OPTEX, renowned global sensor manufacturer, will demonstrate the recently enhanced long-range RLS-3060 LiDAR series live on its stand, as well as showcase its new 180-degree outdoor sensor ideal for boundary protection. OPTEX LiDAR and REDSCAN series sensors “OPTEX’s LiDARs have been successfully deployed in the Middle East region for years, for a number of applications ranging from perimeter security to roof and asset protection. At this year’s Intersec we are looking forwar...
RTI, a control and automation manufacturer for residential and commercial settings, announced its product lineup for Integrated Systems Europe (ISE) 2019, taking place Feb. 5-8 in Amsterdam. In Stand 1-N85, the company will be showcasing media distribution and collaboration solutions for classrooms, lecture halls, and meeting spaces, including the new VXU-SC video conferencing system. Products on display In addition, the company's Miravue VIP-1 video-over-IP system and VMS-741 multiviewer will...
The American National Standards Institute (ANSI) has appointed Susan Carioti, the vice president of certification, standards and guidelines at ASIS International, to a three-year term as a director-at-large on the ANSI board of directors. Standards and conformance-based solutions As a director-at-large, Carioti will work with members of the board to determine and approve the policies and direction of ANSI’s strategic vision, and in close collaboration with stakeholders from industry and...
There is a new event on the calendar for the security industry in 2019: The Security Event 2019, 9-11 April, at NEC, Birmingham. For additional details and a preview of the new trade show and conference, we spoke with Tristan Norman, Founding Partner and Event Director, The Security Event. Q: It seems recently that some trade shows have been on the decline in terms of exhibit size and attendance. Why does the physical security industry need another trade show? Norman: I think there are numer...
New for the UK and Republic of Ireland security markets, the Pyronix Enforcer Perimeter Protection Kit ensures that intruders are detected before they gain access to residential or small commercial properties. Two-way wireless technology Featuring secure Enforcer two-way wireless technology and a combination of shock sensors and magnetic contacts, the Enforcer Perimeter Protection Kit provides an effective, alternative solution to internal, volumetric motion detection. Our new Enforcer Perimet...
Employee turnover is a problem for many companies, especially among younger employees who have not developed the philosophy of employer loyalty that was common in previous generations. Nowadays, changing jobs is the norm. The idea of spending decades working for a single employer seems almost quaint in today’s economy. However, excessive employee turnover can be expensive for employers, who are looking for ways to keep their brightest and best employees happily toiling away as long as poss...
ADT Inc., global provider of monitored security and interactive home and business automation solutions in the United States and Canada, has announced that it has completed its acquisition of Red Hawk Fire & Security, provider of commercial fire, life safety and security services and portfolio company of Comvest Partners. Commercial security and fire safety “We are pleased to complete this transaction, which strengthens ADT’s growth in the commercial security market and meaningfully expands the company’s product portfolio with the introduction of commercial fire safety related solutions,” said Jim DeVries, ADT’s President and Chief Executive Officer. He further added, “With the added robust portfolio of fire and life safety solutions, as well as additional scale through commercially-focused sales professionals and technicians, we enhanced our position as a leader in commercial security, just as we are today in the residential market. ADT has a strong track record of successfully integrating acquisitions and we look forward to welcoming the talented Red Hawk team to the company.” Moving forward, Red Hawk’s ability to showcase its products and services to a wider range of National Account and enterprise-level customers will be significantly accelerated with ADT, while also increasing ADT’s technician workforce dedicated to the commercial customer.
Telefónica España, the Telecommunications Operator in Spain with a fixed and mobile network, together with Allot Ltd., a global provider of innovative network intelligence and security solutions for service providers worldwide, joined forces last year to deliver an innovative, comprehensive, network-based cybersecurity solution for consumers. The agreement was announced in February 2017. This initiative arises from the current market need for an advanced consumer-focussed security service. Telefonica España launched the joint cybersecurity solution as part of a service called Movistar Conexión Segura. Movistar Conexión Segura, a pioneering commercial service, leverages the Allot NetworkSecure solution and provides effective and immediate protection against malware in both fixed and mobile networks. Enhancing customers’ digital experience "Security is the next big opportunity for operators to enhance the digital experience of their customers. Our cybersecurity solution provides ‘peace of mind’ for consumers across Telefonica’s network,” said Francisco Cayuela, Vice President Sales, Spain and LATAL at Allot. “We are proud of our key contribution to the Movistar Conexion Segura service, now launching in Spain, and are excited with the forthcoming launches anticipated by other key Telefonica affiliates around the globe.” “With the launch of Conexion Segura, which leverages Allot’s technologies, Telefónica has become a disrupting force in the market,” said Agustín Navarro, Consumer Business Unit Director at Telefónica España. “We are excited to be a forerunner in offering a cybersecurity service with this unique mix of capabilities, bringing together protection of the fixed and mobile network.”
Pelco by Schneider Electric, global provider of intelligent video surveillance solutions, announced the release of the GFC Professional 4K, a video camera delivering 8 MP resolution detail for demanding video security applications with heavy foot and vehicular traffic. The GFC Professional 4K is also designed to support challenging lighting conditions that are typical in city surveillance, airports, seaports, traffic, gaming facilities, corrections, commercial, and hospitality deployments. GFC Professional 4K Camera The GFC Professional 4K Camera delivers high definition, crystal clear video at 30 frames per second (fps) for industries whose operations demand 24/7 surveillance. With this level of clarity, customers can use one camera to cover a large area and digitally zoom-in for detailed information like license plate numbers and faces. Smart Compression technology By pairing 4K video resolution with H.265 video coding and Pelco’s Smart Compression technology, the GFC Professional 4K Camera minimises network bandwidth and storage costs. In comparative tests using the ISO standard for evaluating a camera’s true dynamic range (tone contrast within an image), and not a proprietary vendor test with undisclosed ‘forensic’ conditions, the GFC Professional 4K consistently tested 5 to 9% higher than the competitor’s 4K camera. Additionally, the GFC Professional 4K delivers category-leading 0.2 lux light sensitivity performance at 30FPS in color mode. 4K technology “Pelco has successfully applied 4K technology to solve real security video challenges – providing more detail even in scenes with low light or overly bright areas, and doing this cost-effectively without unduly burdening storage costs,” said Sophie Wang, Sr. Global Product Line Manager. “Unlike other vendors’ 4K cameras, the robust Pelco Pro firmware feature set on the GFC Professional 4K maximises image quality, light sensitivity, and much more,” she concluded.The GFC Professional 4K delivers category-leading 0.2 lux light sensitivity performance at 30FPS in color mode The introduction of 4K technology into Pelco’s product portfolio is a natural step in the journey to offer quicker identification related to incidents or suspicious activity with the following key features: Up to 4K/8MP resolution in 30fps: Contains up to four times the resolution of 1080p, a single fixed camera can cover a wide area with highly accurate and clear details. H.265 video coding & Pelco Smart Compression: Decrease bandwidth and video recording costs. Wide temperature range: This camera operates in extreme temperature environments with a temperature range between –40° to 60°C (–40°F to 162.5°F), and up to 65°C (149°F) at four hours/day. 100dB true Wide Dynamic Range (WDR): Brings out the detail in both very bright and dark areas to maximise visibility and is useful in scenes where there are dark and bright areas in the image; lobby areas with streaming sunlight and nighttime traffic with headlights and taillights that obscure license plates. IR illumination: The built-in IR Illuminator produces detailed images in zero light, and the adaptive IR Illuminator avoids overexposure that can hinder detection. Motorised lens with P-Iris: In addition to remotely zoom and focus control, the P-Iris enables more precise control on the light reaching the sensor resulting in better image clarity and depth-of-field in all lighting conditions. IK10, IP66 rating & metal construction: Both indoor and outdoor cameras are rugged, vandal resistant, and waterproof. Three independent, configurable streams: All three streams are configurable with video coding (H.265/H.264/MJEPG), resolution, and frame rate. This enables more flexibility in recording and viewing video. Audio and alarm functions: Operators can interface with other systems and the camera to promptly react to events and incidents. Real-time audio enhances the security information captured by the camera.
