determine who is actually in danger and who can respond the fastest. The emergency response then becomes targeted and more effective. Security teams can quickly see if there are actual threats to the organisations or communities they are protecting Acting and automating The third step is to act and automate processes. If there is a tornado closing in on a town, for example, residents should not have to wait for manual intervention before a siren is activated or a message sent out. Organisations can build and execute their standing operating procedures (SOPs) fully within a CEM platform. Sirens, alarms, digital signs and messages can all be automatically activated based on event type, severity and location. Using the tornado example, an integration with a weather forecasting service could trigger the command to issue a tornado warning for a specific community if it is in the path of the storm. Summon security guards Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert Warning messages can be prepared in advance based on event type so there is no chance of issuing a misleading or unclear alert. All communications with impacted individuals can be centralised within the platform and automated based on SOP protocols. This also includes inbound communications from first responders and impacted individuals. An employee confronted by an assailant in a parking garage could initiate an SOS alert from his or her mobile phone that would automatically summon security guards to the scene. Conference lines can also be instantly created to enable collaboration and speed response time. Additionally, escalation policies are automatically engaged if a protocol is broken. For example, during an IT outage, if the primary network engineer does not respond in two minutes, a designated backup is automatically summoned. Eliminating manual steps from SOPs reduces the chance for human error and increases the speed and effectiveness of critical event responses. Analysis of a threat Looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again It’s not uncommon for security and response teams to think that a critical event is over once the immediate crisis has ended. After all, they are often the ones pushing themselves to exhaustion and sometimes risking life and limb to protect their neighbours, colleagues, community reputations and company brands. They need and deserve a rest. In the aftermath of a critical event, however, it’s important to review the effectiveness of the response and look for ways to drive improvements. Which tasks took too long? What resources were missing? How many times did people respond quickly? With a CEM platform, team performance, operational response, benchmarking data and notification analysis are all captured within the system and are available in a configurable dashboard or in after-action reports for analysis. Continuously looking for ways to better prepare and respond to critical events will not only improve performance when similar events occur again, but it will also improve response effectiveness when unforeseen events strike. Coordinate emergency response Virtually every organisation has some form of response plan to triage a critical event and restore community order or business operations. While many of these plans are highly effective in providing a structure to command and coordinate emergency response, they are reactive in nature and don’t account for the full lifecycle of a critical event – Assess, Locate, Act and Analyse. Whether it’s a large-scale regional emergency or a daily operational issue such as an IT outage, a comprehensive critical event management strategy will minimise the impact by improving visibility, collaboration and response.
All schools and universities need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Data capture form to appear here! Facilitating visitor entry Electric strikes are able to control access via keypads, cards and proximity readers Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. More and more schools are installing visitor management systems to control who can and cannot get into the building. Access control solutions Finally, the third level – and the most vulnerable – refers to the core of the school that both students and staff occupy. These are internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. The access control system is linked to all doors within the school building A number of different access control solutions are beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralised systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralised systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Prevent unauthorised persons Mechanical solutions, which include a cylinder lock and key, are also suitable for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorised persons from entering. At one university in the United States, a smart RFID wire-free access control solution has been installed At one university in the United States, a smart RFID wire-free access control solution has been installed. The SALTO Virtual Network (SVN) wire-free system pushes and pulls data from the university’s ‘hot spot’ entry points to all their offline locks. By choosing a wire-free solution, the university only had to run wires to their exterior doors. The interior doors do not require wiring as these locks are stand-alone wire-free locks. Student accommodation block Securing access to student accommodates is another concern among colleges. One university in the United Kingdom wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. They chose Vanderbilt’s ACT365, which keeps audit trails by monitoring and recording fob activity. When another English university sought electronic locks for its newest student accommodation block, it turned to Aperio wireless locking technology from ASSA ABLOY. They used the wireless locks to extend the Gallagher Command Centre access control system to a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates. Aperio wireless locks are battery-powered and use less energy than wired magnetic security locks.
