Allied Universal, a renowned security and facility services company in North America, announces the appointment of Robert J. Wheeler, Vice President of Aviation/Maritime Operations for Allied Universal’s National Government Services as Maritime Sector Chief at InfraGard San Diego. InfraGard is an FBI-affiliated nonprofit organisation whose mission is to mitigate criminal and terrorist threats, risks and losses for the purpose of protecting the region’s crucial infrastructure and peop...
OnSolve, the global provider of mass notification and critical communication solutions for enterprise, small business, and government organisations, announced the acquisition of Stabilitas, a situational awareness provider that leverages artificial intelligence and machine learning to identify adverse events, analyse the risks posed by those events, and provide stakeholders with actionable threat intelligence. Critical event information Stabilitas’ AI solution constantly ingests more tha...
Razberi Technologies has extended its software platform to integrate deeper with video management software (VMS) from Milestone Systems, providing increased uptime assurance, cyber threat protection and faster problem resolution. Monitor security network With Razberi Monitor™, security professionals can securely and remotely monitor their physical security network – especially relevant during these times of social distancing requirements. IT professionals can quickly review cyber s...
Aqua Security, the pure-play cloud-native security, announced that its Cloud Native Security Platform is available through Red Hat® Marketplace, an open cloud marketplace that makes it easier to discover and access certified software for container-based environments across the hybrid cloud. Built in partnership by Red Hat and IBM, Red Hat Marketplace is designed to meet the unique needs of developers, procurement teams and IT leaders through simplified and streamlined access to popular ente...
Axis Communications makes audio systems smarter and easier than ever with a line of network audio solutions built for scalability and flexibility based on the customers’ needs. Easily install and manage Axis audio solutions and instantly improve customers’ business operations and security. Axis all-in-one audio solutions can be scaled to fit different spaces and are flexible enough to deliver the right message at the right time and place. Intuitively manage thousands of audio device...
Allied Universal®, a security and facility services company in North America, received a letter of appreciation from the U.S. Department of Justice’s United States Marshals Service. The letter of appreciation was regarding the apprehension of Gerald Hunter, who was #1 on the Most Wanted list of the Drug Enforcement Administration’s (DEA) St. Louis Strike Force’s West Central Region. Crucial security intelligence This is due to his suspected role in the illegal traffi...
Boon Edam Inc., a global provider in security entrances and architectural revolving doors, announces the 40th anniversary of the launch of the company’s renowned Tourlock security revolving door. The demand for this reliable security entrance, first built in 1980, continues to grow as the risks to organisations due to unauthorised entry increase. The Tourlock is used in thousands of facilities worldwide including commercial campuses and government buildings due to its high level of throughput and ability to prevent unauthorised access without the need for manned supervision. In addition, the Tourlock has always been an automatic, “touchless” security solution requiring no contact from users during activation and operation, making it as relevant today as it was decades ago. Prevent unauthorised access Tailgating is the most common way intruders can slip into a secure facility. The Tourlock, by design, prevents an unauthorised user from following an authorised user in the trailing compartment. This working principle removes the burden on people to “be impolite” by refusing to hold open a swing door for a stranger. If more than one person is detected, the door will stop rotating and alarm, then slowly rotate backwards An added feature of the Tourlock is that it stops rotating in the “plus position” during a tailgating attempt. This places a “wall” between the intruder and the secure area and the intruder can only turn back and step out of the door, while the authorised user continues onward into the secure area without any interference. Preventing Piggybacking The Tourlock combines premium construction with the option to include the intelligence of a sophisticated, near-infrared detection technology housed in the ceiling, called StereoVision®. StereoVision scans each compartment during rotation to verify that a user is alone before allowing them to enter a secure facility. If more than one person is detected, the door will stop rotating and alarm, then slowly rotate backwards, forcing both users to exit the door. The technology in StereoVision has been enhanced continuously over the decades and today is able to function reliably in a wide variety of lighting environments, including outdoor lighting. Its reliable performance over the years has proven to be an extremely reliable method of preventing piggybacking into a secure area without the excessive false rejections. Add-Ons for Increased Security Tourlock includes an integrated, IP-enabled software platform called BoonConnect that helps technicians diagnose the door For added security, the Tourlock security door on a building envelope can be outfitted with Level 3 bullet-resistant glass, capable of stopping three .44 magnum bullets. Additionally, biometric identity verification devices can be attached to the end post or a pedestal to provide a highly secure and touchless authorisation method. The Tourlock is capable of integrating with virtually any access system on the market. Integrated Diagnostic Software In recent year, the Tourlock was upgraded to include an integrated, IP-enabled software platform called BoonConnect that helps technicians diagnose the door and get it running quickly should there be an outage. An on-site technician simply logs in from a remote laptop, cell phone or tablet and can review performance data as well as diagnostic information about the door’s sensors, drive system, motor and more. This visibility can save hours or days of time resolving any issues. “We at Boon Edam owe a great deal of our success to the Tourlock in the last 10 years. It’s been critical in meeting the growing security requirements of the Fortune 500 and along with our turnstile offering has helped launch our Enterprise team to the level of success they have today,” says Valerie Anderson, President and Managing Director, Boon Edam, Inc. “Even after 40 years, the demand for reliable security at the entry has only continued to increase and the Tourlock continues to prove itself time and time again."
viisights, Inc., the globally renowned developer of innovative behavioural understanding systems for real-time video intelligence, continues to gain momentum with cities, organisations, and technology partners that are serving the United States of America and global markets. viisights Wise The company’s highly innovative and unique solution, viisights Wise, provides municipalities and organisations with the ability to automatically detect, analyse, and differentiate human behaviours, such as an individual slipping and falling vs. being thrown to the ground, or two people embracing vs. fighting, or a peaceful parade vs. a riot. viisights’ powerful solution also delivers analytics ideal for helping organisations get back to work safely and fight the spread of COVID-19, such as recognising close proximity encounters between individuals that may violate social distancing mandates. Innovative security solution viisights behavioural recognition delivers superior video intelligence to help keep cities and businesses safer" “viisights' unique solution can accurately detect and analyse the behaviour of individuals and groups of people, using deep learning and time-based vision analysis,” said Asaf Birenzvieg, Co-Founder and Chief Executive Officer (CEO) of viisights. He adds, “viisights behavioural recognition delivers superior video intelligence that can help keep cities and businesses safer and more secure, while reducing the manpower and associated costs necessary to monitor vast numbers of live and recorded video sources.” viisights behavioural recognition solution viisights behavioural recognition solution can be deployed on-premise or via the cloud, and is scalable to an infinite number of cameras with data analysis provided within seconds of a triggered event. The innovative solution is based on real-time temporal and holistic video streaming analysis, using video clips rather than standalone images, and employs convolutional neural networks and LSTM models for training its core AI engine. This creates a unique event signature that includes the scene participants and their extracted features, such as positioning, movement, size, and relationship with others. The information can be used to detect potentially dangerous or high-interest situations in progress, and to automatically send alerts to other investigative applications. High-interest situations detected by the system High-interest situations detected by the system include, but are not limited to, people fighting, riots and vandalism, people brandishing weapons, blood on individuals, contextual loitering, a person abandoning an object, people wearing or not wearing masks. It also includes movements, such as running, walking, or climbing, groups of people gathering or running, people climbing over fences or loitering near a fence, people entering a perimeter without permission, people in roadways, vehicles on sidewalks, vehicle collisions, traffic jams, people riding bicycles or motorcycles, people entering or exiting a vehicle, and smoke and fire detection. Minimising false alerts and maximising safety viisights behavioural recognition solution successfully minimises false alerts and their related costs viisights behavioural recognition solution successfully minimises false alerts and their related costs, while maximising safety and security, providing a new level of video intelligence for predictive analysis, incident prevention, response management, and risk mitigation. By only analysing general behaviour patterns of individuals, groups, vehicles, and traffic-flows, viisights technology does not identify faces or license plates to protect personal privacy. viisights advanced capabilities were recognised early on, when the company was designated as a ‘Cool Vendor’ by internationally renowned analyst and consultancy firm, Gartner, in its Cool Vendors in AI for Computer Vision: Balance Business Risk and Reward report, published in August of 2018, which states ‘Automated scene analysis used to generate real-time insight into human/object behaviour is at the cutting edge of video analytics today’. Wide scope use of viisight technology viisights’ flagship product, viisight Wise addresses a wide range of applications, including, violence and weapon recognition, context-related suspicious activity recognition, crowd behaviour and social-distancing, traffic monitoring, indoor and outdoor safety (including fire and smoke detection), and resource optimisation.