Sentinel Consulting, a premier Manhattan-based full-service security consulting firm that advises high-profile, high-net-worth clients in the areas of security management, law enforcement, emergency services and security technology, announced the launch of its new Unmanned Technology Planning and Design Services. Applications for unmanned aerial systems (UAS), or drones, as well as robots and autonomous ground vehicles, will now be formally represented within Sentinel’s comprehensive plan/design/deploy/manage spectrum of services. Sentinel’s Unmanned Technology Planning and Design Services will be introduced at the Unmanned Security Expo New York, November 14-15, at New York City’s Javits Center. Protecting facilities and critical infrastructure Industry analysts project that by 2020, the security investment in automated and robotic system will top $10.5 billionThe Company’s expanded focus to incorporate the security benefits and risks associated with unmanned technology is a proactive measure to ensure its client base is fully supported as it invests in this growing category of solutions. Industry analysts project that by 2020, the security investment in automated and robotic systems, specifically UAS, will top $10.5 billion. Unmanned technology has made major inroads into the protection and risk mitigation of high-profile facilities, critical infrastructure, large complexes and diverse other businesses, while at the same time, the potential asset risks from UAS have multiplied, including business espionage and potential attacks on critical sites. These security concerns are central to Sentinel’s customers. Autonomous solutions for commercial security The Unmanned Security Expo, an all-new trade-only event focussed exclusively on providing autonomous solutions for commercial and government security and safety as well as drone detection/counter-system applications, is an opportunity for high-level security executives to evaluate manufacturers’ solutions and participate in educational seminars related to the complex issues surrounding the product category. Sentinel is led by a team of seasoned security professionals with certifications that include FAA Part 107, PSP and CPP Those seeking additional guidance will find that Sentinel is uniquely qualified to help them navigate the full range of challenges they will encounter, including ambiguous UAS regulations, issues related to insurance and liability, evaluating total cost-of-ownership and return-on-investment, defining standard operating procedures and policies, selecting the right manufacturing and contracting partners, and training security staff to operate and manage unmanned systems. Providing certified security professionals Sentinel is led by a team of seasoned security professionals with certifications that include FAA Part 107 – Certified Drone Pilot, PSP – Physical Security Professional and CPP – Certified Protection Professional. Paul Benne, Sentinel’s CEO, explains, “Our unique combination of comprehensive expertise and fluency in security technology is at the core of our ability to consistently provide the right professional team to service our clients. As our clients begin to embrace unmanned technology as part of their security portfolios, they can feel confident that Sentinel will deliver an end-result that fully delivers on their security objectives, while taking the pain and confusion out of the entire process.”
Hikvision, the global supplier of innovative video surveillance products and solutions, exhibited the latest AI products and technologies at 2018 Security China. More than 1,000 organisations participated in the exhibition which attracted a diverse audience of global distributors, integrators, IT professionals, technology enthusiasts and consumers to join the conversations about solutions around AI, intelligent security, cloud and other mega trends. At the show, Hikvision announced the release to the Chinese market of its AI Cloud framework including platforms for AI Applications, Resource Management, Operations and Maintenance Services. Hikvision is working closely with eco-system partners on AI Cloud network infrastructure, platform services and application interfaces. A 3D camera with the capability of 3D face modelling, which can prevent spoofing attack of photos, video and masksExhibiting various cameras In the product area of the exhibition, Hikvision showed its latest, core technological breakthroughs and products including: A 3D camera with the capability of 3D face modelling, which can prevent spoofing attack of photos, video and masks, and improve the comparison of facial features and side face; A demo model of 64MP PanoVu camera that adopts integrated design, panoramic images by an eight-sensors patchwork to support 360 ° panoramic monitoring, as well as simultaneous panoramic and close-up pictures; A deep learning-based thermal imaging camera for effective fire detection and with algorithms for behaviour analysis and accurate face temperature measurement. Intelligent solutions for public security In addition, Hikvision showcased its intelligent solutions for public security and commercial applications, like safe cities, intelligent transport systems (ITS) and smart retail with more than 20 scenario-specific intelligent solutions on display. One example was the ITS solution, which has the capability to analyse video feeds, learn traffic behaviour and support management of traffic flow, congestion and incidents. Visitors could also see a wide range of innovations and products for new Hikvision enterprises, such as smart home products (EZVIZ), industrial automation (Hik Robotics), automotive electronics and intelligent storage.
Bates Security, LLC, a commercial and residential security company based in Kentucky with branches in Prestonsburg, Kentucky and Jacksonville, Florida, is happy to announce the recent acquisition of HITEC Security from Tommy Kidd of Pikeville, Kentucky. Bates Security and HITEC are a perfect match as both are family owned and operated businesses based in Kentucky. With the acquisition, Bates will be adding over 600 accounts to its customer base in Prestonsburg, where Bates does business under the ABCO Security name. “Tommy is a great guy and very enthusiastic about the security industry and he has built up a solid business,” said Jeremy Bates, President of Bates Security. “I have known Tommy for a while now and we are honoured that he selected us to be the ones to continue the legacy he has built.” Efficient transitioning process When I decided it was time to turn my customers over to someone, I knew that Bates Security was the right company to call"With the acquisition, Bates will bring on a new employee to the team, and Tommy will be an important part of the transition process and long-term servicing of the company. “When I decided it was time to turn my customers over to someone, I knew that Bates Security was the right company to call,” said Tommy Kidd, owner of HITEC Security. “I have known Bates for a long time and trust Jeremy and his people. They are good people and they know what they are doing, so I know my customers will be in good hands.” Bates Security and its sister company, Sonitrol of Lexington, received $10M revolving line of credit from Capital One to fund organic expansion and take advantage of acquisition opportunities in both Kentucky and Florida.