Recent technology advances – from the cloud to artificial intelligence, from mobile credentials to robotics – will have a high profile at the upcoming ISC West exhibition hall. Several of these technologies were recently designated by the Security Industry Association as the Top 8 security technologies for security and public safety. Some of them will also be a focus at the ISC West conference program, SIA Education@ISC, April 9-11 at the Sands Expo Center. This article will highlight some of those conference sessions. Topic: Cloud Systems and Video Surveillance as a Service (VSaaS) Managed Video Services are saving TD Bank $500K annually, April 9, 2:45 to 3:45 p.m. Why TD Bank decided to roll out a managed services solution, what it took to deploy and how the bank is saving an astounding $500,000 annually. IT 4.0 and Video Surveillance: A Guide to the New Terminology and What It Means to You and Your Customers, April 11, 1:15 to 2:15 p.m. How IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers, including explanations of terms such as cloud data centers, personal clouds, the edge, IoT sensors and data analytics. One of the sessions to cover how IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers Topic: Artificial Intelligence (AI) In Video and Other Systems The Challenges and Opportunities of AI in Physical Security, April 10, 3:45 to 4:45 p.m. Looking toward what the future may hold for AI in physical security; the challenges and opportunities the technology has created; and how participants can leverage AI and machine learning with existing customers to grow their business. Deep Learning Demystified: Next-Generation AI Applied to Video, April 11, 9:45 to 10:45 a.m. Dispelling the myths of the terms “deep learning” and “artificial intelligence,” and what the technologies can do in practical terms. Modern cameras find and identify faces and vehicles, analyse behavior and organise and control assets Neural Processing and Smart Cameras, April 9, 8:30 to 10 a.m. Deep learning-capable hardware is evolving at a frantic pace, and GPU and NPU (neural processing unit) co-processors are commonly embedded in cameras and video management systems. Modern cameras find and identify faces and vehicles, analyse behavior and organise and control assets. Analytics in the Video Central Station: Proper Deployment, Programming and Configuration to optimise operational and cost efficiencies, April 11, 3:45 to 4:45 p.m. How analytics plays a critical role in reducing alarm traffic in a central station environment, allowing them to save money and realise other operational and performance efficiencies. Topic: Robotics and Autonomous Devices Robotic Aerial Security – Growth Trends and Best Practices, April 10, 11 a.m. to noon The lion’s share of growth in the robotic aerial security sector will come from autonomous systems and changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices How to Adapt to Address Drone Security, April 11, 1:15 to 2:15 p.m. Drone industry professionals and a physical security design engineer will cover the realistic applications of drone systems and counter-drone solutions that can protect organisations and facilities. Next Generation Threat: Racing Drones, April 11, 2:30 to 3:30 p.m. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices. This session will identify the potential risks these drones can pose to facilities, special events, and critical infrastructure. Establishing a Corporate Drone Program, April 10, 9:45 to 10:45 p.m. Is a corporate drone program an appropriate addition to an existing security program? How to understand and navigate the regulatory challenges and processes associated with starting up a commercial-use drone program. The Rise of Intelligence in Physical Security, April 11, 9:45 to 10:45 a.m. “Intelligence” incorporates a variety of subdomains from artificial intelligence to machine learning and contextual analysis. It is rapidly becoming a focus in the realm of IT security – and increasingly in the realm of physical security, too. Changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present Topic: Mobile Credentials Finding Their Place in Access Control How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. At the center of convergence is one crucial building block: strong irrefutable identity powered by biometrics. Driving the Future: How Interoperability Standards in Access Control Can Enable Smart Building Success, April 9, 1:30 to 2:30 p.m. Growing user demand is driving new open platform approaches and the adoption of interoperability standards Growing user demand for unfettered and unlimited third-party integrations is now driving new open platform approaches and the adoption of interoperability standards. They are changing the dynamic of access control and its role within the smart building environment. Topic: Facial Biometrics in Professional Solutions How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. Securing workstations, virtual desktops, turnstiles, front doors, mobile devices and more, biometric authentication is helping enterprises and governments worldwide to realise a more secure future. Topic: Voice Control in the Smart Home Environment Delivering the Smart Home of the Future, April 11, 3:45 to 4:45 p.m. With the proliferation of connected smart devices, including voice control devices, consumers have a growing array of options for defining what their Smart Home experience could be.