The ESA Leadership Summit - the strategically efficient annual event for company pioneers in the electronic security and life safety industry - has announced it will take the summit experience virtual in 2020 as ESA Leadership Summit Stay Connected. This virtual event will be held Sept 29 - Oct 1, connecting leaders with the content and contacts they need to thrive amidst uncertainty. The summit will still deliver top-notch education, self-selected one-on-one meetings with vendors and purposeful networking events. “Our ESA Members are continuing to drive value to their customers, evolving with safety standards and enriching their services,” says Merlin Guilbeau, CEO of the Electronic Security Association. “We can’t imagine a year without delivering the valuable content and connections that help them do this.” Interactive virtual platform The virtual #ProSecurity event will deliver all the components the industry has come to love about the one-on-one meeting event, driving premier content to the industry’s pioneers in an innovative and responsible way. “Our world today is seeing a digital transformation and it is incumbent on us to evolve along with it,” says Guilbeau. “I’m working with our team to accelerate and further deliver on a digitally enhanced experience for our industry. We’re taking our sessions, networking events and one-on-one meeting experience to an engaging and interactive virtual platform.” From Sept 29 - Oct 1, the Stay Connected virtual version of the ESA Leadership Summit event will deliver presentations and workshops from The Ritz Carlton’s customer experience experts, sales leadership experts and published author of “Leadership Isn’t for Cowards,” Mike Staver. Weinstock and Jackson award The Electronic Security association will also deliver its annual Weinstock and Jackson award presentations on Wednesday, Sept. 30 and will play host to an interactive trivia night on Tuesday, Sept 29. In addition to the networking, presentations and one-on-one meetings with vendors, leaders from integration and monitoring companies will have the opportunity to watch 15-minute Tech and Service Lightning Presentations from the industry’s vendors. This is yet another avenue the summit provides leaders to stay abreast of the latest services that could help them deliver value to customers. “This is what our industry does. We don’t give up. We adapt,” says Guilbeau.
CyberCube, a cyber analytics provider, has completed its Service Organisation Control 2 Type II (SOC 2® Type II) audit report. The report is based on an examination of CyberCube’s internal controls and procedures. CyberCube is committed to exceeding critical compliance standards for its customers. A SOC 2 Type II report assures its clients that the company meets the suitability of design and operating effectiveness of applicable controls. Information security policies SOC 2 Type II is a certification that is only issued by an accredited third-party auditor after conducting an examination in accordance with attestation standards established by the American Institute of Certified Public Accountants (AICPA). These standards ensure that CyberCube follows strict information security policies and procedures encompassing the security, availability, processing, integrity, and confidentiality of customer data. Peter Quinby, CyberCube’s Business Operations Manager said: "Meeting the highest standards for security, availability, and confidentiality are all critical to the services we provide to our clients. Ensuring the security of our users is a CyberCube priority, and we are constantly assessing how we can make our solutions even more secure.” Ajay Garg, CyberCube’s Vice President of Engineering, added: “SOC 2 Type II certification is a great milestone for CyberCube as it shows the maturity of our organisational controls, processes, and security. This certification validates our promise of keeping our clients’ data protected.”
Building on the success of HID’s Mercury, HID Global, a worldwide provider in trusted identity solutions, has announced the HID Aero platform featuring its next generation of open-architecture intelligent controllers that increase choices for a wide range of businesses while future-proofing access control investments as requirements change. “HID Aero is providing a broader market with features that were generally available only in solutions for larger organisations, while eliminating the ongoing cost and complexity of designing, manufacturing and maintaining panel hardware at the same time,” said Jaroslav Barton, Director of Product Marketing at HID Global. “It also brings end-to-end security to everyday applications with encrypted communication and threat detection, and robust features to meet corporate compliance.” Access control software with low maintenance Based on HID’s Mercury hardware used in more than four million panels shipped globally, the HID Aero platform speeds development time for access control solution providers by including all required hardware, firmware, software and development tools. Benefits for users include: Easily adaptable to evolving requirements: Users can choose from a large variety of access control software providers when deploying solutions. Systems are also easy to migrate to new software and highly configurable to dynamically enhance situational awareness. Lower installation and maintenance costs: HID Aero enables remote management capabilities with HID readers supporting Open Supervised Device Protocol (OSDP), including its recently announced Signo readers with built-in support. This minimises the need for field inspection and reconfiguration. Key encryption and backward compatibilty End-to-end security from credential to host: HID Aero brings to smaller businesses many features generally available only in enterprise-class solutions, including host and controller authentication, encryption to protect keys and sophisticated threat detection. Trusted reliability, proven technology: Based on HID Mercury panel hardware and system technology, the durable controllers fit in the same footprint as earlier HID VertX® controllers and are backward compatible with HID VertX modules to simplify upgrades.
Digital Guardian, a provider of data loss prevention, announced the successful completion of its Service Organisation Control (SOC) 2 certification for the Digital Guardian Cloud Platform and its Managed Security Program Services. The examination, completed by independent CPA firm Schellman & Company, LLC provides independent validation that Digital Guardian’s internal security controls are in accordance with the American Institute of Certified Public Accountants’ (AICPA) applicable Trust Services Principles and Criteria (TSPC). Cloud-delivered data protection Our independent SOC certification will complement existing certifications of our cloud hosting partner, AWS" SOC 2 is considered the gold standard for security and requires companies to create and adhere to strict security policies and procedures. Digital Guardian’s successful completion of its SOC 2 examination demonstrates the company’s ongoing commitment to meeting audit and compliance needs while maintaining a secure environment for customers’ confidential data. "Protecting customers’ data has always been the top priority for Digital Guardian,” said Frank Aneiros, SVP, Global Services, Digital Guardian. “For the industry’s only cloud-delivered data protection platform, achieving SOC 2 compliance is significant as it further validates the lengths we go to preserve the security and confidentiality of our customers’ information. Our independent SOC certification will complement existing certifications of our cloud hosting partner, AWS, to give customers complete confidence in our products and services.” Data protection solution Digital Guardian’s cloud-delivered data protection solution serves data-rich customers in highly regulated environments who rely on the company to protect their sensitive data and critical assets. Completing the SOC 2 examination will enhance the trust customers have come to place in Digital Guardian.