Last week, the Schedule 84 Suppliers Research Panel participated in reviewing the 2018 contracting year with the GSA Schedule 84 leadership team. Our panel group consists of experienced contractors and consultants meeting for a monthly conference call. Schedule 84 is the GSA Schedules Contract for Total Solutions for Law Enforcement, Security, Facilities Management, Fire and Rescue. Our opinions are part of a research programme to provide valuable feedback to the GSA Schedule 84 programme and on to the GSA central office. The director of GSA Region 7 Schedules Program, the Schedule 84 Branch Chief and the Category Manager Subject Matter Expert who manages our suppliers' panel gave us their full attention as we discussed the successes of the programme, hot topics, problems and the future. We determined 2018 under the Schedule 84 team to be a year of innovative thoughts, cooperative effort and renewed enthusiasm Innovative review team We determined 2018 under the Schedule 84 team to be a year of innovative thoughts, cooperative effort, renewed enthusiasm and productive changes building upon the successes of 2017. There was high praise for the accessibility to the Schedule 84 staff. Their consistent quick response to questions and concerns, thinking outside the box and supporting the programme by partnering with their contractors was much appreciated. There has been a renewed spirit of partnering to cooperatively bring the best to agency customers. It seems to be working as per the Centre Director sales are growing for GSA Schedule 84. Advocating for the security industry In my experience, business development starts with the Administrator from Region 7 in Ft. Worth, TX. As the annual Schedule 84 Industry Day at the SSAC begins he is shaking every hand and passing out his cards looking folks right in the eye asking, “how can I help you?” They have the best practices and most organised paperwork. The SSAC director has chosen well in her staff and is hands-on in every endeavour to direct things along when challenges occur or to improve the programme. The new 84 Branch Chief is knowledgeable, innovative, tireless and has been heavily involved in advocating for the security industry It continues with the centre’s CASE Manager encouraging the contractors at events, visiting agency customers and promoting the GSA Schedules Program by helping coordinate the partnering. The new 84 Branch Chief is knowledgeable, innovative, tireless and has been heavily involved in advocating for the security industry for adding new technology, meeting with industry associations, understanding the complexity and challenges of Homeland Security Presidential Directive 12 (HSPD12) and advocating for the purchasing Physical Access Control Systems (PACS) utilising the appropriate standards and the GSA Program among other innovations. As far as the supplier panel, we gave our GSA Schedule 84 team and leaders high praise for 2018. GSA also added new categories or SINs for clearly identifying Physical Access Control Products that appear on GSA’s Approved Product List Changes in the GSA programme Some changes this year in certain GSA programmes included the creation of a new category of products/services Special Item Number (SIN) for Order Level Materials (OLM) developed to assist with solution procurements. This new SIN was added to Schedules 03FAC, 56, 70, 71, 00Corp, 738X and 84. Under Schedule 84 it is SIN 84-500. GSA Schedule 84 consolidated many Special Items Numbers (SINs) to make finding products and services less complex Essentially this SIN allows agencies procuring under the aforementioned GSA Schedules’ programmes to purchase and the contractor to add items and services not known prior to the task as a Contract Line Item Number (CLIN) not to exceed 33% of the order. For more information and FAQs on OLMs go to www.gsa.gov/olm. This is not to take the place of “Open Market” items for adding products only that are not listed on a company’s GSA Contract. Physical access control products Previously, GSA Schedule 84 consolidated many Special Items Numbers (SINs) to make finding products and services less complex for the agencies. GSA also added new categories or SINs for clearly identifying Physical Access Control Products that appear on GSA’s Approved Product List according to the standards created under FIPS201. These products appear under SIN 246 35-7 after being tested and approved by GSA. To be qualified to install these products under the GSA Program at least one individual from the GSA Contractor company must complete the class and be CSEIP certified before applying for labour SIN 246 60-5. Additionally, the company must demonstrate certain qualifications and have past performance for this type of work. The Security Technology Alliance offers the training class and certification. Certified individuals and approved products are listed at www.idmanagement.gov. Companies listed with SIN 246-35 7 and SIN 246-60 5 may be found by searching at www.gsaelibrary.gsa.gov. Updates to guidance for procurement Updates to guidance for procurement of PACS will continue to be posted to the GSA PACS Ordering Guide Updates to guidance for procurement of PACS will continue to be posted to the GSA PACS Ordering Guide. The ordering guide posted at www.gsa.gov/firesecurity is a valuable support tool created to assist agencies with understanding the requirements of FIPS201 and procuring a PACS. The guide includes relevant regulations, FAQs, sample systems designs, sample statements of work, a list of key points of contract for additional help and questions. In partnership with GSA and guided by the GSA Ombudsman group, the Security Industry Association and the Security Technology Alliance members and their contractor companies participated in a GSA Reverse Industry PACS Training Day on September 17, 2018. We presented from an industry perspective important fact on PACS system requirements, procurement planning, providing information on resources and further educating with panel discussions, individual presentations and amusing skits to over 300 Government agency staff and acquisition specialists. You can find some of the unedited recording of the PACS Reverse Industry Day Training on YouTube. Some changes included the creation of a new category of products/services Special Item Number (SIN) for Order Level Materials (OLM) GSA Schedules Program A hot topic about the GSA programme for 2018 was also an issue for the prior year. The GSA Schedules Program is a streamlined contracting vehicle incorporating specific Federal Acquisition Regulations for more efficiently purchasing commercial items. Companies may apply per a continuous open season for a 5-year contract with three 5-year options to renew. Contractors are vetted for past performance, corporate experience and financial capability. Products and services are considered for offering to Federal, State and Local customers (for Schedule 84) with pricing that is determined to be fair and reasonable through negotiations with GSA. To make the determination for fair and reasonable pricing GSA carefully reviews the commercial practices of the contractor To make the determination for fair and reasonable pricing GSA carefully reviews the commercial practices of the contractor as well as the competition of identical or similar item pricing. The most vocal complaint of concern from the contractors was regarding the consideration of competitor contractors offering identical items with out-of-date pricing or holding a Letter of Supply not authorised by the manufacturer. GSA pricing tool Since the GSA utilises a pricing tool to determine if the pricing offered is competitive, a rogue competitor can cause a pricing action to possibly be rejected due to out of date information even as the manufacturer offers an update of the product. This is an issue on all GSA Contracts that the supplier panel hopes will be reconsidered by GSA policymakers at the central office. Most of us believe the Letters of Supply should only be issued by the manufacturer or with documented specific permission of the manufacturer to a reseller. Manufacturers may want to have a better understanding of the Letter of Supply, how it is considered by GSA and more carefully choose their Government partners for experience and compliance. Another challenge for the security community is regarding the lack of accessibility of participating dealers to GSA eBuy Overcoming challenges for the security community Contractors may only see RFQs which are posted under the Special items Number(s) that were awarded to their GSA Contract Another challenge for the security community is regarding the lack of accessibility of participating dealers to GSA eBuy. GSA eBuy is an online Request for Quotation (RFQ) programme that is for GSA Contract holders only. Agencies will post their requirements by Special Item Number for at a minimum 48 hours. Contractors may only see RFQs which are posted under the Special items Number(s) that were awarded to their GSA Contract. GSA Participating Dealers may take orders on behalf of a manufacturer if they are authorised under the manufacturer’s GSA Contract. They may also have an online PO Portal to receive orders. But they have no access to GSA eBuy to response to RFQs. Usually, under these arrangements, the manufacturers do not respond directly, so there is a problem using GSA eBuy for opportunities as their GSA Participating Dealers have no access to respond. GSA Schedule 84 leadership In some instances, a contracting officer may allow an emailed quotation. However, with the use of the electronic ordering system, this has become a common problem we hope to bring to the attention of policymakers. Some changes to the programmes may make the presentation of documentation more effective going forwardThe GSA Schedule 84 leadership has been helpful to explain the challenges to the agencies to try and resolve such issues. So, what’s up for 2019? GSA modernisation is coming. There will be improvements to their tools and more consolidations of SINs and more. There have been discussions of a revival of the GSA Expo. The Expo offered training for contracting staff both Government and private industry. Valuable tools for vendor training Equally important is the networking, meetings and the exhibits of the contractors. Expos have been discontinued since 2012 but smaller events have been growing as well as online webinar training. Webinars are valuable tools for GSA and vendor training, but they do not take the place of being able to meet your customers face-to-face. GSA online eOffer and eMod programme have made processing actions more efficient. Some changes to the programmes may make the presentation of documentation more effective going forward. The GSA online website for viewing the items on the GSA Contract and for purchasing items, GSA Advantage could definitely use an update as it has been basically the same for 20 years. Keep an eye on GSA Interact for the latest happenings with GSA.
