IDIS has launched its totally cost-free IDIS Dynamic Privacy Masking (IDPM) solution at IFSEC International (stand IF1110 at London’s ExCel) 2019. IDIS now offers a simple answer to the previously labour-intensive – or prohibitively expensive – problem of de-identification in video footage which is being submitted in response to requests for access under The General Data Protection Regulation (GDPR) or for evidential purposes. Protecting privacy with masking GDPR came...
TAKEX Europe Ltd., renowned Japanese manufacturer of active and passive infrared perimeter intruder detection sensors, is slated to showcase their latest addition to their beam sensor family at this year’s IFSEC international at ExCel London, 18-20 June 2019. TAKEX detection sensors TAKEX detection sensors have been protecting people and property for more than 55 years, safeguarding domestic, commercial, and industrial premises and high-level Royal, Government, and military organisations...
Frontier Pitts will be exhibiting at the IFSEC Exhibition at Excel, London between the 18th and 20th of June 2019. Frontier Pitts will be showcasing a fully operational Secured by Design accredited LPS1175 Automatic Bi-folding Gate SR2 on the stand. This is the first automatic Bi-folding Speed Gate on the market to achieve Secured by Design accreditation and LPS1175 Security Rating! Many clients had been installing unrated Security Gates that had not been tested alongside LPS1175 security rate...
Edesix, global provider of Body Worn Cameras (BWC), has announced that it will be launching its latest VideoBadge, the VB-400, at IFSEC 2019. VideoBadge VB-400 BWC The VB-400 will be predominantly aimed at the policing and security sectors, where officers on the front line utilise BWCs to help prevent both criminal and anti-social behaviour when out on patrol. Additionally, the captured footage not only provides greater transparency of interactions with the public, but also significantly incre...
Who is more likely to rob your home – a friend or a stranger? Is a burglary more likely to occur when you are at home or away? Does gun ownership contribute to more effective home security? What about a loud, barking dog? A recent survey by Reviews.org considered these and other consumer preconceptions about home security and how they compare with the facts. "Everyone wants to feel safe at home but not everyone knows which home safety measures will actually help protect them,” say...
Cybersecurity has become the ultimate buzzword in the physical security market. And it also represents one of the industry’s most intractable challenges. Several years ago, the problem with cybersecurity was lack of awareness among physical security practitioners. It’s now safe to say that awareness has increased. Everyone today talks about cybersecurity, but has it helped the larger problem? We asked this week’s Expert Panel Roundtable: Is greater awareness helping to increase...
UK security fencing manufacturer Jacksons Fencing has expanded its hostile vehicle mitigation (HVM) range by adding the Impakt Defender temporary HVM barrier by Rosehill Security, renowned global provider of engineered rubber perimeter security products and ballistic solutions. Jacksons Fencing now has exclusive rights within the UK for both direct sales of the innovative barrier, as well as hire markets. Impakt Defender HVM barrier Impakt Defender is IWA-14 rated, capable of stopping a 7.2 tonne N2A lorry travelling at 30 mph Combining a large footprint and unique shape, Impakt Defender is IWA-14 rated, capable of stopping a 7.2 tonne N2A lorry travelling at 30 mph. The barrier is also accredited by Secured by Design. It’s the first HVM product in the Jacksons range that requires no foundations, enabling it to be quickly installed across all types of sites. Individual units weigh in at 430 kg and are manufactured from 100% recycled rubber bonded with polyurethane for strength. Steel security fence panels Additionally, Jacksons Fencing’s steel security fence panels can be mounted above the barriers to provide increased perimeter security. An ideal physical and visual deterrent, the combination can be rapidly deployed for temporary or permanent security installations, helping to protect people, buildings and infrastructure from hostile vehicle attacks. Cris Francis, Jacksons Fencing Security Consultant, says: “The UK and other parts of Europe are experiencing a worrying increase in vehicle-as-weapon attacks. Consequently, we’re seeing a growing demand for HVM measures as they become an integral part of physical security strategies. A high-quality and tested product, Impakt Defender is an excellent addition to our existing HVM range, offering our clients increased flexibility and versatility.” Securing public spaces Securing public spaces is a high priority for businesses and government organisations" Dalton Marshall, Sales Manager at Rosehill Security, comments: “Securing public spaces is a high priority for businesses and government organisations, with effective HVM solutions now more in-demand than ever. We are delighted to partner with Jacksons Fencing who are well known for their expertise in perimeter security. We’re confident that Impakt Defender will be a valuable addition to Jacksons’ extensive range of products, providing increased scope to protect people and places.” Impakt Defender joins a wide range of HVM products available through Jacksons Fencing, including bi-folding speed gates, static bollards and cable crash fences.