Tragically, in the world we now live, mass shootings and gun violence are epic concerns not only in schools, but Big Box retail, hospitals, municipal buildings, festivals, sporting events, concert venues, and just about anywhere crowds gather or work. The number of incidents is not acceptable and is truly startling. There are many societal and mental health issues that can cause these events and their importance in solving this issue is critical. However, this article will be focused on the technology side of preventing mass shooting events. Going beyond metal detectors The best way to eliminate mass shootings is to detect weapons before they ever enter, or as they enter, a building. Metal detectors have been effectively dispatched and used to identify weapons on a person entering a building. The major drawbacks of metal detectors are the cost to operate them, several security guards per machine, and the resultant bottlenecks which cause limited throughput at the entrances. The technology eliminates the need to empty pockets and allows backpacks, luggage bags, and purses to be scanned New technology on the market uses millimeter wave detection to quickly scan someone walking through a portal. The technology eliminates the need to empty pockets and allows backpacks, luggage bags, and purses to be scanned at the same time as the person. People can walk through the portals side by side to reduce bottlenecks. Additionally, the technology reduces the number of guards needed, reducing overall costs. Taking out the human element The first step in surviving a mass shooting is being situationally aware. Immediately accepting and understanding the sounds as gunshots is paramount. Just a few seconds can mean the difference between life and death during an active shooter situation. Gunshot detection can eliminate the fear factor, which in many cases temporarily paralyses those involved and causes precious seconds to pass before action is taken. By using a trusted, effective gunshot detection solution properly partnered with a monitoring system can eliminate the human factor of indecision and delay. Further, coupled with a VMS camera system, it can visually verify the situation as an emergency, identify the shooter, and provide valuable, accurate information to first responders — all within just a few seconds. The state of gunshot detection technology Gunshot detection technology has been explored and developed by the military since WWI, but commercially it has only been around for a few years. Such detection systems range from wide area coverage to room-to-room coverage. Most are acoustic based (using microphones) to listen for the sound of a gunshot, record the sound, then analyse it with sophisticated software to determine if it is, indeed, a gunshot. Many years have been invested fine-tuning the software to differentiate between a gunshot and other loud noises. Eliminating ambient noise is very difficult during this process. The locations and venues mentioned at the outset of this article inherently have loud, ambient noise. This, in most cases, causes systems to give a false-positive or to even fail to detect the gunshot. In turn, it can send unverified or wrong information to First Responders and Security and cause havoc of unwarranted fear and actions. To help increase the accuracy of the detection of an actual gunshot, many systems have added infrared sensors. Many systems use backroom or cloud servers to run the necessary analysis In addition to the challenge of false positives, many systems use backroom or cloud servers to run the necessary analysis. This not only increases the cost of the system but may increase the notification time of the actual gunshot. Integration of this data to alarm, notification, and camera systems is difficult and costly. And experts say none of these systems are yet 100 percent effective. Enter ultrasonic sensor technology Fortunately, new technology is emerging in the industry. Technology which can eliminate the false-positives and reduce the cost by doing away with the expensive software, servers, cloud servers, and human intervention. This technology uses non-acoustical ultrasonic sensors to detect the frequency of a gunshot concussive wave created by a bullet, leaving the chamber along with the explosion wave force. Because these sensors are not acoustic (microphone), they will not pick up the ambient noise like other systems. In addition, the ultrasonic sensors only detect the gunshot concussive wave within the determined frequency. This also helps eliminate confusion caused by loud noises such as thunder, cars backfiring, large boxes being dropped, etc. An added bonus is ultrasonic sensors are not acoustic, therefore they are never listening or recording, the sensors only operate when there is an actual gunshot; hence, they’re completely non-invasive. The ultrasonic sensors only detect the gunshot concussive wave within the determined frequency Finally, these non-acoustic sensors do much of the work through an onboard processor, no backroom or cloud servers are needed. Integration to systems such as VMS, Access Control, Alarm Panels, etc. requires minimal effort. This allows existing security systems to be integrated with gunshot detection, creating a low-cost, highly effective overall solution. Protecting our children, loved ones, employees, and customers is a monumental challenge for any security professional. Using newly available technology, combined with existing security infrastructure, we have the ability to add on layers of safety to help reduce the tragedy of gun violence and mass shootings. This article was co-written by Brad McMullen, General Manager at 3xLOGIC, and Brad Jarrett, CTO at Active Guardian.
The early stages of the reopening of the British economy are underway following the Government’s announcement in mid-May that some people could return to work if they were unable to work from home. Workers in manufacturing and construction are among the first to return to the workplace, with other industries on standby. Should the data from the easing of the lockdown allow it, other businesses are gearing up to reopen at the start of July. Security has a pivotal role to play in mitigating the risk of infection and contamination as people return to the workplace. However, before exploring that, I want to highlight the fantastic work that the industry has been doing throughout this crisis. Security officers Security officers across the country have demonstrated the importance of their work time and again in recent weeks. Even when offices and shops have been closed, security personnel have been going about their usual duties in protecting assets and securing premises. At Amulet, part of our business continuity planning had been to prepare for possible staff shortages, but the commitment of our teams to carry on with their roles has been amazing. But as workplaces start to become occupied again, officers will face new challenges which we all need to be ready for. Officers will face new challenges which we all need to be ready for Security officers are often the people that process the entrance and exits to buildings. This will now need to be done with social distancing in mind. Each workplace and building might have a slightly different set up in terms of how they will address social distancing, including tape on the ground to measure 2-metre distances, rope to help enforce one-way systems, and the opening of additional entrances and exits to a building. Checking temperatures Officers may also be responsible for checking the temperature of occupants as they enter using hand-held scanners, and for signing people in and out of a building to reduce the need for each person to come into contact with a logbook or touch-screen visitor management system. While it’s hoped that the vast majority of people will understand and respect the need for new systems, this is a stressful time for everyone and tempers can get frayed. Officers must be trained on how to manage confrontation. For example, a company may state that anyone with a temperature over 38.5 degrees cannot enter the building. An occupant might measure a fraction over and ask that they be allowed to enter. Security officers will need to be strict in reinforcing the rules and how to remove someone from a building if they do not comply. This could be a delicate situation so a strong relationship between security staff and the client is essential. Security as brand ambassadors This goes alongside the continued role of security officers as brand ambassadors. This is arguably even more important now as officers still need to be just as welcoming and helpful when working within the new restrictions. Just as important as officers looking after building occupants is that employers look after their officers. Even with social distancing, they are going to come into closer contact with more people than most professions, and will also be using high-risk touchpoints more frequently, such as door handles and reception areas. We fully expect face masks to become a requirement for buildings We fully expect face masks to become a requirement for buildings, whether that’s from government advice or the decision of individual businesses. As such, we have supplied full plastic visors to all of our security personnel as well as other PPE. We’re also regularly communicating with teams to remind them on best practice for the safe use and maintenance of PPE. PPE and security Even before this crisis started any PPE that we issued was accompanied by full training and a sign off procedure. It’s a vital step in being able to track the usage of equipment and making sure that it’s being used appropriately. It’s important to communicate with clients about PPE too – depending on the sector, clients may have different reactions to the need for PPE. The rail clients we work with are by nature more risk-averse and so are fully on board with security officers wearing PPE. They are doing everything they can to improve safety and hygiene in a high footfall environment. With other clients it may take a little more education and encouragement, especially around understanding HSE guidance. It’s understandable that some clients may think a full plastic visor is overboard for a small office building; this is again where having a strong relationship will be so beneficial. Getting clients on board will make it easier for them to communicate to building occupants about the security protocols in place, and why they have been implemented. The challenge of retail Crowds will need to be very carefully managed and stores will have to work together to maintain social distancing One sector that might be particularly challenging for security personnel is retail, especially shopping centres. Crowds will need to be very carefully managed and stores will have to work together to maintain social distancing outside of their doors. But the same basic principles will apply – wearing PPE, educating clients on HSE guidelines and agreeing on and enforcing social distancing measures. High-end boutique shops bring their own challenges. While security officers will not have to deal with high footfall, they will need to balance the enforcement of security measures with the requirement of providing a welcoming experience to customers keen to spend after months of lockdown. It’s likely that some potential customers will be wearing face masks, which would usually be a huge red flag for an officer at a luxury retail boutique. Now, they’ll have to judge the situation in a completely different way with the worry of losing a big sale if the customer doesn’t get the welcome they expect. As always, security personnel must work on this with the client to agree on what procedures to follow. The role of security in mitigating the risk as businesses reopen cannot be understated. With so much to consider, conversations with clients must start now to ensure that everything is in place for when the time comes.