It’s not hard to see why more and more locations are requesting security solutions that operate on an open system. Selecting products and platforms that utilise open standards—Session Initiation Protocol (SIP), HTTP, IEEE, RESTful APIs, etc.—provide additional levels of interoperability, scalability and versatility that give organisations the flexibility they want to be proactive with safety and security. Unfortunately, creating the right solution today isn’t quite as simple as reading a product sheet or specification. In the past, end users frequently were forced to pick hardware and software products that were proprietary to each individual manufacturer, meaning pieces of technology often didn’t have the ability to talk and interact with products that didn’t also carry its brand name. In the future, all systems likely will be open in some form and will provide a litany of connectivity options with little-to-no additional development time and resources. But until that day is here, it is important to manage the expectations for stakeholders involved with the project appropriately, knowing that the current security landscape has not yet evolved to the point that all systems are truly open. The current security space can resemble its past almost as much as its future Consumer technology expectations To be fair, the end user’s expectations are often set by what they see happening with consumer technology and not by what is currently available in the security marketplace. There, technological advancements can seem to happen overnight. The apps on your smartphone, for instance, perform almost instantaneous updates, even while you are not actively using it. As convenient as that may be with social media or gaming apps, this also can signal a system that regularly requires fixes and patches, a scenario that would not provide stakeholders with the advanced level of reliability that is demanded for adequate safety with commercial security products, in large part because it will expose locations to numerous liability issues. As a result, the current security space can resemble its past almost as much as its future. Decreased potential for compatibility Make no mistake, there are certainly many products available today that can easily integrate into open platforms, only in a more limited capacity. An IP desk phone, for example, could easily connect to another IP PBX system that can then place basic calls. But as the customer’s demand for additional sophisticated options increases—diagnostics, event triggers, location identification, etc.—the potential for compatibility decreases. When it comes to security, this is due to the fact that two products or systems rarely expose similar functionality using the same technology or language. Take this example, for instance: Manufacturer A sells a product that contains Features X and Y; Manufacturer B offers one with Y and Z. The customer therefore assumes - or may even be sold - a solution where X, Y and Z can all be configured. Pairing the two may give you interoperability with Feature Y fairly easily (if they are implemented the same way), but X and Z will not happen without an additional investment that may be difficult to procure. It benefits all parties to have a common understanding of the project from the very beginning Many manufacturers offer a list of ‘integration partners’ they are compatible with, but may not match the end user’s expectations Meeting end user expectations The devil, however, is in the details, a message that isn’t always effectively communicated to end users. Excusing it all off with the old idiom ‘It’s all Greek to me’ only sets up the project for potentially expensive revisions later on – costs that the integrator often has to eat. Therefore, it benefits all parties to have a common understanding of the project from the very beginning. Given the current state of the consumer marketplace, it is vital for integrators to understand the reality of the products they are considering before seeking out potential solutions. Many manufacturers offer a list of ‘integration partners’ they are compatible with, but these scenarios will carry a predefined scope that may not match the end user’s expectations. Assessing compatibility To understand the full options available, a copy of a manufacturer’s Software Development Kit (SDK) needs to be requested, which should include detailed information about the possibilities for integrations with their products. A third-party development firm or contractor is fully capable of providing the same level of work as the manufacturer From there, you can compare the devices being considered to see how compatible they are with one another. Finally, it is important to consider the practical implications of financing. If the end user is seeking features that are not currently possible, then additional development will need to be contracted in order to make it happen. Some manufacturers offer design services with developers who are acclimated to their platforms that can help expedite the learning curve. However, with the right SDK and a background in the platforms being used, a third-party development firm or contractor is fully capable of providing the same level of work as the manufacturer. To understand the full options available, a copy of a manufacturer’s Software Development Kit (SDK) needs to be requested Considerations for security system integration To reiterate, any integration, no matter the scope, requires you to consider the following three questions: What does the end user want? What can the products do today? How can you bridge the gap? It is imperative that both integrators and end users take the time to do the homework required with those three key questions to ensure they are selecting a solution that will not only work tomorrow, but also provides an appropriate layer of protection for people and assets today. Each party involved in an integration project needs to understand what exactly is available from a hardware and software standpoint This also should help mitigate any confusion or frustration that may be experienced by the customer. As much as we all would like to believe that each and every feature available is a viable option that simply isn’t feasible given the realities we face today. There will come a day when the technological advancements enjoyed by consumers around the world provide the type of experience that can be applied to security. Until that time arrives, though, each party involved in the project needs to understand what exactly is currently available from a hardware and software standpoint. The safety of everyone at that location depends on it.