ISC West in Las Vegas is the first of several major security trade shows planned for 2019 as part of the Reed Exhibitions ISC Security Events portfolio. Next up will be Expo Seguridad México in May in Mexico City, followed in June by ISC Brasil in Sao Paolo, and ISC East this fall in New York. Expo Seguridad México, May 7-9, will serve the important Mexican market for security goods and services. In Mexico City alone, a large population translates into plenty of buildings and facilities that need protection; security is a big concern and a large market. Concerns about information security, cybersecurity and convergence are also dominant topics. Benefitting from a revised trade agreement with the United States, Mexico offers a favourable business climate and low costs. In addition to video and other hardware products familiar at the U.S. show, Expo Seguridad also includes a large public safety/police component, a workplace, environmental and industrial safety sector, and fire products, offering a broad range of additional product categories. Developing knowledge of attendees The FISSE (Innovation and Solutions of Security) conference room will have cybersecurity and electronic security speakersOn the exhibition floor will be the VIII International Conference for the Administration of Security and Law Enforcement, which will bring together renowned specialists in the security and public safety sector. Free conference track rooms will be provided on the exhibition floor to develop knowledge of attendees in various business areas. The FISSE (Innovation and Solutions of Security) conference room will have cybersecurity and electronic security speakers. Manufacturers, distributors, integrators, and national and international end users have come together at Expo Seguridad since 2002 to interact and exchange knowledge during the three days dedicated to the security industry. Expo Securidad México provides access to more than 350 exhibitors and the opportunity to interact, connect and develop face-to-face relationships with more than 16,300 security and public safety decision-makers. This year, Daniel Linskey, former Boston police chief, will provide a welcome speech at the opening ceremony and will share his experience and thoughts about the 2013 Boston Marathon bombing. Exhibition of public safety equipment The exhibit encompasses a selection of public safety equipment and vehicles, body armour, and counter-terrorism solutionsISC Brasil, June 25-27, offers a combination of physical security and emerging information and cybersecurity elements. An Infosecurity pavilion on the show floor and related conference track sessions highlight growing concerns in the marketplace. A large meeting of Brasil’s law enforcement commanders is collocated with ISC Brasil, and the exhibit encompasses a selection of public safety equipment and vehicles, body armour, and counter-terrorism solutions. A strong VIP attendee program ensures attendance by high-level decision-makers with money to spend. The ISC Brasil Congress is an educational program for continuing professional education and technical training for corporate end users, police commanders, distributors, integrators, law enforcement officials, security consultants, IT and public safety managers. Of the expected 18,000 attendees, some 53% come from corporate end users in several vertical industries. Some 21% of attendees are commercial system integrators, with 9% central monitoring systems and 5% law enforcement and public authorities’ safety. Security for oil and gas companies Brasil’s economy has been improving steadily after a rough patch, and the ISC Brasil show has seen an uptick for the last two yearsBrasil’s economy has been improving steadily after a rough patch, and the ISC Brasil show has seen an uptick for the last two years. Brasil’s huge economy includes big industries that need lots of security – oil and gas companies, and automotive production are among the contributors to economic growth. Attendee and exhibitor satisfaction is strong for ISC Brasil, and the show is on a new growth path as the economic situation in Brasil continues to improve under a new president. Large exhibitors at ISC Brasil include Bosch, Genetec, Hikvision, Dahua, HID Global, Honda, Yamaha, and Microsoft. Large Reed Exhibition offices in Mexico City and São Paulo manage the Latin American events and work with local partners, marketing organisations and clients. Emerging Technology Zone ISC East in New York, Nov. 20-21, continues to build momentum in 2019 after a successful 2018 show that saw double-digit growth both in exhibition space and attendance. Reed Exhibitions’ Infosecurity/ISACA North America Expo and Conference will again be collocated with ISC East, expanding information security and cybersecurity horizons for attendees. (ISACA is an international professional association focussed on IT governance.) New at ISC East in 2019 will be an Emerging Technology Zone, providing a high profile for emerging technology companies at the show New at ISC East in 2019 will be an Emerging Technology Zone comparable to the one at ISC West, providing a high profile for emerging technology companies at the show. The Unmanned Security Expo, a big success last year, will be even bigger in 2019 with more exhibits than ever. There are good signs on the horizon for greater use of drones and robotics. Protection for enterprises ISC East has traditionally focussed on the ‘tri-state’ area around New York City – New York, New Jersey and Connecticut – an area rich in end user companies, especially in financial services, retail, entertainment and the media. In New York City alone, there are almost endless numbers of big enterprises that need protection, so a localised show is a natural, and doesn’t require the large pool of potential customers to travel away from their businesses. New York also has a large and active law enforcement community, and there are many large systems integrators that operate in and around the New York area. ISC East is a growing show that serves a large, unique audience. Growth of ISC East also suggests it is becoming more of a ‘super-regional’ event, drawing good attendance from the Southeast and Midwest in addition to the tri-state area.