Across the globe, healthcare providers and facilities from care homes to hospitals and private clinics are working around the clock to reduce the risk to their staff and reduce the spread within their facilities. There are increasing reports in the UK that the virus has devastating effects in care homes, with fears that the US will be next in tow. The impacts on healthcare staff have also been stark with absence levels growing. In some health bodies across the UK up to almost 20% of their staff are off sick. The consequences of COVID-19 are clear to see in the short term, but it may also drive the need for technology that will help mitigate against pandemics and the spread of disease in the long term. One of these technologies that offers some promise is long-range RFID. The value offered is more than just security and safety Why long-range RFID? The value offered is more than just security and safety. Implemented correctly, it not only helps minimise the dangers posed to staff and patients, but also helps improve the efficiency and workflow around the facility. Here are 5 reasons long-range access control is part of the solution: Reduce contact spread of viruses Most viruses spread through droplets inhaled from someone else’s cough or sneeze. But a common indirect way of infection is germs being passed on when people touch surfaces such as doors, pin pads and handles. This can lead to the dangerous spread within healthcare facilities as it only takes one infected person to spread the virus to those that touch the same surface. Hence, during the current times of peak capacity, the risk increases. The right long-range access control solution can help minimise the risk by reducing shared contact points. Integrating vehicle and people access Long-range RFID is gaining traction as a complete people and vehicle solution. As an ideal solution that automates vehicle access without the need for ticket stations, pin pads or manned gates, members of staff can now go from their doorstep to the room they are required in without having to touch surfaces in order to access the car park and building. All of this can be done from a card that is transferred from a special holder in your car to a land yard for centrally managed, hands-free access around the facility. Card readers providing hands-free access around the facility More efficient building workflow Time is a precious commodity for medical staff and any time that is wasted on trying to enter the building, search for a badge or entering a PIN should be limited. Once in the building, a long-range electronic ID badge allows automated access around the building without having to present a card to the reader. For more emergency situations, its also common to attach cards to push trolleys, wheelchairs and other heavy equipment to help protect staff and patient safety. Fight against theft It’s a sad circumstance that in times of crises, theft is an issue that healthcare facilities have to deal with. Amid global shortages, there have been numerous cases of masks, medical equipment and other supplies being stolen from hospitals. A modern access control solution using long range readers can help by keeping supplies locked in a dedicated room with access granted only for approved staff ID badges. Whilst also restricting access in staff car parks to only approved staff members. Proactively manage the flow of staff members in your facility Access control software offers a unique insight of real-time data Access control software offers a unique insight of real-time data into key staff members and their movements within the building. This software can then compile the data collected into reports which can help reveal bottlenecks in the flow of staff members around the facility. In the case of an emergency, an access system with connections to readers and cameras, can lock / unlock certain doors, or revoke access to particular people in case their badge was stolen. Whilst we cannot accurately predict what the world will look like post COVID-19, long-range RFID technology could prove to be a powerful tool going forward. It offers solutions that go beyond just security, and helps healthcare facilities build a better future by improving workflow, manage medical equipment, protect patients, staff and visitors from infection and future pandemics.
The global pandemic caused by the novel coronavirus is changing work environments to an unprecedented degree. More employees than ever are being asked to work remotely from home. Along with the new work practices comes a variety of security challenges. Without the proper precautions, working from home could become a cybersecurity nightmare, says Purdue University professor Marcus Rogers. “Criminals will use the crisis to scam people for money, account information and more,” he says. “With more people working from home, people need to make sure they are practicing good cybersecurity hygiene, just like they would at work. There is also a big risk that infrastructures will become overwhelmed, resulting in communication outages, both internet and cell.” Covid-19 concerns Concerns about the coronavirus have increased the business world’s dependence on teleworking. According to Cisco Systems, WebEx meeting traffic connecting Chinese users to global workplaces has increased by a factor of 22 since the outbreak began. Traffic in other countries is up 400% or more, and specialist video conferencing businesses have seen a near doubling in share value (as the rest of the stock market shrinks). Basic email security has remained unchanged for 30 years Email is a core element of business communications, yet basic email security has remained unchanged for 30 years. Many smaller businesses are likely to still be using outdated Simple Mail Transfer Protocol (SMTP) when sending and receiving email. “The default state of all email services is unencrypted, unsecure and open to attack, putting crucial information at risk,” says Paul Holland, CEO of secure email systems provider Beyond Encryption. “With remote working a likely outcome for many of us in the coming weeks, the security and reliability of our electronic communication will be a high priority,” says Holland. The company’s Mailock system allows employees to work from any device at home or in the office without concerns about data compromise or cybersecurity issues. Acting quickly and effectively As the virus spreads, businesses and organisations will need to act quickly to establish relevant communication with their employees, partners and customers surrounding key coronavirus messages, says Heinan Landa, CEO and Founder of IT services firm Optimal Networks. Employers should also enact proper security training to make sure everyone is up to speed with what’s happening and can report any suspicious online activity. Reviewing and updating telework policies to allow people to work from home will also provide flexibility for medical care for employees and their families as needed. Scammers, phishing, and fraud An additional factor in the confusing environment created by the coronavirus is growth in phishing emails and creation of domains for fraud. Phishing is an attempt to fraudulently obtain sensitive information such as passwords or credit card information by disguising oneself as a trusted entity. Landa says homebound workers should understand that phishing can come from a text, a phone call, or an email. “Be wary of any form of communication that requires you to click on a link, download an attachment, or provide any kind of personal information,” says Landa. Homebound workers should understand that phishing can come from a text, a phone call, or an email Email scammers often try to elicit a sense of fear and urgency in their victims – emotions that are more common in the climate of a global pandemic. Attackers may disseminate malicious links and PDFs that claim to contain information on how to protect oneself from the spread of the disease, says Landa. Ron Culler, Senior Director of Technology and Solutions at ADT Cybersecurity, offers some cyber and home security tips for remote workers and their employers: When working from home, workers should treat their home security just as they would if working from the office. This includes arming their home security system and leveraging smart home devices such as outdoor and doorbell cameras and motion detectors. More than 88% of burglaries happen in residential areas. When possible, it’s best to use work laptops instead of personal equipment, which may not have adequate antivirus software and monitoring systems in place. Workers should adhere to corporate-approved protocols, hardware and software, from firewalls to VPNs. Keep data on corporate systems and channels, whether it’s over email or in the cloud. The cyber-protections that employees depended on in the office might not carry over to an at-home work environment. Schedule more video conferences to keep communication flowing in a controlled, private environment. Avoid public WiFi networks, which are not secure and run the risk of remote eavesdropping and hacking by third parties. In addition to work-from-home strategies, companies should consider ways to ensure business cyber-resilience and continuity, says Tim Rawlins, Director and Senior Adviser for risk mitigation firm NCC Group. “Given that cyber-resilience always relies on people, process and technology, you really need to consider these three elements,” he says. “And your plan will need to be adaptable as the situation can change very quickly.” Employees and their employers Self-isolation and enforced quarantine can impact both office staff and business travelers Self-isolation and enforced quarantine can impact both office staff and business travelers, and the situation can change rapidly as the virus spreads, says Rawlins. Employees should be cautious about being overseen or overheard outside of work environments when working on sensitive matters. The physical security of a laptop or other equipment is paramount. “It’s also important to look at how material is going to be backed up if it’s not connected to the office network while working offline,” says Rawlins. It’s also a good time to test the internal contact plan or “call tree” to ensure messages get through to everyone at the right time, he adds.