The physical security industry is rapidly changing, ever evolving, and one that is growing faster than most other sectors of the greater global market. The latest research shows that the forecasted growth rates will be a compound average growth rate (CAGR) of 7.2% and a total market revenue opportunity of $41.27B through 2022. These economic indicators make the industry a very attractive investment for entrepreneurs and for investment from large corporations from other industries. At ISC West 2018, this was extremely evident as there was a palpable buzz from technologies such as artificial intelligence (AI), machine learning, cloud-based video management systems and cloud-based access control systems. New market entrants such as Amazon, and a seemingly increased interest and investment from the likes of Intel, IBM, and even Microsoft were present and contributed strongly to the buzz of the industry’s largest tradeshow.The global managed security services market is projected to reach nearly $40.97 Bn, with a CAGR of 16.6% over the next five years Need for education and enhanced security With the increased profile of the industry, one can clearly see that the physical security industry is expanding globally to new consumers; bringing with it an increased need to further secure products and services with comprehensive physical and cybersecurity protocols and the need for education. This convergence of physical security and cybersecurity will create new industry leaders that will emerge to lead a new segment of the combined market through strong investment and leadership. According to a report published from Allied Market Research (AMR), the global managed security services market is projected to reach nearly $40.97B, with a CAGR of 16.6% over the next five years. Correlating these two market data points, the forecast for the physical security market is expected to have nearly 18% of the total market opportunity comprised of cloud services at nearly $7B. Sharing security service best practices In September 2017 at the Cloud+ Conference in Austin, Texas, the leaders of the Access Control as a service (ACaaS) and Video Surveillance as a Service (VSaaS) markets, converged to share industry trends, observations of customer adoption, best practices in implementation and service, financial models, and several in-depth discussions on securing physical security of cloud implementations through cybersecurity. The physical security market will have nearly 18% of the total market opportunity comprised of cloud services These cybersecurity discussions absolutely dominated every discussion with the clear message that as a cloud service provider, manufacturers and integrators must continue to create robust and scalable cybersecurity offerings to protect customer data and facilities. Interestingly, an analysis of all of the past cyber breaches was presented by keynote speaker Dean Drako of Eagle Eye Networks, who, through a powerful visual diagram, noted that all existing breaches in the physical security industry were entirely on manufacturer provided hardware solutions; VMS physically installed on customer premises, and camera specific vulnerabilities across multiple providers.Network personnel, cybersecurity personnel, firewall experts, and cloud-specific software development staff all need to be added to core physical security engineering expertise Cloud versus non-cloud services The insight that one was able to glean from this information and, that of a greater analysis of cybersecurity hacks across all industries, was that manufacturers and providers of cloud services were more secure and reliable by orders of magnitude than non-cloud solutions. The reason for these phenomena also became glaringly evident; the security protocols of a cloud service provider is central to the business’s value proposition and as such should be addressed across all levels of manufacturing, implementation, and customer utilisation. Conversely, non-cloud deployed products rely on field implemented cyber strategies from integrators and end users which often expose lack of skills, education and budget to fully secure these physical security products. Ensuring successful deployment As a SaaS service provider, the technical personnel makeup results in an expansion of staff and expertise. Network personnel, cybersecurity personnel, firewall experts, and cloud-specific software development staff all need to be added to core physical security engineering expertise to ensure that the product developed can be successfully implemented and deployed.Implementing a process to protect millions of customer’s data records and facilities begins with mapping out a strategy to secure software and hardware. These new jobs in the physical security industry will astronomically expand as the market continues to grow $6 Bn in a little over 4 years providing new opportunities to existing and new personnel to enter the industry. As a leader in access control hardware and an ACaaS provider, ISONAS has taken it upon themselves to implement a process to ensure that their customers can easily implement their products and gain great peace of mind in regard to the security of the solutions. Data security strategies Implementing a process to protect millions of customer’s data records and facilities begins with mapping out a strategy to secure software and hardware. This means employing high-level, seasoned cloud deployment experts to create a strategy in our AWS infrastructure and all ancillary supporting technologies to minimise attack surfaces, create complex, proprietary associations in a multi-layered and multi-tiered connection throughout the application and lastly ensuring that all communication to and from customers’ devices are encrypted and secured. Implementing a process to protect customer’s data records and facilities begins with mapping out a strategy to secure software and hardware Once implemented ISONAS took it upon themselves to validate the infrastructure and the customers experience by subjecting the environments to 3rd party penetration tests. Addressing cyber threats These tests, taken up quarterly, ensure a customer that the latest in cyber threats are being addressed and that the manufacturer is providing the latest solutions available in the market.Integration implementation personnel should gain greater knowledge in networks and cybersecurity best practices for their solutions An added benefit is that customers gain the scalable benefits of enterprise corporate cybersecurity protocols at a fraction of the cost of implementing these on their individual premises. As an industry, however, it is not simply the responsibility of the cloud service provider to ensure that the customers data in video and access control are being protected. It is also incumbent on the integrator to ensure that the installation and implementation of the products and solutions are deployed in an educated and skill-based manner. Knowledge of networks and cybersecurity best practices The products and services utilised must be easy to implement, be clear in their requirements of the end user networks, and simplistic to apply. Nearly all manufacturers of these products are working diligently to ensure that the integrator has all of the tools at their fingertips to ensure a successful implementation. However, it will remain important that the integration implementation personnel gain a greater knowledge in networks and cybersecurity best practices for their solutions.The products and services utilised must be easy to implement, be clear in their requirements of the end user networks, and simplistic to apply In most cases, this will mean additional jobs for new higher-level personnel, access to additional services to provide to end users, and an elevation of networking and security expertise within their business. Expanding the reach of physical security These new-found skills and expertise will likely bleed into new markets and expand the reach of the traditional physical security market. It truly is an exciting time to be a part of a rapidly expanding market in the physical security space and to watch the industry react to the growing need for cybersecurity within products and services. In the next four years, there will be new innovations, new investments, and new winners and losers in products and services. It seems clear that those integrators and manufacturers who have begun to create the strategies and products for tomorrow will be well ahead of those who are not actively addressing the need for SaaS products, yet the window to opportunity remains wide open.
The U.S. House of Representatives has voted 351-61 to ban federal agencies from buying Chinese-made surveillance cameras. The measure was passed May 24 as an amendment to House Bill 5515, the Fiscal Year 2019 National Defense Authorization Act (NDAA), which is the funding plan for the military that also maps out a variety of policy priorities. The bill is at least several months away from becoming law, and it must still be considered by the Senate and then by a House-Senate conference committee before final passage. Changes can be made at each stage. It would also have to be signed by President Trump. The amendment targeting video surveillance cameras was offered by Congresswoman Vicky Hartzler, a Missouri Republican. “Video surveillance and security equipment sold by Chinese companies exposes the U.S. government to significant vulnerabilities and my amendment will ensure that China cannot create a video surveillance network within federal agencies,” says Hartzler in a press release. Companies affected by the ban The proposed ban appears to lump our industry’s familiar video surveillance players together with other companies that the U.S. government has targeted for security concerns. Also mentioned in the amendment are Hytera Communications, a Chinese digital mobile radio manufacturer previously charged with patent infringement; and ZTE Corp., a Chinese telecommunications company accused of violating trade-sanction agreements and posing a threat to U.S. national security. The bill also mentions Huawei Technologies Co. Ltd., a Chinese telecommunications manufacturer previously investigated as a national security threat.The proposed ban appears to lump our industry’s familiar video surveillance players together with other companies that the U.S. government has targeted for security concerns Two familiar companies in our industry – Hikvision and Dahua – are mentioned in the bill by their full names, Hangzhou Hikvision Digital Technology Co. and Zhejiang Dahua Technology Co. In addition to their branded video lines, the two companies also are the largest providers of OEM/'white label' cameras and video systems that are sold under other brand names, such as Honeywell, Stanley and UTC. The bill specifically mentions the inclusion of white label technology in the ban. Addressing concerns In the case of Hikvision, one concern is whether the company is owned by the Chinese government. Hikvision has previously addressed this issue, emphasising its ownership by “a diverse set of private and public entities” with the largest share belonging to a Chinese state-owned enterprise (SOE). Hikvision declined to comment for this article. However, the company has published a statement (“Special Bulletin”): “We are actively working to assure our North American stakeholders that Hikvision strictly abides by the laws and regulations of each country in which it operates. We also affirm the fact that we hold our products to the industry’s global cybersecurity standards, including North America.” The Hikvision statement continues: “As we continue to monitor and further deploy the necessary resources to address this matter over the coming weeks and months, please know that we will vigorously defend Hikvision from dangerous and unproven accusations about the cybersecurity of our products and solutions.” If SIA decides to take a position based on member feedback, it will occur during the normal legislative process" Commitment to compliance Dahua answered our requests for a comment with the following official response: “Dahua Technology is a commercial enterprise with a high level of business integrity. The international company [is] committed to compliance with all applicable laws and regulations in the countries in which it does business.” The company’s response continues: “Dahua Technology dedicates 10 percent of its revenue to research and development annually. Dahua has designated cybersecurity as a top priority and takes a comprehensive and systemic approach, with complementary and redundant safeguards built into its technology, services and organisational practices. Dahua Technology is positioning itself as a cybersecurity leader within the video surveillance industry.” The Security Industry Association (SIA) has submitted the House amendment to its government relations committee for review and consideration. “Any recommended position by the government relations committee will be referred to the SIA Executive Committee for their consideration and approval,” says Don Erickson, CEO of SIA. “If SIA decides to take a position based on member feedback, it will occur during the normal legislative process as the bill is considered by the Senate, and then ultimately by a House-Senate conference committee.” Impact on global video camera supply Congresswoman Hartzler’s amendment is aimed at “ensur[ing] federal agencies do not purchase Chinese-made surveillance cameras,” according to the press release from her office. Obviously, there are more than just the two mentioned companies manufacturing surveillance cameras in China, so the question becomes whether the intent is to ban all Chinese cameras from government use. Such a proposal would create an even larger issue, given that 60 to 65 percent of the global supply of commercial video cameras are manufactured in China, according to one industry source.60 to 65 percent of the global supply of commercial video cameras are manufactured in China, according to one industry source The bill does not address the possible use of Chinese-made components in cameras that are assembled elsewhere in the world (but technically are not 'made in China'). “Those types of issues are commonly explained in implementation guidelines that would be created afterwards if the proposed language becomes law,” says Erickson. The NDAA is unlikely to become law for several months. A version previously passed by the Senate Armed Services committee must be presented to the full Senate, where it can also be amended. Then the House and Senate bills must be reconciled.