Hanwha Techwin America, a global supplier of IP and analogue video surveillance solutions, announces that Planet Fitness, with the help of their preferred system integrator Adirondack Direct, recently incorporated a video surveillance solution from Hanwha Techwin and Genetec that not only enhances security but also improves operations. Each of Planet Fitness’ corporate-owned clubs throughout North America is outfitted with approximately eight to 15 video cameras that provide around the clock coverage of the parking lot, lobby, break room, the fitness area where members workout and other key areas – without invading private areas, such as locker rooms and other intimate spaces. Intelligent motion detection Hanwha’s SNF-8010 5 MP 360-degree fisheye camera provides 5MP at 20FPS which captures smoother video After issuing a Request for Proposal, Planet Fitness Senior Vice President of Corporate Club Operations Jim Esposito said they tested several of the camera and Video Management Systems (VMS), but ultimately decided on Hanwha video surveillance cameras managed by the Genetec Security Center unified platform. Esposito said they wanted to use Hanwha’s 360-degree cameras in particular because they provide more coverage, yet they save in hardware expenses because fewer cameras are needed. Hanwha’s SNF-8010 5 MP 360-degree fisheye camera provides 5MP at 20FPS which captures smoother video at a higher framerate with true day and night function. Built-in on-camera de-warping allows instant access to PTZ, quad view, and panorama views. Alarm triggers for the Hanwha SNF-8010 include intelligent motion detection, audio detection, tampering detection, alarm input and network disconnection. Providing bookmarks of recorded incidents A typical system setup at Planet Fitness includes placing cameras 25 feet from the wall and 50 feet apart which provides almost 2,000 square feet of coverage per camera. Club managers, regional managers and corporate employees manage the system via the Genetec Security Center which provides convenient bookmarks of recorded incidents so that – instead of time spent searching through video – events are already tagged. Adirondack Direct also offers a 24-hour monitoring service and liaisons with law enforcement when needed. “We knew that Planet Fitness would need thousands of video surveillance cameras for this project and it’s very important to consider reliability and functionality as well as durability,” said Adirondack Direct Director of Security and Technology, Tim Collins. “Hanwha has the lowest customer return number and that means that they manufacture products that aren’t sidelined by constant replacement and repairs.” Video surveillance management Anyone engaging in obnoxious behaviour will likely be the recipient of a Lunk Alarm and the flashing lightsCollins said Adirondack Direct has long recommended Security Center from Genetec for video surveillance management because it provides the best open-architecture platform, robust features and is easy to use. Security Center blends IP security systems within a single intuitive interface to simplify operations and empowers organisations through enhanced situational awareness, unified command and control and connectivity to the cloud. While the Hanwha-Genetec solution has provided an excellent security system – as well as protection against liability for slip and fall incidents – it’s also improved operations in multiple ways by providing invaluable business intelligence, said Esposito. Planet Fitness has a judgment-free environment for individuals who want to work out, but don’t want to have to endure the negatives so often found in gyms: loud grunts, the clanging of dropped weights and aggressive behaviour. Anyone engaging in obnoxious behaviour will likely be the recipient of a Lunk Alarm and the flashing lights, sirens and unwanted attention that accompanies it. Providing video evidence When a Lunk Alarm is pressed, Security Center creates a bookmark of the event Use of the Lunk Alarm – or lack of use – can be an indicator of how the club is operating. In order to monitor and evaluate the use of the Lunk Alarms, Adirondack Direct has integrated the Lunk Alarm into the Hanwha-Genetec video solution. When a Lunk Alarm is pressed, Security Center creates a bookmark of the event which provides video evidence of what preceded the alarm and how it was managed. Gyms typically have automated external defibrillators (AEDs) in the event a member suffers a medical emergency. At Planet Fitness facilities outfitted with the Hanwha-Genetec solution, once an AED is removed from its cabinet, a sensor is activated to shut off the music in the club to provide a calmer atmosphere. The system also creates a bookmark in the VMS and notifies managers and regional managers that an AED has been deployed. Identifying areas of improvement The Hanwha-Genetec Planet Fitness solution also provides key employee analysis that can help managers identify areas of improvement. Each facility has rubber floors that must be cleaned daily and Adirondack Direct has placed a sensor on a floor scrubber that creates a bookmark and recording in Security Center when the device is moved. Video evidence verifies whether the floor was actually cleaned or if the scrubber was just relocated. Planet Fitness management can re-orient that employee on the proper policies and procedures Each break room is outfitted with a sensor that creates a video bookmark every time the door is opened. If an employee visits too often, Planet Fitness management can re-orient that employee on the proper policies and procedures. For day to day efficiencies, video analytics can be a valuable tool. If an employee is constantly leaving the front desk to go to a storage closet for a particular item, they can make changes including moving the item closer to the front desk. Losing sales opportunities “If during an overnight shift the camera indicates that there was no motion at the front desk for a prolonged period of time, then that’s a problem,” said Esposito. “We expect someone to be in that position greeting and welcoming members so if someone isn’t there, the video can help us understand why.” A big question for Planet Fitness is have they been losing sales opportunities without realising it? A big question for Planet Fitness – that can be answered via video analytics – is have they been losing sales opportunities without realising it? “What we’re exploring now is a virtual line that counts the number of people that come and go in the club,” said Esposito. “We know how many people check-in. So, if a club checks in 500 people in a day, but there are 600 people that enter the door, that can be lost revenue.” Delivering a safe environment Esposito said they chose Hanwha cameras and the Genetec platform because they knew that they needed a solution that was at the forefront of technology, with the flexibility to grow with them and meet their future needs. He added the solution delivers a safe environment that is appreciated by everyone. “It’s somewhat of a security blanket for our members and employees,” he said. “They appreciate our no intimidation mantra and the fact that we have created this safe and secure environment that offers a judgment-free zone where people can do their own thing.”