At a major music festival, a fan in the crowd aggressively leapt over a barricade to approach a famous artist. Personnel from Force Protection Agency immediately implemented extrication protocol to shield the artist from physical harm, quickly reversed course and calmly led the client away from the threat. Force Protection Agency (FPA) personnel intentionally did not engage the threatening fan in any way, as local venue security personnel were present and tasked with apprehending the rogue fan. FPA’s efforts were directed expressly toward the protection of the client, avoiding unnecessary escalation or complications and minimising physical, visual, and legal exposure. Dedicated to the safety of clients Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation Specialising in protecting celebrities and high-net-worth individuals, Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation, and dedicated to the safety and success of clients. The agency was formed in 2017 by Russell Stuart, a California State Guard officer and security and entertainment industry veteran. The agency is the culmination of 20 years of experience in the fields of security, military, emergency management, logistics and technology, media and entertainment, and celebrity management. We interviewed Russell Stuart, Founder and CEO of Force Protection Agency (FPA), which has been called “the Secret Service of Hollywood,” for his insights into providing security for celebrities. Q: What unique need in the marketplace do you seek to serve, and how are you qualified to serve it? Stuart: The needs of celebrity and high-net-worth clients are complex and constantly changing. When dealing with a high-profile individual, discretion is paramount, extensive communication is required, and adaptation is ongoing. A critical objective is anticipating and planning for all types of potential negative scenarios and preventing them from even starting, all while not disrupting the normal course of operation of the client's day or their business. Force Protection Agency is poised to serve these needs by innovating and intelligently managing the planning, procedures, and personnel used in every facet of protecting the client’s interests and achieving their objectives. Q: What is the typical level of "professionalism" among bodyguards and security professionals that protect celebrities? Why does professionalism matter, and how do you differentiate yourself on this point? Stuart: Professionalism is an overall way of approaching everything to do with the business, from recruiting, to training, to making sure the right agent is with the right client. Nothing matters more; polish and precision are not only critical to mission success, but also support the comprehensive best interest of the client while preventing costly collateral damage and additional negative consequences. True “professional protective services" is intelligent strength and proper execution, not emotional or reactionary violence. Unfortunately, the latter is frequent among many celebrity bodyguards, and often incurs extremely expensive and even dangerous repercussions. Q: Your company has been described as "the Secret Service of Hollywood." How true is that comparison, and how does your work differ from (e.g.) protecting the President? Force Protection Agency prides itself on providing its services with discretion, precision, and poise Stuart: Totally true, and for this reason: the keys to success in protection are prioritization, and planning. Most people fail to even recognise the first, negating any level of effort given to the second. Establishing the true needs and the correct priority of objectives for each individual client and situation, and firmly committing to these without deviation, are what distinguishes both government secret services and Force Protection Agency from the vast majority of general security firms. Also, the term “secret service” implies an inconspicuous yet professional approach, and Force Protection Agency prides itself on providing its services with discretion, precision, and poise. Q: What is the biggest challenge of protecting celebrities? Stuart: The very nature of celebrity is visibility and access, which always increases risk. The challenge of protecting a high-profile individual is facilitating that accessibility in a strategic and controlled manner while mitigating risk factors. A client’s personal desires and preferences can often conflict with a lowest risk scenario, so careful consideration and thorough preparation are essential, along with continual communication. Q: How does the approach to protection change from one celebrity (client) to another? What variables impact how you do your job? Stuart: The approach is largely determined by the client’s specific needs, requests and objectives. The circumstances of a client's activities, location, and other associated entities can vastly disrupt operation activities. A client may prefer a more or less obvious security presence, which can impact the quantity and proximity of personnel. Force Protection Agency coordinates extensively with numerous federal, state, and municipal government agencies, which also have a variety of influence depending on the particular locations involved and the specific client activities being engaged in. Q: Are all your clients celebrities or what other types of "executives" do you protect – and, if so, how are those jobs different? Stuart: Force Protection Agency provides protective services for a wide range of clients, from the world’s most notable superstars to corporate executives and government representatives. We also provide private investigation services for a vast variety of clientele. Force Protection Agency creates customised solutions that surpass each individual client’s needs and circumstances. The differences between protecting a major celebrity or top business executive can be quite different or exactly the same. Although potentially not as well known in popular culture, some top CEOs have a net worth well above many famous celebrities and their security needs must reflect their success. Q: What is the role of technology in protecting famous people (including drones)? Technology is crucial to the success of security operations Stuart: Technology is crucial to the success of security operations and brings a tremendous advantage to those equipped with the best technological resources and the skills required to maximise their capabilities. It affects equipment such as communication and surveillance devices like drones, cameras, radios, detection/tracking devices, GPS, defensive weapons, protective equipment, and more. Technology also brings immense capabilities to strategic planning and logistical operations through the power of data management and is another aspect of Force Protection Agency operation that sets us apart from the competition. Q: What additional technology tools would be helpful in your work (i.e., a “technology wish list”)? Stuart: The rapidly growing and evolving realm of social media is a massive digital battlefield littered with current and potential future threats and adversaries. Most mass shooters as of late have left a trail of disturbing posts and comments across social media platforms and chat rooms that telegraphed their disturbing mindset and future attacks. A tool that could manage an intelligent search for such threats and generate additional intel through a continuous scan of all available relevant data from social media sources would be extremely useful and could potentially save many lives. Q: Anything you wish to add? Stuart: Delivering consistent excellence in protection and security is both a vital need and a tremendous responsibility. Force Protection Agency is proud of their unwavering commitment to “Defend, Enforce, Assist” and stands ready to secure and satisfy each and every client, and to preserve the life and liberty of our nation and the world.
The UK Government has been working to reduce the risks associated with illegal drone use since a high-profile incident at UK’s Gatwick Airport in December 2018, when a drone sighting triggered a three-day shutdown of the UK’s second busiest airport, disrupting the travel plans of 140,000 people and affecting 1,000 flights. To address growing security threats by drones, the UK Government has released its ‘Counter-Unmanned Aircraft Strategy’. ‘Counter-Unmanned Aircraft Strategy’ This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring" “This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring,” says Brandon Lewis, the U.K. Minister of State for Security. “It will provide the security the public and drone users require to continue to enjoy the benefits of leisure and commercial drone use and facilitate the growth of the drone industry.” “Given the challenge posed by rapid advances in drone technology and the potential threat, the strategy will provide overarching direction to our efforts,” says Lewis. The strategy focuses on ‘small drones’, those weighing less than 20 kg (44 pounds). Countering malicious use of aerial drones The UK Counter-Unmanned Aircraft Strategy centres on mitigating the highest-harm domestic risks resulting from malicious use of aerial drones. They are: Facilitating terrorist attacks, such as modifying commercially-available drones to conduct reconnaissance or attacks. Facilitating crime, especially in prisons, where drones are currently used to deliver contraband. Disrupting critical national infrastructure, such as airports, where a malicious incursion using a drone can have serious safety, security and economic consequences. Potential use by hostile state actors. Maximising benefits of drone technology The initiative will also look to build strong relationships with industry to ensure high security standards Over the next three years, the strategy will seek to reduce the risks posed by the highest-harm use of drones while maximising the benefits of drone technology. It will develop a comprehensive understanding of evolving risks and take a “full spectrum” approach to deter, detect and disrupt the misuse of drones. The initiative will also look to build strong relationships with industry to ensure high security standards. Further, promoting access to counter-drone capabilities and effective legislation, training and guidance will empower the police and other operational responders. Tactical response to drone-based threats Because technology is rapidly evolving, the response needs to keep pace, according to the strategy document. Lewis adds, “We will therefore work to understand how drone-based threats might evolve in the future, both at the tactical and strategic levels.” The strategy will be to build an end-to-end approach to tackling the highest-harm criminal use of drones. It will also work to make it easier to identify malicious drone use against a backdrop of increased legitimate use. Legal drone operators will be required to register with the Civil Aviation Authority (CAA) and to pass an online competency test before flying a drone. Retailers who follow a specific set of safety guidelines when selling drones will be designated ‘DroneSafe’. Unmanned traffic management system The government is working toward future implementation of an unmanned traffic management (UTM) system, which provides a means of preventing collisions between unmanned aircraft and other manned or unmanned aircraft. The current strategy includes early planning for the system. An Industry Action Group will ensure a continuing relationship with the drone industry and help to improve existing counter-drone measures and identify new opportunities, such as use of ‘Geo-Fencing’ to restrict drones from flying in certain areas. Regulating commercial and domestic drones The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace The strategy will seek to communicate the UK’s security requirements to the counter-drone industry and to encourage a thriving sector that is aware of, and responsive to, the needs of government. Regulating drones is the responsibility of two UK government departments. The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace, while the Home Office has overall responsibility for domestic counter-drone activity. Fast-evolving drone and counter-drone technology Also, the Center for the Protection of National Infrastructure (CPNI) has been involved in reducing the vulnerability of sensitive sites, including airports. New performance measures will track the strategy’s success. Due to the fast-evolving nature of drone and counter-drone technology, the intent is to review and, if necessary, refresh the strategy in three years.