barox, the manufacturer of professional standard switches, media converters and IP extenders specifically designed for video applications, is promoting the need for awareness not only in selecting video transmission products that utilise sophisticated measures to protect against cyber attacks, but also for all network users to proactively safeguard their own sphere of operation. barox has built important safeguards for protecting sensitive data networks. Extending the scope for consideration with relation to network performance and system integration to VMS, barox view network security in terms of both 'cyber hygiene’ and ‘cyber security’. Implementing cyber hygiene for data security The implementation of a good cyber hygiene regime will encompass the precautions users can take to keep data organised, safeJust as an individual engages in personal hygiene practices to maintain good health and well-being, cyber hygiene can help keep data safe and properly protected; where users of networks and other devices can take steps to maintain their system health and improve online security. The implementation of a good cyber hygiene regime will encompass the precautions users can take with the aim of keeping sensitive data organised, safe, and secure from theft and outside attacks, such as malware, which can severely hinder network functionality. “Good hygiene practice includes a mix of regularly updating software and changing the use of complex passwords to prevent malicious activities,” says Rudolf Rohr, co-founder & managing partner at barox. “Only those users who need admin-level access to devices should have device access, whilst other users should have only limited capabilities.” Access port locking In relation to supporting users with good hygiene practice, barox provides access port locking, switch support login with authentication certificate, and video transmission device ports can be automatically disabled if someone unplugs them. Also, with IP-based Virtual LANs, application networks cannot access a barox switch, and protection is offered by the protocol. In short, cyber hygiene is a good practice, enabling humans and network devices to work together efficiently. barox products help with the easy management of networks via access and distribution layers, delivering the tools to deliver secure data and video – and in preparation for future integrations, like IoT and other digital devices. End-to-end communication encryption barox utilise end-to-end communication encryption and certificates to lockout unauthorised network accessTo aid installers, integrators and system designers to maximise the security of their video transmission networks, barox have coined the term ‘AMPS’, standing for Access Protection, Management, Performance, and System, to explain the different areas of video network operation to be considered. With regards to Access Protection, barox utilise end-to-end communication encryption and certificates to lockout unauthorised network access. barox management of login covers the disabling of unoccupied ports, Mac locking, Access Control List, TACAS and multiple user control. Also, to prevent cyber criminals catching login passwords via insufficiently encrypted equipment, between server and browser, barox uses ‘dual encryption’ technology that provides its video transmission networks with a sophisticated high-security barrier. HTTPs and firewall protection The first security measure barox employs is Hypertext Transfer Protocol Secure (HTTPS), an established high-end transport encryption (used to protect online banking registration). barox uses HTTPS to encrypt the password on the way from the user's browser to the server of the switch. Providing high-end resilience, barox do not rely on this barrier alone. Offering ‘double security’, barox provide firewall-like protection against man-in-the-middle attacks with Access-Control List (ACL) and Access Control Entries (ACE).