The city of Bologna has chosen Wisenet video surveillance cameras to help it create a smart traffic management system. Bologna is the seventh most populous city in Italy. It is at the centre of a metropolitan area of approximately one million people with a diverse range of travelling requirements within a very large area. The City has always invested in traffic control and monitoring systems with the aim to make travel easier and faster for its citizens. An example of this is a centralised traffic light management system which has been in operation since 2013 and has helped reduce travel times within the urban area. Video surveillance solution The purpose was to provide a tool to allow authorities to take strategic planning measures The City wanted to invest in a video surveillance solution which would allow the monitoring of 12 vehicle access gates to the city in order to provide authorities with reliable real-time information about urban mobility. The purpose was to provide a tool to allow authorities to take strategic planning measures and optimally redistribute the traffic load on the road network. After extensive research, which included the evaluation of a wide range of possible solutions, a decision was made to procure a total of 89 Wisenet cameras manufactured by Hanwha Techwin. The implemented solution consists of cameras dedicated to vehicle counting and classification, and ANPR cameras which have been installed on strategic gates. The cameras monitor both directions of travel to allow local authorities to study the most important and strategic vehicle access flows to the city. Detecting illegally parked vehicles This is made possible thanks to the latest generation of Wisenet cameras. By integrating high image quality and advanced video algorithms, Wisenet ‘intelligent’ cameras are able to enhance the value of video surveillance by supporting mobility and security in Smart Cities. 24 of the cameras installed are Wisenet XNO-6120R/TD bullet cameras equipped with Traffic Data 24 of the cameras installed are Wisenet XNO-6120R/TD bullet cameras equipped with Traffic Data, an edge based application developed in cooperation with Sprinx Technologies which facilitates the collection of statistical data about vehicle flow. By tracking the vehicles moving in a camera field of view, the application is able to provide information on vehicle counts, classification and average speed. 24 of the other cameras installed are Wisenet XNO-6120R/FNPs. These feature Roadway Licence Plate Recognition application which is able to help the local authority’s control room operators detect illegally parked vehicles and other traffic infringements. Built-in IR illumination Effective with all European number plate formats, the application has more than a 95% recognition accuracy whatever the environmental conditions, even when vehicles are moving at speeds of up to 150 km/h. The Wisenet XNO-6120R is a 2 megapixel bullet camera which is able to capture high definition images with the help of a 12x optical zoom, digital image stabilisation with built-in Gyro sensor, a Defog feature and built-in IR illumination. Part of the Wisenet X camera series, the XNO-6120R features the World’s best Wide Dynamic Range (WDR), which performs at up to 150dB to produce clear images from scenes that contain a challenging mix of bright and dark areas and normally result in overexposed or underexposed images. Real time automatic incident detection The Wisenet X series provides an opportunity to run on-board third-party video analytics plug-ins The processing power of the Wisenet 5 chipset incorporated into the Wisenet X series provides an opportunity to run on-board third-party video analytics plug-ins for different applications, such as number plate recognition, vehicle counting/classification and real time automatic incident detection. Completing the camera line-up are 41 Wisenet SNP-L6233RH 2 megapixel 23x IR PTZ dome cameras which have been carefully located at major road junctions throughout the city, in order to allow control room operators to zoom in to see close up detail of any incidents. Traffic management solution “We are delighted with how easy it has been to successfully integrate the Wisenet cameras with our existing video management platform and our other supervision monitoring systems,” said Alberto Nuzzo, Head of Office 'Digital Infrastructure and Telecommunications', at Comune di Bologna, when commenting on the success of the traffic management solution. “The data captured by the Traffic Data and ANPR applications running onboard the cameras, is allowing us to far better manage the existing levels of traffic, whilst also helping us capture and store valuable data which we will be able to analyse to assist us to plan for the future. Our control room operators have been particularly impressed with the exceptional clarity of the images captured by the cameras and the data analytics capabilities of the system, which are enabling them to accurately visually verify what may be occurring and quickly take appropriate action.”