Generally, the Less Than Load (LTL) industry is always looking to increase the amount of product shipped per truck. A lesser amount of product on a truck equates to a lower amount of billable product per trip. Raw Load Average (RLA) Raw Load Average (RLA) is the percentage of product on a truck – 100% is a completely full trailer. As the name implies, LTL averages less than 100%. In the fast- paced world of logistics, delivering millions of packages per day, than how do companies maximise the RLA? Most shipping managers are responsible for inspecting each trailer, before it leaves for several additional items. They make sure that the packages are secure and then evaluate whether the truck can handle any more inventory. There might be 200+ dock doors in a 400,000 sq. ft. facility and dozens of trucks waiting to leave and get on with their trips. At peak times, inspections will require several individuals running all over the facility. Less Than Load (LTL) Industry experts estimate that only about 80% of trucks are actually inspected Industry experts estimate that only about 80% of trucks are actually inspected. The missed trucks are now at risk for unsecured packages arriving damaged. More importantly, they are leaving 74% full. If the truck had waited another 30 minutes for inspection, they could have added another one skid of products to increase the load to 75%. That 1% difference does not sound like much. However, considering the volume of shipments that the top 10 LTL companies deliver, the 1% will amount to somewhere between US$ 6 million and US$ 12 million per year, which goes directly to the bottom line. Role of video security systems So, what is the role of security video systems here? Well most people say that security video does not have a real Return on Investment (ROI) in its traditional role. It’s hard to disagree. One exception might be when security companies have used video systems to reduce the number of guards. Using video, one guard can see as much as 3 or 4 guards could see in the past, without ever having to leave their post. This certainly reduces cost, but at the end of the day, guarding is still an overall cost to the bottom line. This case study will highlight how a couple of Salient’s very resourceful customers have transformed video into cash generating systems. Operational efficiency with video In the guarding scenario, video can put one person in several places at once. This operational efficiency can also be applied to how many people are needed to inspect trailers. But the ROI doesn’t come from removing a couple of salaries from the payroll. The real money comes into play because now inspecting 100% of the trailers leaving the dock are possible versus 80% and get that RLA up by 2 or 3%. Then, it’s about the big bucks. And that’s just the tip of the iceberg, when looking at the overall operational efficiencies available by utilising video. Using video for misclassified products or shipment validation In logistics, there is a huge revenue miss every year when it comes to products being ‘accidentally’ misclassified In logistics, there is a huge revenue miss every year when it comes to products being ‘accidentally’ misclassified when shipped. All products being shipped have a classification, and each classification has a specific associated cost. These per-pound costs fluctuate based on the value of the product, required insurance, risk and other factors. An example would be a sporting goods manufacturer shipping ammunition and firearms, under the code for clothing. In this example, a 200-pound load would be billed at about US$ 100, when it should be billed at closer to US$ 300. Multiply this by hundreds of packages a day and the total of the missed revenue is astronomical. So how would a video surveillance system correct this problem? Certainly, security cameras cannot see though a box, but one would expect a box with 200 pounds of clothes to be a fairly large box. But if the box were full of firearms or ammunition, the video would reveal a much smaller box. This anomaly when noticed would prompt an operator to investigate the contents of the box and contact the manufacturer to rectify the billed amount. This process might seem a bit hypothetical, but already a current customer of Salient Systems is capturing over US$ 40 million a year with the right system components. Using video to reduce OSHA violations and false claims The logistics industry requires a tremendous amount of labour in order to operate. The more labour hours, the greater the propensity for on-the-job injuries, OSHA violations, insurance payouts, lawsuits and business interruption. False claims are also a consideration. Let’s look at some real-world examples of using video to reduce or eliminate these issues: OSHA reports that 5,250 workers died on the job in 2018 (3.5 per 100,000 full-time equivalent workers), on average, more than 100 a week or more than 14 deaths every day. The loss of an employee is one of the most emotionally devastating situations a business can encounter. There are several benefits of video that can increase safety. One result of a fatality is typically an OSHA investigation. An action item that could result from this investigation would be to increase security guards. This is a perpetual cost that could continue for several months to years. Video systems enhance guards’ efficiency Video systems have been shown to improve the efficiency of guards, allowing them to have eyes on multiple areas Video systems have been shown to improve the efficiency of guards, allowing them to have eyes on multiple areas at the same time. The systems can be coupled with the use of video analytics to alert guards to specific situations such as motion in areas that should be unoccupied or traffic proceeding in an unauthorised direction. In these ways, video systems can reduce the quantity of physical guards, thereby reducing the cost. One of Salient’s customers is saving almost US$ 20,000 per month with the reduction of two guards and it has OSHA’s approval. The end result is that the safety of the employees has been increased and operational cost is lowered by implementing technology. Inadvertently, this same type deployment at another facility helped mitigate a US$ 900,000 slip-and-fall lawsuit, which could have also been a possible cause for an OSHA investigation. Validation of safety policy Validation of safety policy can also be a drain on resources. Auditing seatbelt use for forklift drivers, pedestrians using appropriate marked walking paths, and proper social distancing in work spaces are a few examples among many. Assigning an individual to monitor this activity is costly and people typically obey the rules only when that individual is present. However, video can capture this information all the time without huge labour cost. This information can then be audited and used for education processes. OSHA statistics indicate that there are roughly 85 forklift fatalities and 34,900 serious injuries each year, with 42 percent of the forklift fatalities from the operator's being crushed by a tipping vehicle. The safest place for the driver to be is strapped. A facility that used video to audit seatbelt usage showed a 65% compliance rate. After the information was presented to the manager and employees, the next audit resulted in a jump to 87% compliance rate. In the event of an injury, this type of verifiable data can go a long way to prove that the employer is serious about employee safety and investing in ways to improve the safety culture within the company. Using video to increase sales LTL is a very competitive business and it is viewed primarily as a commodity type operation LTL is a very competitive business and it is viewed primarily as a commodity type operation. A few pennies per pound can typically sway a decision-maker. Already some great operational efficiencies and benefits from video to lower cost and to making LTL more competitive has been discussed. But these ideas still don’t move LTL out of the ‘dog-eat-dog race to the bottom on price’ world. Now, let’s look at how to use the implementation of these same video systems to provide value propositions and competitive advantages for customers. Many LTL customers have sensitive merchandise for which the safety and security of its delivery might outweigh cost differences. An example is freight regulated by government agencies, such as Drug Enforcement Agency (DEA), Alcohol, Tobacco and Firearms Agency (ATF), and Dept. of Energy (DOE). For example, the DEA reported ‘The overall trend of incidents of Controlled Prescription Drugs lost in transit increased in 2018 with the highest number since 2010.’ Extra layer of security And the ATF’s Interstate Theft Program states that ‘Under the program, hundreds of reports of thefts and losses from interstate shipments are received each year’. With statistics like these, customers in these categories have a heightened sense of vulnerability. Offering systems such as surveillance video can add that extra layer of security and added confidence. This is a marketable differentiator to help LTL companies set themselves apart from the traditional companies that only offer a lower cost. This, bundled with some of the other cost-saving measures outlined above, could be the icing on the cake needed for security departments to convince C-Level executives in their organisation to invest in video.