As the track cools from the Indy 500, the director of security for Indianapolis Motor Speedway events will speak as part of a panel at the Closing Keynote Luncheon at ESX on June 6 in Indianapolis. In this session, three carefully selected panellists will discuss ways to implement better strategies that help reduce violent crimes against employees, students, visitors and customers. To most effectively explore possible solutions, ESX will include panellists from diverse backgrounds who have handled security issues with unique requirements in many locations. Creating security platforms Ted Fries, Director of Safety & Security for Hulman Motorsports, is responsible for oversight of security and safety at Indianapolis Motor Speedway events. Fries will speak from his expertise as a 29-year veteran of the Indianapolis Metropolitan Police Department and overseer of security for one of the biggest racing events in the world. Mindy Pretzman will take the stage to bring her perspective as a command and control supervisor Mindy Pretzman, Assistant to the Special Agent in Charge of the United States Secret Service, will take the stage to bring her perspective as a command and control supervisor over the White House Complex. Her previous accomplishments include leading the transition of security operations between administrations and creating security platforms for First Lady Melania Trump. Security professionals Louis Dekmar, LaGrange Police Department Chief of Police, will bring his insight as a 41-year veteran of law enforcement in Georgia. Dekmar has served as Chief of Police for more than 26 years, and is Past-President of the International Association of Chiefs of Police and Past President and Chair of the Commission on Accreditation for Law Enforcement Agencies. These accomplished security professionals will take the stage on Thursday, June 6 for the Closing Keynote Luncheon. Attendees will enjoy a catered meal as they finish the week in Indy with this engaging discussion. During the luncheon, the Electronic Security Association will award the ESA Youth Scholarship to the college-bound child of a first responder. The Monitoring Association will present the Public Sector Award. The Security Industry Alarm Coalition will present the Police Dispatch Quality Award.
Delivering another high-value benefit to users, the Maxxess eFusion security management platform now integrates off-the-shelf and seamlessly with the widely used range of deister electronic key management systems. With this latest off-the-shelf integration, eFusion users can now manage all their keys from their centralised security management platform, reducing the risk of security breaches and streamlining their day-to-day operations. Modular and scalable, the deister electronic systems encompass a range of cabinets which can store anything from 8 keys to thousands. They can be used stand-alone or as part of a global corporate solution, in applications ranging from hotels and leisure settings to retail and up-scale residential developments. Knowing who has a particular key at any given moment significantly reduces the risk of losses and criminal activity" Reduces criminal activity “Knowing who has a particular key at any given moment significantly reduces the risk of losses and criminal activity,” says Lee Copland, Managing Director, Maxxess EMEA. “The deister electronic systems make that task much simpler. And with real-time reports logging all system usage, users can be held accountable for any misuse, theft of loss of keys – better protecting buildings and assets.” The integration with deister electronic systems is just the latest example of how the eFusion platform gives users the freedom to integrate, customise and adapt their security systems to meet both current needs and emerging risks. eFusion’s open technology software supports more than 60 off-the-shelf integrations from leading vendors, providing complete freedom to customise solutions combining surveillance, access control, fire and intruder systems with back-office processes. Making premises more secure Off-the-shelf integration between our key management systems and eFusion will deliver major benefits to customers"Crucially, integration with Maxxess eFusion also reduces complexity for installers and their customers and offers unlimited future scalability at affordable price points. “Off-the-shelf integration between our key management systems and eFusion will deliver major benefits to our customers,” says Darren Harrold, Head of UK Operations at deister electronics. “This means they can now link their essential systems together – including their surveillance, intruder, access and fire detection systems – making a wide range of premises easier to manage and more secure.” Visitors to IFSEC International can see Maxxess eFusion and deister key management in action, where both companies will be exhibiting on stand IF2120 and IF410 respectively from 18th to 20 June at London’s ExCel.