Following a competitive tender process Corps Security has been awarded a three-year contract to provide security services to Registers of Scotland at Meadowbank House, in Edinburgh. A team of 10 officers will provide guarding services with a focus on front-of-house, customer service, CCTV monitoring and patrols. Like-minded organisation Registers of Scotland is the public body responsible for compiling and maintaining registers relating to property and other legal documents in Scotland. Mike Bullock, Chief Executive of Corps Security, said: “We are delighted to be working with such a like-minded organisation. Corps Security is a trust which was set up to provide employment for ex-servicemen returning from the Crimea. We share values with Registers of Scotland and look forward to working closely together.”
Genetec Inc., globally renowned technology provider of unified security, public safety, operations, and business intelligence has announced that the city of New Orleans (NOLA) is relying on Security Center, the company’s unified IP security platform, to improve public safety and enhance city-wide collaboration. With about 400,000 residents, New Orleans (NOLA) is the most populous city in the State of Louisiana. Like other big cities, NOLA is focused on enhancing public safety for its citizens and the 1.2 million visitors who flock to the city’s French Quarter for Mardi Gras celebrations. Using Security Center, the NOHSEP agency has saved police officers about 2000 hrs of investigative work in just a year Genetec Security Center As part of a Citywide Public Safety Improvement Plan that included the deployment of a new citywide public safety system and the construction of a Real-Time Crime Center (RTCC), the New Orleans Homeland Security and Emergency Preparedness (NOHSEP) chose the Genetec Security Center unified platform to support all city agencies. Using Security Center, the NOHSEP agency has saved police officers about 2000 hours of on-foot investigative work in just one year. “It might take a police officer over an hour to visit business locations, speak with owners, look through video, find what they are looking for, get a copy of video onto USB keys, drive back to the precinct, and then submit that into evidence." said George Barlow Brown, IT Manager at the New Orleans Real Time Crime Center. Video and ALPR cameras He adds, “So, we have essentially saved the department over 2000 hours of manual labor in physically collecting and storing video evidence. That’s more time for officers to respond to calls of service and be present in our many neighborhoods, which helps build community confidence. The ROI is there for us in terms of the efficiency,” The team can now easily retrieve evidence from over 325 city-owned video cameras and 100 automatic license plate recognition (ALPR) cameras (60 of which are Security Center AutoVu cameras) from the Real-Time Crime Center. The new security platform is integrated with other public safety solutions such as a Briefcam analytics system and a computer-assisted dispatch (CAD) system. All this information gets routed through to a central command center, speeding up emergency response. Share video access with RTCC “Our operators do the full investigative work right from within Security Center. It’s just one of the most intuitive solutions that I have ever seen. We can display up to six video tiles and hit ‘synchronise video’ to see various angles of the same scene playing at the same time. We can then select the segment of video we need and hit export. Each 10-minute segment from all the video tiles is then archived for viewing later on,” said Brown. NOLA is also leveraging Security Center to foster a true public-private partnership. The city launched a platinum version of the SafeCam project, which allows businesses to share access to external video cameras with the RTCC. Motion-detection alarms Using the Genetec Federation feature, the NOHSEP team can access video from participating companies’ systems Using the Genetec Federation feature, the NOHSEP team can access video from participating companies’ systems. Participating businesses can be identified by discrete signage at their front entrances. This tells on-the-ground officers that this business has shared their outdoor cameras with the RTCC, and there is no reason to disturb the establishment or their customers. The officer can simply call RTCC operators to get the evidence they need. Brown and his team also have motion-detection alarms set up on cameras facing some known illegal dumping sites. As soon as someone dumps refuge in these locations, the team can proactively notify the Sanitation Department so they can collect the debris. Mining video and data NOLA is making the most of its security investments to improve city life too. For one, the RTCC operates a backup emergency operations center for the city of New Orleans. The NOHSEP team has also shared video feeds with other city departments such as the Sewage and Water Board, so they can determine the rate at which an intersection floods. As plans continue to evolve, the RTCC team is taking full advantage of the new technology to keep NOLA safer. “As far as investigations and the ability to mine video and data, Security Center is hands-down the best product out there. With this platform, we’re extending greater efficiency to responding officers, and we’re also forging stronger partnerships with our community. Together, we’re all working smarter and faster to keep New Orleans safe,” concluded Brown.