Commenced in 2016, the large business club was built with smart infrastructure and modern amenities, in the futuristic town of Kolkata, to provide leisure-cum-business conducive atmosphere to their members and visitors. The contemporary building of business club is spread over 10 acres area and serves as a cultural, commercial, and business hub in the region. Having a beautiful landscape, it attained tremendous popularity due to its high-end specifications, green landscape, wedding lawn, tennis court, cafeteria, business centre to name a few. Missing real-time video surveillance With a consistently large volume of patrons visiting the business club for various events, security is the vital component of the successful operations at the site. The customer has been relying heavily on analogue video surveillance to secure its facilities and workforce. Due to its limited scalability, there was no way to do real-time surveillance throughout the premises. Moreover, every incident recorded by the video cameras required time-consuming manual investigation, therefore, causing delay in decision-making. Aiming to advancing the surveillance solution, the customer wanted to make an investment to maintain a watchful eye, manage threats/incidents proactively along with integrate existing and new system into the unified interface. Videonetics Unified Video Computing Platform Intelligent Video Analytics (IVA) is helping operators detect vehicles wrongly parked in ‘restricted’ or ‘no parking’ zones After a thorough evaluation of various solution offered by various companies, it was Videonetics that came out on top. Thanks to Videonetics Unified Video Computing Platform (UVCP™) that blends Intelligent Video Management Software (VMS), Intelligent Video Analytics and seamless integration of existing analogue system into one user-friendly solution, able to grow effortlessly with customers’ need over time. Incident response management Videonetics Intelligent VMS is managing 100+ cameras including PTZ network camera, dome cameras, fixed cameras, and bullet cameras, installed throughout the interior as well as exterior of the premises. In addition, 32 legacy analogue cameras are also integrated into the unified solution, eventually providing centralised control of the cameras to the security operators. The in-built failover and redundancy features of Intelligent VMS ensure the operators to always have access to live and recorded video. This means if any incident occurs, they can always have evidence of it. Zero Blind Spot at Entrance The Intelligent Video Analytics (IVA) is helping operators to detect vehicles which are wrongly parked in ‘restricted’ or ‘no parking’ zones, at the outside of premise. For the perimeter security at entry & exit gates, the PTZ camera tracking helps in detecting unusual behaviour of the person and provides alert to security operators for faster action. At the entrance, face capture has been installed to detect a person in the scene and locates his/her face, which is saved in the database, indexed and time stamped. In addition, vehicle capture is deployed to track and record license plates of vehicles along with time and date, entering the premise. Zone monitoring Operators will be notified if a person stays beyond a certain duration in a user-marked zone The business club needed a solution that could help it identify theft, intrusion and trespassing throughout its facilities. In the first phase of the project, Videonetics along with stakeholders of business club and system integrator identified sensitive areas, that requiring immediate security system. To monitor suspicious activities, zone monitoring has been enabled at the fence of tennis court, lawn, emergency gates and open field area. Operators will be notified if a person stays beyond a certain duration in a user-marked zone. To combat unauthorised entry in generator room, operators gets alert if any intrusion happens in a marked area. Similarly, unusual activities are also being monitored in this area through loitering detection. Trespassing detection Operators can handle alarms and manage events, reducing manual checks of cases and helping to expedite investigations At the peripheries of the business club, trespassing detection has been deployed to detect if any person intrudes into a premise. The system is well capable to trace trajectory of the trespasser and prevent incident before it occurs. The authorities wanted to have alert in case any mob formation happens at the field area, known as forbidden region, of the club. Crowd formation detection has been deployed that estimates density of people in a scene and generated an alert as soon as the density in any defined area crosses a certain limit. Empowering with mobile application The ease of use of Videonetics unified solution has been instrumental to the business club. The operators and senior authorities are efficiently accessing videos anytime and anywhere, thru an intuitive interface of IVMS web and mobile applications. At the time of incidents, operators can handle alarms and manage events, therefore, reducing manual checks of cases and helping to expedite investigations. After various phases of implementation, installation, and testing, the Videonetics unified solution went into live operation. Since upgrading to Videonetics unified solution, the business club has been able to better handle incidents of thefts/intrusion and apprehend suspects. Therefore, the level of security has been lifted by allowing the early detection of incidents and monitoring the premises round-the-clock, even in the harsh environmental condition. Furthermore, the added layer of security has been significant in business club’s efforts to attract more members and sustain business relations with existing members. Detecting patterns Now the operators use the information being collected in the unified interface to better understand the environment. They are successfully detecting patterns on how visitors/members access and move through the club. Thus, using these insights to develop strategies that maximise the use of space and keeps everyone safe. The open architecture of Videonetics unified solution allows customer to integrate with third-party systems such as access control, emergency system and much more. “To go from conventional to a professional and scalable surveillance system was a huge improvement for our client. It has enhanced our client’s reputation for providing safe and secure environment to visitors, employees, and members. Commendation to Videonetics for providing their unified video computing platform that empowered security operators by improving their efficiency in monitoring the premise and handling threats swiftly. I deeply appreciate their dedication and untiring efforts for making it a reality”, said Gaurav Das, Director, Webdesk Technologies Private Limited.
Airports are transportation hubs often located within close proximity to hotels, eateries, retail stores and sports venues. For this reason, large airports can have thousands of people approach their perimeter each day. With such a high throughput of people, security technology that detects and deters external threats is essential. When it comes to intrusion detection systems, there are several technology options, including buried pressure sensor cables, fibre optic sensors and behavioural analytics. However, an effective solution seeing increased adoption recently are thermal imaging cameras with built-in analytics. Lessons can be learned from integration firms like Ojo Technology, who oversaw the deployment of a FLIR perimeter intrusion detection system (PIDS) at Norman Y. Mineta San Jose International Airport (SJC) in 2017. Here are four advantages of thermal cameras that Ken Castle, vice president of business development at Ojo, described based on the SJC deployment. Video analysis and monitoring Thermal cameras produce images based on heat signatures rather than light. Consequently, thermal cameras capture video in total darkness, see through foliage and perform in adverse weather conditions like rain, wind and smoke. Thermal cameras provide a significant advantage for airports. As thermal cameras detect even the smallest differences in heat signatures, they produce sharp, high-contrast images “The combination of darkness and distance demands a different solution, one that can be provided by thermal imaging cameras,” said Castle. “These need no auxiliary illumination, and their field of view can extend for hundreds of feet.” Low false alarm rates As thermal cameras detect even the smallest differences in heat signatures, they produce sharp, high-contrast images ideal for video analytics, detection and classification. “With thermal cameras, the embedded analytics can immediately distinguish between an animal at 50 yards and a human at 300 yards, following their direction of movement,” Castle explained when discussing the PIDS project at SJC. Visual proof to provide qualified alerts Deploying thermal cameras in a PIDS project provides video verification for each alert. Thermal cameras provide the data and visual confirmations that are lacking from traditional fibre-based ‘shaker fence’ systems" “Thermal cameras provide the data and visual confirmations that are lacking from so-called traditional fibre-based ‘shaker fence’ systems, which generate alarms when objects strike a fence or something creates vibration,” Castle said. “The problem is that such alerts could be caused by dogs, wildlife, bicyclists bumping into the fence, tree branches or winds — none of which pose security threats. Those incidents then need to be independently confirmed by cameras. That takes extra steps and therefore consumes what could be valuable time.” Long-range detection and flexible coverage Airport perimeter solutions must have the ability to monitor vast exterior areas, from the parking lot to the terminal to the tarmac to the hundreds of portals in between. Thermal cameras provide that long-range monitoring capability. Castle reiterated this point when describing the FLIR solution deployed at SJC. “The FLIR perimeter camera system is designed to identify any attempted breaches by individuals who might try to gain access to the tarmac or aircraft from outside of the airport boundaries,” Castle said. “It also provides ongoing visibility of vehicle and cycling traffic along the outer fence line, as well as the movement of aircraft, cargo loaders, delivery trucks and service vehicles within the perimeter. Bottom line is that the safety of passengers, airline employees and service workers is greatly enhanced.”