After the 2012 Sandy Hook school shooting, Jody Allen Crowe set out to develop a threat suppression tool to address school violence. Five years later, the result of that effort is the Crotega Threat Suppression System, displayed this year at ISC West. The remotely-deployed threat suppression system drenches a perpetrator with a repulsive water-based solution, thus impairing their ability to enact violence. The solution irritates eyes, throat, lungs and skin, but does not cause permanent injury. Cleanup is easy using water and detergent. The solution is manually deployed in predetermined zones, which limits the affected areas in a building. Touch-screen control enables rapid deployment, which can also be integrated with Threat Alert buttons and/or gunshot detection. Benefits of suppression systems The Crotega Threat Suppression System is designed to deter workplace violence, disrupt active shooters, and delay threats until help can arrive. Introduction of the system is timely given the unrelenting sequence of school shootings and workplace violence that dominate the news. The system uses a “Repuls” solution sprayed from the ceiling in 5-, 10- or 15-second bursts.We did the industry standard testing to make sure we had a product that wouldn’t harm anybody” Crowe started the company in 2013 after Sandy Hook, doing research in his garage for the first couple of years. Investors joined and, in 2014, the long journey began to bring the system to market. The process involved obtaining multiple patents, testing the product, and addressing any fire code or other regulatory issues surrounding its use. Crotega has been working with fire marshals in their home state of Minnesota for three years to address fire code issues and has determined that there are no concerns. There are only 30 seconds of spray in the tank, so it does not delay building egress and doesn’t conceal or shroud an egress. “We did the industry standard testing to make sure we had a product that wouldn’t harm anybody,” says Crowe, Crotega Founder and President. “It’s intensely irritating, but it doesn’t do any irreparable harm to anybody.” Since last August, the company has moved from product development into full-scale marketing. An in-house sales team locates end user customers, and then puts them in touch with a local integrator in the area. Crowe started the company in 2013 after Sandy Hook, doing research in his garage for the first couple of years Exhibiting to integrators “We’re pulling the sales through integrators to train them to become a self-sustaining integrator for us,” says Crowe. “There are a couple of integrators we are training, and then we are finding other integrators that are meeting our requirements. “They can’t just do surveillance because there is a mechanical install involved, too. They have to be able to handle the mechanical install and then link it to surveillance.” As an exhibitor in the Emerging Technology Zone at ISC West, Crotega showed the product off to integrators and consultants. “This year our ISC West schedule filled up,” says Crowe. “We are lining up consultants to work with us, and we had some people bringing customers to see us at ISC.”Violence, especially in the back-of-the-house in Indian casinos, is a big issue. And that has energised that vertical for us" Current events tend to keep active shooter incidents and workplace violence top-of-mind. For example, the Las Vegas shooting in October energised awareness about the possibility of casino violence throughout the gaming industry, Crowe says. “It got people thinking,” he comments. “We don’t hear much about violence in casinos – especially Indian casinos, which are very quiet about what happens there. But violence, especially in the back-of-the-house in Indian casinos, is a big issue. And that has energised that vertical for us.” Other vertical markets include government buildings, military buildings, commercial buildings and religious buildings. Before founding Crotega, Jody Allen Crowe spent 18 years on Native American reservations as a teacher, principal and superintendent, where he observed the effects of prenatal exposure to alcohol. He developed school programs designed around the research of brain damage from Fetal Alcohol Syndrome. Crowe is also the founder of Healthy Brains for Children, a non-profit organisation focused on lowering the incidence of prenatal exposure to alcohol. Crowe has written a book, “The Fatal Link,” that posits a connection between perpetrators of school violence and pre-natal exposure to alcohol.
Technology is a valuable tool for increasing security, but occasionally technology can create a threat. An example is the threat 3D printing technology poses to one of the most mature security technologies, mechanical locks and keys. The ability of 3D printing to duplicate keys presents new challenges for lock manufacturers, and new vulnerabilities to end users. Keys that could previously only be duplicated by skilled thieves can now easily be copied using off-the-shelf technologies and information widely available on the Internet. In this case, technology offers a solution, too. A new kind of key cannot be duplicated by 3D printing. Ironically, it is manufactured using 3D printing techniques. UrbanAlps Stealth Key A Swiss company called UrbanAlps has introduced the Stealth Key, a key that is designed and manufactured from the inside out. The mechanical elements that enable the key to uniquely open a matching lock are hidden away inside the key beneath a pair of narrow ledges, where they are not susceptible to being scanned and duplicated using 3D printing. UrbanAlps offers a range of cylinder locks and keys based on the Stealth Key concept. A high-tech padlock incorporates additional security features such as a shrouded shackle to avoid cutting, anti-drill capabilities, and resistance to lock picking. Stealth Keys are made using 3D printing and a laser to fuse together successive layers of metallic powder added in a manufacturing process called "successive layer melting." Manufactured from the inside out, complex internal features are "printed" and then covered over later with a solid layer that shields the complex inner workings from being duplicated. Unveiled at the Intersec show in Dubai earlier this year, the Stealth Key is aimed at retailers, hotels and other commercial entities. It is less expensive than other technologies designed to shore up the security vulnerabilities of 3D printing, such as keys that combine both mechanical and electronic components. The company’s website touts “simple and affordable key copy protection.” Unveiled at the Intersec show in Dubai earlier this year, the Stealth Key is aimed at retailers, hotels and other commercial entities 3D printing challenge Locks and keys are among the oldest security technologies, dating back to Egyptians and the Romans. Their value has been proven over the centuries and they continue to provide security in many applications, even in today's high-tech environment. However, 3D printing presents a challenge. 3D duplication became a high-profile problem in 2015 when 3D printable computer-aided design (CAD) files for Transportation Security Administration (TSA) master keys were published on the Internet. Those are the keys used by airport security staff to open private suitcases for inspection. The files allow the keys to be duplicated and used to successfully open TSA-approved locks. The hacking of security systems is nothing new—most electronic security systems have been hacked, or have the potential to be hacked in the future. Increasingly, security involves an ongoing one-upmanship between the good guys and the bad guys – the programmers and the hackers, the white hats and the black hats – whether the technology is computer systems or even the locks and keys that have been around for centuries.