IP video intercom systems are becoming more popular not only in industrial environments but also in residential projects. Security business has moved towards IP technology. Video intercom, on the other hand, is a key system that should be considered as a link between the user and the security systems due to its integration capabilities. With MEET, it’s easy to integrate video surveillance systems and receive alarms at home. It can be integrated with third-party home automation systems and access control solutions. Face recognition, CCTV visualisation MEET system is a 100% IP technology based on a Point-to-Point infrastructure MEET, the most advanced IP system from FERMAX, was specially designed for residential communication. Secure, reliable and with cutting-edge functionalities, it ensures an outstanding high-quality audio & video, featuring call divert. Moreover, it is easy to install and maintain, with almost unlimited capacity. The system is a 100% IP technology based on a Point-to-Point infrastructure, highly efficient, flexible and powerful. As pointed out by Juan Madrid, Business Development Director and IP Product Manager at FERMAX, “MEET second-generation technology allows our customers to benefit from a top-notch 100% full IP system, even compatible with GPON infrastructure, and a broad range of built in security functions as proximity reader, lift control, face recognition, CCTV visualization and alarm detection”. Monitoring CCTV cameras The devices communicate directly, so MEET does not require central units or servers which could compromise the availability of the system in the event of an unforeseen error. MEET allows the installer to freely assign the range of IP addresses according to the needs of each project, and thus facilitate the control of the networks in every building. MEET system, has already been successfully adopted by FERMAX integrators worldwide MEET system, launched in January 2018, has already been successfully adopted by FERMAX integrators worldwide. “The market feedback has been very positive, especially due to the flexibility of the system, its capability to integrate with Wiegand controllers or readers and to monitor CCTV cameras through RTSP protocol. All these features allow the system to fulfil project requirements from different markets around the world” assures Francisco Alapont, Solutions Department Director and Digital Business at FERMAX. Home automation integration MEET is the system that brings to life the state-of-the-art digital panels which include a triple access control system: face recognition, keypad and proximity. The system’s range is made up of digital panels, one-button panels, touch screen monitors, concierge stations and various accessories. KIN panel, for instance, is an interactive approach featuring touch screen. While being elegant and customizable, it allows the visitor to interact in a simple way with its user interface. MILO panel and MEET Guard Unit are outstanding due to their design and intuitive interaction features. When it comes to the apartments, MEET offers indoor monitors with a simple and compact design. WIT PoE monitor, with its technology and exclusivity, is specially designed for home automation integration and suitable to fit in the most sophisticated environments; MIO monitor, is a symbol of urban and modern residences, represented by its compact and simple design. Single internet connection Our customers will benefit from a wide variety of intercom and security functions in all MEET products" Call Divert function to smartphone has been one of the key goals achieved thanks to MEET ME App, which features a high-resolution image even in portrait mode. It is not only an additional gadget; it is a part of the core features of MEET, which implements by default this function at zero cost. “Connectivity is the cornerstone of FERMAX´s strategy. With MEET system we can offer a seamless and enhanced experience to our installer, connecting our MEET monitors by default without any additional costs related to servers, gateways or licenses. Only one single Internet connection for the building is required.” adds Francisco Alapont. Competitiveness is key for FERMAX and MEET IP technology allows to offer a complete bundle of features already built in the product without increasing its price. “Our customers will benefit from a wide variety of intercom and security functions in all MEET products. This adds value to the MEET system and revert back to the installer as a turnkey solution in terms of easiness of installation and cost reduction” says Juan Madrid.
Your Homes Newcastle (YHN) manages more than 26,000 properties on behalf of Newcastle City Council. They are piloting an innovative fire detection system in partnership with OpenView Security Solutions, the UK’s largest privately-owned independent security company and a national supplier of fire, electrical and mechanical services to the public and private housing sector. MOBOTIX thermal imaging cameras have been installed in 3 multi-storey blocks across the city to continually monitor temperatures in the buildings’ bin chute rooms. The thermal cameras will send an alarm to OpenView’s central control centre and the fire service immediately if an unexpected heat pattern is detected. The early detection system provided by the OpenView now means that residents can be reassured of much faster response times from the fire service in the event of an incident, minimising the potential impact on occupants and their properties, so that they and their homes are far safer as a result. Risks and Challenges Ensuring safety of residents through early detection and prevention of potential fires To be able to react quickly to verify a fire situation Alerting the fire service within seconds of a potential fire so they can respond rapidly Keeping residents safe and minimising damage to property in the event of a fire The risk to lives and property caused by rapid spread of a fire in high-density apartment blocks Solution provided by MOBOTIX and OpenView MOBOTIX M16 thermal cameras installed in bin chute rooms of 3 YHN multi-storey blocks Thermal technology continuously monitors temperature, triggering an alarm if an unexpected heat pattern is detected Operators in OpenView’s central control room assess and monitor the situation Fire service instantly alerted ready