Multiple Construction sites in the Albuquerque area are managed by Shumate Constructors, Inc., an Albuquerque, New Mexico-based construction contractor, that is also renowned for building educational facilities. In addition to building schools from the ground up, Shumate Constructors completes school additions and remodels. Construction site thefts Three years ago, the company began having problems keeping thieves out of its construction sites during non-working hours. Unwatched construction sites are hot beds for a variety of thefts - from copper pipes and wire to hand tools to heavy-duty machinery. The loss of machinery, such as front-end loaders, would cost hundreds-of-thousands of dollars. Sometimes workers will arrive to a site in the morning only to find materials, such as copper pipe, gone along with their tools. Enhancing construction site security The sites also presented a challenge due to changing construction conditions The result is the loss of a whole day and sometimes multiple days of work. On top of the lost time, the contractor has to cover the cost of replacing materials, file an insurance claim for each theft and complete additional administrative paperwork that they weren’t planning to invest time in. The sites also presented a challenge due to changing construction conditions. Equipment or storage containers are delivered and removed, the sites are graded/re-graded and as sections of build were completed, tools, materials and supplies were moved to different areas. Flexible, reliable wireless solution At a contractor trade show a few years ago, Mark Shumate, President of Shumate Constructors met Dave Meurer, President of Albuquerque’s Armed Response Team. Meurer introduced Shumate to the idea of a flexible, reliable wireless solution that could continually monitor the entire site without the need to trench around the perimeter. “Mark [Shumate] was fed up with theft at his construction sites so we started to discuss some prevention ideas,” said Meurer, adding “I knew this was a great fit for the combined Inovonics transmitter and Optex sensor solution.” Optex sensors installed He further said, “At the Armed Response Team, we refer to this solution as the never sleeping, non-blinking eye. Shumate was not aware of any reliable solutions that could provide this type of theft prevention, but we explained that we were very confident in this application and he was definitely interested.” To install each combined sensor, the Armed Response Team attached the Optex sensors to a freestanding steel post with a base plate on it and deployed them throughout the site. This allowed the flexibility to be easily moved to accommodate site changes. Once installed, a signal was easily achieved. iSeries Optex/Inovonics sensors The amount of iSeries Optex/Inovonics sensors needed at Shumate’s sites vary The sensors in the combined solution often need to communicate as far as an entire city block and the perimeters can be several thousands of feet. The iSeries Inovonics/Optex solution was able to easily accomplish this feat. The amount of iSeries Optex/Inovonics sensors needed at Shumate’s sites vary. For some sites, it can be as few as a dozen, and others it can be as many as 30 or more. “Together, the products offer a great solution,” noted Meurer, adding “The Optex sensors can handle varying weather conditions and Inovonics’ wireless connectivity offers less signal drop and more consistent reporting signal than any of the other transmitters we’ve tried.” Efficient perimeter security solution “Between the perimeter technology by Inovonics and Optex, and the Armed Response Team’s follow-up, we have seen zero thefts for all projects since installation. With the integrated wireless solution, the construction sites are monitored on a real-time basis and immediately notify the Armed Response Team upon unauthorised access,” said Mark Shumate, President of Shumate Constructors. He adds, “We look at the perimeter security solution as a great investment. Annually, the cost of manpower, replacement of lost or stolen items and damage repairs could easily cost three times more than we spend on Armed Response Teams’ services with the Optex and Inovonics solution.”
OPTEX Teams up with Mobile Pro Systems to create a Rapid Security Deployment Solution for a high-end condominium builder in Extreme Weather Conditions. The solution was required for a large construction site for Cove Properties, one of Alberta, Canada’s premier luxury condo builders. Weather conditions With many developers and construction companies building throughout the year, they're forced to battle a myriad of different weather conditions including rain, sleet, snow and extreme cold. On top of this, they still face the inevitable problem of theft and vandalism. Theft of tools, machinery, new materials and scrap material cost contractors millions of dollars per year and leaves the construction companies and their sub-contractors with the effect of having to deal with their losses. The general contractors and developers feel the chain reaction as well, as they have to deal with higher insurance premiums and weeks and months of project delays. To avoid the major effects of construction site theft, Cove Properties turned to 2020 Digital Security Solutions of Alberta, Canada for help. Cove’s requirements included a mobile solution capable of wireless communication that could be moved from site to site with surveillance, motion detection, lighting and remote monitoring capabilities. In addition, it had to survive the harsh outdoor elements of Northern Canada. Powering network and surveillance solution 2020 Digital Security Solutions took all of Cove’s requirements into consideration and found the perfect solution in the PowerSentry by Mobile Pro Systems. The PowerSentry is a self-sufficient, temporary, semi-permanent or permanent surveillance solution. Cove is using 6 Redscans with 2 fixed cameras on six poles, and ran power to each pole Built as a “power platform”, it can power anything from surveillance, security, communications and/or network technologies. And with its universal mounting options, the PowerSentry can be mounted to a pole, a wall or tripod or can be easily hooked over a fence or roof parapet for superior mobility. It accepts 90-277VAC to minimise re-wiring and is equipped with a high quality Lithium-Ion battery pack as a backup power source due to loss of power or power outages. In addition, the PowerSentry has a unique remote system status and control software called Power Broker, which monitors the PowerSentry’s battery voltage, current power usage, displays active map GPS monitoring, intrusion detection reporting, warning and flood lighting control and horn/speaker control. Motion-activated floodlights To help solve the limited daylight obstacle, 2020 DSS had two 8,000 lumen LED flood lights mounted to the chassis of the PowerSentry. The LED floodlights are motion activated and have a pre-determined setting of how long they will stay on. The lights can also be turned on and off manually through the Power Broker software. “Due to the short amount of daylight during the winter months, the flood lights will help light the site in the evening hours and after hours if there is a breach in the perimeter,” said Gene Telfer president of 2020 DSS. The perimeter and the interior of the construction site is protected by an Optex RedScan laser perimeter detection device which was connected to the PowerSentry and mounted 8’ below providing a 200’ horizontal area of detection. “We decided to mount the RedScan below the PowerSentry instead of on it because we will get a wider detection range and a firmer detection trigger,” Telfer said. Optex Redscan laser detectors With abnormal cold temperatures hitting the Northern United States and almost all of Canada, the first test was in late December into early January when normal temperatures fell to -40°F and -60°F with the wind chill. “The systems are working great and we haven’t had a system go down at all,” Telfer said. According to Telfer, Cove is using 6 Redscans with 2 fixed cameras on six poles, and ran power to each pole that made installation very quick and easy. They are using Milestone video management software that integrates with the cameras and Redscan laser detectors for visual verification and event response in one platform.
Iris ID, a provider of iris recognition technology, announces it will provide its biometric recognition technology to the County of Los Angeles to make its prisoner release process safer, more accurate and efficient. Iris ID’s OU7S-AK camera module will be part of 163 Livescan stations in 114 law enforcement locations throughout the county. The new criminal booking solution will bring iris-based identity authentication capabilities to a system that previously relied on fingerprints and photos to enrol and identify individuals arrested in the nation’s most populous county. Identification of all criminals arrested The Los Angeles County Sheriff’s Department is one of 64 law enforcement agencies in the county that are part of the Los Angeles County Regional Identification System (LACRIS), which is the entity responsible for the identification of all criminals arrested in the county. Tim Meyerhoff, director, Iris ID, said the company’s contactless iris-based technology was part of an FBI-funded pilot project began in 2015. “The Iris ID system will allow for a more accurate release of individuals as a person’s iris is much less susceptible to damage than their fingerprints,” he said. Automated fingerprint identification system “With more than 300,000 bookings annually, the Los Angeles County Sheriff’s Department is always interested in eliminating the improper release of any individual.” The iris capture technology is part of a larger contract to be overseen by South Carolina-based DataWorks Plus which will also supply central servers, supporting software and implementation and support services. The contract will be paid for using funds from the state Automated Fingerprint Identification System. Program implementation will begin after July 1, the start of the county’s 2020-2021 fiscal year. Full deployment is expected to be completed within six months.
Round table discussion
We are all more aware than ever of the need for cybersecurity. The Internet of Things is a scary place when you think about all the potential for various cyber-attacks that can disrupt system operation and negatively impact a customer’s business. Because most physical security systems today are IP-based, the two formerly separate disciplines are more intertwined than ever. We asked this week’s Expert Panel Roundtable: How can cybersecurity challenges impact the physical security of a company (and vice versa)?
Video is widely embraced as an essential element of physical security systems. However, surveillance footage is often recorded without sound, even though many cameras are capable of capturing audio as well as video. Beyond the capabilities of cameras, there is a range of other audio products on the market that can improve system performance and/or expand capabilities (e.g., gunshot detection.) We asked this week’s Expert Panel Roundtable: How does audio enhance the performance of security and/or video systems?
2019 was a big year for the Expert Panel Roundtable. The range of topics expanded, and we had more participation from more contributors than ever before. In closing out the year of contemplative discussions, we came across some final observations to share. They can serve both as a postscript for 2019 and a teaser for a whole new year of industry conversations in our Expert Panel Roundtable in 2020.