Workplaces, schools, hotels, sporting events, entertainment venues and other large –and sometimes not so large – facilities have become headlines in the news for all the wrong reasons: violent attacks. The Safer Solution is an effective training method that addresses public/workplace violence and active shooter incidents – by both alleviating a situation before it ever occurs, and by preparing civilians with appropriate response skills in the case of a crisis developing. The Safer Solution The Safer Solution was developed by Ken Good, Ted Westmoreland, and Michael Clarke The Safer Solution was developed by Ken Good, a Navy SEAL; Ted Westmoreland, an Army Special Forces Medic; and Michael Clarke, an Executive Protection Specialist – who, with their combined training, experiences and unique skillsets, have created a new method to teach individuals and organisations how to sense and assess an environment in order to act on red flags before it’s too late. In the event a crisis does occur, the training gives individuals proper skills to have a greater chance of survival as well as the ability to assist others. The Safer Solution provides training so that employees can: Increase situational awareness to allay an incident Identify and communicate threat concerns Protect themselves and others during an active-shooter situation Mitigate imminent and immediate attacks Perform lifesaving first responder actions Prevail overactive shooting situations through well-coordinated evacuation, barricade and engagement drills Training for crisis situations “It’s tragic and unfortunate, but the facts are that random acts of violence and active shooter incidents are increasing; ignoring these facts is no longer an option” said Michael Clarke, CEO of Archangel and one of the three partners in The Safer Solution. “We don’t believe that just telling people to ‘run, hide, and fight’ is effective training; individuals and organisations need a plan. The Safer Solution empowers people so they can prevent, protect, and prevail against aggressive attacks. Our training provides them with the tools and skills needed to make their work environments and public places safer.” The Safer Solution goes beyond the traditional ‘run, hide, fight’ direction" “The Safer Solution is our strategic partner in helping us design, implement, and maintain our workplace violence and active shooter program. With their guidance we have formulated strong company policy, in-depth training and coaching, and our threat response plan. The Safer Solution goes beyond the traditional ‘run, hide, fight’ direction. Their comprehensive in-person and online training has aided Randstad in developing and maintaining a comprehensive safety and security program to deal with the real threat of workplace violence.” - Corey Berghoefer, Senior Vice President – Risk Management & Insurance, Randstad US. Online active shooter training course “After having completed the online active shooter training from The Safer Solution, I am confident that this is the training our organisation needs to help our staff prepare itself in case an active shooter situation was to arise. The training was interactive, kept me engaged and more importantly increased my knowledge of what to do if I were to ever find myself in that unfortunate circumstance. One of the key elements of the training is what to do after, the information is key, and may save a life.” - Rudy Amador, Director Safety, Dole Fresh Vegetables, Inc. The Safer Solution is offered through on-site presentations where the team will come to a location and provide “hands on” instruction, demonstrations and drills. An effective, online e-learning version of the training, complete with videos and self-assessment drills, is also recommended for larger organisations with multiple locations.
Limitless Security, a provider of security solutions for the housebuilding and construction industries, has launched the VIDAR detector. This standalone, wire-free security system combines motion detection with integrated image verification to help reduce the cost of break-ins, theft and vandalism. VIDAR is a key part of Limitless Security’s new fixed cost, fully managed service which takes away the headaches and hassles involved in installing, managing and maintaining security equipment on building sites. According to Adam Lees, Managing Director of Limitless Security: “Developed as a result of more than 30 years’ experience, VIDAR is an integrated, technology-led security solution that detects intruders and captures images for visual verification around the clock. It provides building sites with unparalleled flexibility in terms of deployment as it does not need to be connected to an external power supply, control panel, telephone line or internet service.” Clear images of intruders during day/night VIDAR works in colour during the day and black & white at night using four high powered infrared spotlightsVIDAR uses a high-quality CMOS camera with automatic exposure, colour encoding and focus to capture images that clearly show when intruders are onsite. It works in colour during the day and black & white at night using four high powered infrared spotlights. Operating in conjunction with a PIR that uses a highly directional Fresnel lens, VIDAR has a day/night range of up to 30 metres – over double the distance of other market-leading solutions. When the PIR sensor detects motion, VIDAR’s embedded SIM automatically transmits images to a Monitoring Centre for visual verification before an agreed response plan is implemented. Limitless Security installs VIDAR after completing a risk assessment and configures the units to auto-arm and disarm at times and days required by individual sites. Unique SmartArm technology is used to scan target locations for any activity at pre-set arming times. VIDAR will only arm itself when no movement has been detected for a continuous period configurable from 15-60 minutes to minimise false alarms and unnecessary call-outs. It can also be used in ‘Gate’ mode to monitor the routine entry and exit of people and vehicles at building sites. SIA-licensed security guarding service Our managed solution includes detection, monitoring and response using a SIA-licensed security guarding service" “Our managed solution includes detection, monitoring and response using a SIA-licensed security guarding service. It covers everything from risk assessment, the supply, installation and management of all equipment and site security signage through to documentation of any events for evidential purposes and the provision of information to responding agencies,” continued Lees. “Importantly, we are focussed on providing a complete security solution for a single, fixed monthly cost to make budgeting easier and eliminate any unexpected additional charges.” VIDAR is IP65 rated with dimensions of 240mm (h) x 120mm (w) x 60mm (d). Each unit weighs 0.62Kg excluding batteries.