Nationwide Building Society has partnered with Traka to provide an intelligent key management system in its branches. The partnership will enhance the Society’s processes in its network, for the benefit of its employees and members. Nationwide has around 18,000 employees and around 650 branches across the UK. Previously branch managers were initially being relied upon to have ensured the management and safety of branch keys throughout the working day, and overnight. This has been a time constraining and manual process, but an essential part of branch security. Traka’s intelligent key management solution has been trialled, originally tested across 21 sites, and systems Key management process Traka’s intelligent key management solution has been trialled, originally tested across 21 sites, and systems now operate across Nationwide’s UK-wide branch network. Richard Newland, Director of Branch & Workplace Transformation at Nationwide said; “There was an opportunity to greatly improve our key management process, to make it easier for our colleagues to manage branch keys.” Seamless installation process “The introduction of Traka key management systems moved us into a more digital management system. Our colleagues no longer need to solely manage keys, and the audit trail capability has helped us to remove the manual paper recording and see the instant status of keys at any one time.” Traka worked closely with Nationwide to understand bespoke requirements for key management across its branch network, ensuring a seamless installation process under a tight timeframe for delivery. Once installed, Traka worked closely with individual branches to ensure staff had full training in the use of key management systems and access control solutions for authorised personnel. In Nationwide’s case, Traka has made a significant difference from an operational perspective Accurate audit trail Tom Smith, Traka Market Development Manager added: “What our relationship with Nationwide demonstrates is our preferred approach to working with clients, in true partnership. Our aim is to understand bespoke requirements for key management and ensure our systems can accommodate, without compromising on ease of use for staff.” “In Nationwide’s case, Traka has made a significant difference from an operational perspective. The main resolution being staff no longer need to solely manage keys, and instead, they can focus on servicing members needs more efficiently. Nationwide has total peace of mind they have a secure and accurate audit trail of all keys, across every branch in its network.”
A compressive video surveillance solution consisting of 96 cameras from Dahua Technology UK is being installed at the striking Fort Dunlop commercial and retail site, overlooking the M6 motorway in Birmingham. Built for Dunlop Rubber, Fort Dunlop became the tyre-maker’s flagship production facility and at one time was the world’s largest factory, employing 3,200 workers. After production stopped in the 1980s, the building lay derelict before being redeveloped into 360,000 square feet of office and retail space, also now with an adjoining hotel. Cameras include the 12MP panoramic internal IPC-EBW81230 fisheye camera and the external panoramic IPC-PDBW8802 dome cameraPanoramic fisheye and dome cameras Much of the site’s previous video surveillance system was installed during the refurbishment in 2006, but with advances in modern technology, it was felt that the current system was no longer meeting basic requirements. An external consultant assessed the site and put forward plans for an upgrade. Bromsgrove-based Champion Security Installations won the bid for the upgrade project. Installed over two phases, the design consists of a total of 96 static and PTZ cameras from Full HD to 4K resolutions. Cameras include the 12MP panoramic internal IPC-EBW81230 fisheye camera, which uses H.265/H.264 triple-stream encoding, and the external panoramic IPC-PDBW8802 dome camera, with four 2-Megapixel progressive scan CMOS sensors and day/night functionality. Images are managed and recorder by a 128-channel, ultra 4K NVR616 network video recorder. The aim was to meet all of the different security, health and safety criteria, as well as ensure ease of use for the operators" Ensuring safety of staff and building “Having undertaken a full review of the security systems at Fort Dunlop, it became clear that a replacement CCTV system was required to ensure protection of the staff, visitors and building,” said a spokesperson from Savills. “Three different options were presented by contractors, but it quickly became clear that the Dahua system presented by Champion Security met our brief. The system installed has changed the way we monitor and protect our asset, and its ease of use has been a revelation to our site staff.” A spokesperson from Champion Security Installations added, “We have worked with the management of Fort Dunlop for a number of years now, so we designed the new IP CCTV system in consultation with them. The aim was to meet all of the different security, health and safety criteria, as well as ensure ease of use for the operators. Having installed Dahua equipment at a number of sites, we invited them to assist with the design of the Fort Dunlop system using a number of their new products. Working in conjunction with Dahua and Oprema Ltd, the project was delivered on time and within budget.”
UK perimeter solutions manufacturer, Jacksons Fencing, has recently completed a project at Portsmouth Retail Park, the latest addition to Portsmouth City Council’s investment portfolio. The £17m development aims to generate up to £1m a year for local services, create jobs and contribute to the city’s revitalisation. Development and construction firm Simons Group undertook the 70,000 sq. ft. build while Jacksons Fencing won the tender to supply and install fencing and access control for the perimeter of the service areas and plant and bin stores. A secure perimeter was important, as any disruption to the service areas would negatively impact day-to-day operations. Air conditioning units, loading areas and bin stores can be vulnerable to vandalism and anti-social behaviour, so protecting these areas against unauthorised access not only prevents accidents and theft, but also ensures operational efficiency and protecting businesses from financial loss and liability. Jacksons Fencing also installed two single leaf and four double leaf EuroGuard swing gates, which seamlessly match the perimeter fencing Balancing security and aesthetics While the retail park and the stores within the development need protection, it is also a public space that depends on attracting shoppers, and so required a welcoming aesthetic. To fulfil these requirements, 100m of Jacksons EuroGuard Regular fencing at 3m high was installed. Ideal for commercial properties, EuroGuard Regular is able to secure the premises without appearing imposing or fortress-like. Its anti-climb design and vandal-proof panel to post fixings give the panels the strength and rigidity to effectively demark public and private spaces, deter potential intruders, or simply keep shoppers and young children out of harm’s way. To provide efficient access for staff, delivery and service vehicles, Jacksons Fencing also installed two single leaf and four double leaf EuroGuard swing gates, which seamlessly match the perimeter fencing. Turnkey security support Head of Commercial Sales at Jacksons Fencing Cris Francis comments: “Simons Group is one of the biggest names in retail construction and development, so this is a significant project for Jacksons, and testament to the high quality of our products and expertise of our team.” Brian Hodgkin, Commercial Manager at Simons Group, adds: “It’s obviously crucial that our projects are properly secured and we were pleased to work together with Jacksons to ensure security on the Portsmouth Retail park was of the highest standard.” Jacksons Fencing designs and manufactures high-quality security fencing and has a wide range of perimeter solutions ideal for a variety of projects. Their team of technical and engineering experts have worked on many different bespoke projects, providing full turnkey support to meet any requirements their clients have.