for rapid response MOBOTIX cameras integrated into existing infrastructure with no disruption to residents Potential risk to lives and property minimised through early fire detection Installation of thermal imaging cameras YHN has installed thermal imaging cameras in 3 of its 45 multi-storey blocks across the cityYour Homes Newcastle (YHN) manages community and public housing on behalf of Newcastle City Council. Set up in 2004, the organisation oversees more than 26,000 properties for the council. With fire safety in tower blocks having been in the spotlight since the Grenfell Tower tragedy in 2017, YHN took the decision to pilot an innovative fire detection system. In a trial partnership with OpenView Security Solutions, the UK’s largest privately-owned independent security company and a national supplier of fire, electrical and mechanical services to the public and private housing sectors, YHN has installed thermal imaging cameras in 3 of its 45 multi-storey blocks across the city. “The tragic events at Grenfell Tower have undoubtedly put fire safety in multi-storey blocks under a microscope, but we have been trialling new measures in our multi-storey properties for some time,” says David Langhorne, YHN’s Assets and Development Director. ONVIF compliant thermal cameras OpenView Security designed and installed an early fire detection system using MOBOTIX dual M16 thermal cameras, featuring one thermal and one optical sensor. MOBOTIX thermal sensors measure minute differences in mid-wavelength infrared radiation emitted from an object or body based on its temperature, allowing them to pick up temperature differences of 0.05 of a degree within a temperature range of -40 to +550 degrees Celsius. The ONVIF compliant MOBOTIX cameras contain a powerful CPU that can deliver up to 3 video streams simultaneously The ONVIF compliant MOBOTIX cameras contain a powerful CPU that can deliver up to 3 video streams simultaneously and fulfil the H.264/ONVIF standard, making it easy to combine them with other systems to create unique solutions to real-world problems. By integrating the cameras into YHN’s existing infrastructure, which uses OpenView installed equipment, it was possible to implement the new system without any disruption to residents. Alerts central control room in case of fire Operators are able to monitor images from the thermal lens to pinpoint the exact location of hotspotsThe MOBOTIX M16 cameras were installed in bin chute rooms, where they continually monitor the temperature, sending an alert to the OpenView’s central control room instantly if an unexpected heat pattern is detected. Operators are then able to monitor images from the thermal lens to pinpoint the exact location of hotspots, such as smouldering fires, as well verify the situation via a live feed from the optical lens. An alarm is also raised with the fire service within seconds of a potential fire, making them ready to respond rapidly to a potential emergency situation. According to Andy Ward, Sales Director of OpenView Security Solutions, the innovative fire protection solution enables housing providers to ensure a safer environment for residents and minimise the incidence of false alarms: “It now forms part of our expanding portfolio of fire and life safety solutions, which is one of the fastest growing areas of our business, and consolidates our leading position in the public and private housing sectors.” Faster response times from fire service The early detection system provided by the OpenView now means that residents can be reassured of much faster response times from the fire service in the event of an incident, minimising the potential impact on occupants and their properties, ensuring that they and their homes are far safer as a result. We have wet and dry risers, central alarm systems, smoke alarm activated bin chute fire dampers and bin room sprinklers"“This trial system is one of many fire safety measures currently in place in the blocks we manage across the city. We also have wet and dry risers, central alarm systems, smoke alarm activated bin chute fire dampers and bin room sprinklers,” Langhorne explains. “We pride ourselves on being innovative, so it was an easy decision for us to test something that had not yet been adopted elsewhere,” he adds. Meeting requirements of integrator and end-users Frank Graham, MOBOTIX Regional Sales Manager UK & Benelux, said of the partnership with YHN and OpenView: “We are very happy to be working so closely with both YHN and OpenView in the development and provision of an innovative solution for such a serious issue. “MOBOTIX cameras have inbuilt intelligence to meet all the requirements of integrator and end-users alike and we look forward to a longstanding and fruitful partnership with both organisations moving forward.”
Round table discussion
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
You could say concerns about privacy are “trending” in our increasingly data-driven world. Unease about how Facebook and other high-tech companies use and share data dominates the news, and the full impact of new European Union (EU) regulations is about to be felt around the world. By May 25, companies that collect data on EU citizens will need to comply with strict new rules around protecting customer data, as enumerated in the General Data Protection Regulation (GDPR). But how do the new regulations, and broader concerns about privacy, affect the physical security market? We asked this week’s Expert Panel Roundtable: How do privacy issues and regulations, such as GDPR, impact physical security systems and how they are managed?
Companies in fast-moving industries tend to want half or more of their revenue to come from products released in the last three or so years. The logical extension of that philosophy is the demise of product "cash cows" that remain in a company's portfolio for many years. Where better to witness the shortening life cycles of technology products than in the smart phone market, where most of us buy into the hype of the "latest and greatest?" But does acceleration of new product introductions translate into shorter product life cycles in the field? We asked this week's Expert Panel Roundtable: What is an acceptable life cycle for a physical security system? Is there a trend toward systems being replaced more, or less, often?