Johnson Controls recently unveiled the findings of its 2018 Energy Efficiency Indicator (EEI) survey that examined the current and planned investments and key drivers to improve energy efficiency and building systems integration in facilities. Systems integration was identified as one of the top technologies expected to have the biggest impact on the implementation in smart buildings over the next five years, with respondents planning to invest in security, fire and life-safety integrations more so than any other systems integration in the next year. As advanced, connected technologies drive the evolution of smart buildings, security and safety technologies are at the center of more intelligent strategies as they attribute to overall building operations and efficiencies. SourceSecurity.com spoke with Johnson Controls, Building Solutions, North America, VP of Marketing, Hank Monaco, and Senior National Director of Municipal Infrastructure and Smart Cities, Lisa Brown, about the results of the study, smart technology investments and the benefits of a holistic building strategy that integrates security and fire and life-safety systems with core building systems. Q: What is the most striking result from the survey, and what does it mean in the context of a building’s safety and security systems? The results show an increased understanding about the value of integrating safety and security systems with other building systems Hank Monaco: Investment in building system integration increased 23 percent in 2019 compared to 2018, the largest increase of any measure in the survey. When respondents were asked more specifically what systems they we planning to invest in over the next year, fire and life safety integration (61%) and security system integration (58%) were the top two priorities for organisations. The results show an increased understanding about the value of integrating safety and security systems with other building systems to improve overall operations and bolster capabilities beyond the intended function of an individual system. Q: The survey covers integration of fire, life safety and security systems as part of "smart building" systems. How do smarter buildings increase the effectiveness of security and life safety systems? Hank Monaco: A true “smart building” integrates all building systems – security, fire and life-safety, HVAC, lighting etc. – to create a connected, digital infrastructure that enables individual technologies to be more intelligent and perform more advanced functions beyond what they can do on their own. For example, when sensors and video surveillance are integrated with lighting systems, if abnormal activity is detected on the building premise, key stakeholders can be automatically alerted to increase emergency response time. With integrated video surveillance, they also gain the ability to access surveillance footage remotely to assess the situation. When sensors and video surveillance are integrated with lighting systems abnormal activity on the premise can automatically be detected Q: How can integrated security and life safety systems contribute to greater energy efficiency in a smart building environment? Hank Monaco: Security, fire and life-safety systems can help to inform other building systems about how a facility is used, high-trafficked areas and the flow of occupants within a building. Integrated building solutions produce a myriad of data that can be leveraged to increase operational efficiencies. From an energy efficiency standpoint, actionable insights are particularly useful for areas that are not frequently occupied or off-peak hours as you wouldn’t want to heat or cool an entire building for just one person coming in on the weekend. When video surveillance is integrated with HVAC and lighting systems, it can monitor occupancy in a room or hallway. The video analytics can then control the dimming of lights and the temperature depending on occupant levels in a specific vicinity. Similarly, when access control systems are integrated with these same systems, once a card is presented to the reader, it can signal the lights or HVAC system to turn on. In this example, systems integration can ultimately help enable energy savings in the long run. Security and life safety systems contribute to help enable greater energy efficiency and energy savings in the long run Q: What other benefits of integration are there (beyond the core security and life safety functions)? Hank Monaco: Beyond increased security, fire and life-safety functions, the benefits of systems integration include: Increased data and analytics to garner a holistic, streamlined understanding of how systems function and how to improve productivity Ability to track usage to increase efficiency and reduce operational costs Enhanced