Security has become one of the priorities to be focused on for the operation of commercial buildings because many people come in and out of the buildings every day. IP surveillance solutions are particularly essential for those commercial applications generally used in a wider and more open areas, owing to the requirement of system scalability. Surveon commercial solutions, including high-reliability cameras with wide monitoring area, feature-rich CMS with multiple access as well as RAID NVR with flexible storage expansion. These enterprise solutions help commercial buildings to prevent the incidents such as thefts or other illegalities, effectively safeguarding the property and profits in time. Enhanced storage and data security When designing a suitable surveillance system, commercial buildings might encounter some major challenges such as open field and wide monitoring area. Under such circumstances, Surveon’s 3-megapixel camera will be the best solution. Surveon’s RAID NVR allows users to scale up the storage capacity through iSCSI (SAN/NAS) and JBOD It provides 1.5-time larger monitoring range at 30 FPS, offering a cost-effective option for monitoring wide areas. Besides, Surveon cameras are with industrial-grade components and 3-year warranty to ensure long-term operations. Its quality can be proved by the extremely low RMA rate, and reliability can be assured. The data protection of recorded videos and the flexible expansion of storage capacity for future scale up are of great importance to the planning of commercial surveillance. Surveon’s RAID NVR allows users to scale up the storage capacity through iSCSI (SAN/NAS) and JBOD, bringing commercial buildings a convenient and budget-saving option that they can expand storage capacity by demand or yearly budget instead of buying entire system at the beginning. Efficient management with reduced risk Surveon’s enterprise Central Management Software provides superior features including interactive video walls, matrix screen displays, centralised alarm management, and high scalability for thousands of cameras and multiple clients, allowing the management level and the security guards to keep every detail under control and review both live and stored videos through browsers or mobile applications anytime, anywhere. Surveon was chosen as the supplier of a comprehensive networked security solution for KL Tower, the highest building in Malaysia. The security project manager for the KL Tower said, “Surveon’s full end-to-end integration, including enterprise VMS and storage that supports up to 300TB, helps us manage the project in the most efficient way and brings the lowest risk.” Surveon's commercial solutions have also been deployed at Historic Buildings in Poland, ISP server rooms in Taiwan, and the building of airline catering service provider in Hong Kong.
Ward Security has been appointed as the security provider for British Arab Commercial Bank following a competitive tender process. The appointment will see the team manage the security at BACB’s Mansion House premises in London, supplying both concierge and security guarding personnel. The British Arab Commercial Bank is a UK regulated bank that has operated for more than 40 years with an expertise in international finance and a focus on helping companies to develop and grow trade in new markets with confidence. Kevin Ward, Managing Director of Ward Security said, “We are delighted to have been awarded such a prestigious contract by the bank. We believe our philosophy of providing people who are both professional and dedicated to delivering high quality standards closely matches the principles of the bank. All our clients need bespoke solutions that consider the key security needs both today and, in the future, and our tender clearly communicated that to the bank. We look forward to working with them.”A key speciality of Wards Security is the provision of search and guard dogs Dog guarding projects Steve Cook, Director of Facilities at British Arab Commercial Bank said, “We have been impressed with the high standards and accreditations that Ward Security work to and maintain but mostly this company is clearly very passionate about what they do." "Not only have they identified efficiencies and new ways to work they have delivered a proposal to us with fresh enthusiasm. The team at Ward Security are already integrating well into our team and we are pleased with the appointment of them as our new security provider.” From its headquarters in London Ward Security provides a full range of security services to high profile companies nationwide and it has regional offices covering Kent, The Midlands and South East England regions employing a team of over 900 security personnel. A key speciality of the company is the provision of search and guard dogs. It works closely with the City of London Police and both Bromley and Bexley Borough Councils on a number of specialist dog guarding projects.
BNP Paribas is a European-centred banking group with over 190,000 employees in 74 countries. Like other banks, BNP Paribas Fortis is facing a range of threat vectors like robbery, vandalism and card fraud. Similarly, bank staff members require safeguarding from potential aggressors. Previously, the bank relied for video security on a fleet of analogue CCTV cameras. However, low-image quality frequently made it difficult to identify suspects, especially in dimly-lit and harsh backlight conditions, such as direct sunlight through a window or reflected by wet ground. Upgrading CCTV system To upgrade its current CCTV system, BNP Paribas Fortis opted to move to the benefits of an IP-based network video security solution to be able to directly integrate cameras into existing network infrastructure, as well as enable remote video monitoring.BNP Paribas Fortis has installed more than 4,400 Sony IP network cameras Working with security solutions provider SERIS technology and Stanley Security Benelux, BNP Paribas Fortis has installed more than 4,400 Sony IP network cameras. The reliable, high-performance cameras have been installed at the bank’s Belgian headquarters and commercial buildings all over the country. Designed for large-scale mission-critical security A blend of discrete minidome cameras (SNC-EM630, SNC-EM631, SNC-EM600, SNC-EM601 and SNC EM641) protects BNP Paribas Fortis premises. The cameras’ sensitive Exmor R CMOS sensor ensures crisp images with HD or Full HD resolution, while selected models offer IK10 resistance standards against unwanted tampering and vandalism. Hemispheric SNC-HM662 cameras offer a 360-degree all-round view in self-banking zones and bank lobbies. As well as deterring unauthorised loitering, it provides situational awareness of potentially aggressive customers who may be a threat to employees.As well as offering excellent image quality, their efficiency and reliable operation make a real contribution to lowering long-term ownership costs" Protected against harsh weather and vandalism, ruggedised SNC-WR602 and SNC-WR632C rapid dome cameras provide round-the-clock surveillance of outdoor areas. The cameras’ high dynamic range ensures clear images in a wide range of lighting conditions, accommodating extremes of bright light and shade in the same scene. The cameras are integrated using the XProtect Corporate IP Video Management Software (VMS) platform from Milestone Systems. Designed for large-scale mission-critical security applications, this manages convenient recording and sharing of video from multiple sites. Minimisation of hack risk BNP Paribas Fortis also values the Sony IP cameras’ excellent network security provision, with the risk of attacks from hackers minimised by regular firmware updates. “Sony cameras were the obvious choice to improve our video security capabilities”, confirms Michaël Thys, Expert Security Equipments at BNP Paribas Fortis. “As well as offering excellent image quality, their efficiency and reliable operation make a real contribution to lowering long-term ownership costs.” “The retail banking industry presents several challenges for any security solution,” adds Petra Swinnen, regional account manager for Sony Video Security Solutions. “This large-scale migration to Sony IP cameras has allowed BNP Paribas Fortis to protect its front-line operations, while giving valuable extra peace of mind to employees and customers alike.”