occupant experience and comfort Increased productivity and workflow to support business objectives Smart-ready, connected environment that can support future technology advancements Q: What lesson or action point should a building owner/operator take from the survey? How can the owner of an existing building leverage the benefits of the smart building environment incrementally and absent a complete overhaul? Lisa Brown: Johnson Controls Energy Efficiency Indicator found that 77% of organisations plan to make investments in energy efficiency and smarter building technology this year. This percentage demonstrates an increased understanding of the benefits of smart buildings and highlights the proactive efforts building owners are taking to adopt advanced technologies. There is an increased understanding that buildings operate more effectively when different building systems are connected As smart buildings continue to evolve, more facilities are beginning to explore opportunities to advance their own spaces. A complete overhaul of legacy systems is not necessary as small investments today can help position a facility to more easily adopt technologies at scale in the future. As a first step, it’s important for building owners to conduct an assessment and establish a strategy that defines a comprehensive set of requirements and prioritises use-cases and implementations. From there, incremental investments and updates can be made over a realistic timeline. Q: What is the ROI of smart buildings? Lisa Brown: As demonstrated by our survey, there is an increased understanding that buildings operate more effectively when different building systems are connected. The advanced analytics and more streamlined data that is gathered through systems integration can provide the building-performance metrics to help better understand the return on investment (ROI) of the building systems. This data is used to better understand the environment and make assessments and improvements overtime to increase efficiencies. Moreover, analytics and data provide valuable insights into where action is needed and what type of return can be expected from key investments.
Across the country, law enforcement officers are finding it increasingly difficult to respond to the near overwhelming number of calls coming from security alarms. Police departments commonly define a false alarm as a call, which upon investigation, shows no evidence of criminal activity, such as broken windows, forced doors, items missing, or people injured. While false alarms bog down police, they can also negatively impact customers and integrators. End users can expect hefty fines for false alarm responses, and when these customers receive large bills from the city, many turn to installers, dealers, and even manufacturers expecting them to accept the responsibility and pay the bill. What first brought the issue of alarm verification to your attention? It is crucial to both see a situation and concurrently listen to any corresponding sounds to gain full insight I’ve been aware of the problem of false alarms for about 5 years. I believed audio capture, through microphone deployment, could be an active part of the solution when used as a second source for indicating ‘out of the norm’ activity and as an equal component with the video surveillance technology. In 2015, I found similarly minded security professionals when introduced to the Partnership for Priority Verified Alarm Response. After reading PPVAR’s paper on ‘Audio Verified Alarms Best Practices; [April 2015],’ I knew that the Partnership was on to something important. In our lives, two of the five senses we count on day-in and day-out are sight and sound. It is crucial to both see a situation and concurrently listen to any corresponding sounds to gain full insight. What is the false alarm rate? In 2016, the International Association of Chiefs of Police reported that over 98 percent of all alarm calls in the United States were false. This number is obviously staggering, and something we need to work towards correcting. Why did this issue resonate so strongly with you? When I first investigated this issue, I was sure that the security industry would have already recognised this and was acting to ensure improved alarm verification, preferably through a combination of audio and video technologies. However, I quickly saw that this was not the case, or even close to the norm. I have questioned the rationale behind the lack of adoption and found the deployment of audio is often hindered by the concern of privacy. I’ve spearheaded many initiatives to explain the monitoring policies surrounding audio As CEO of Louroe Electronics, I’ve spearheaded many initiatives to explain the monitoring policies surrounding audio. I’ve had to reassure many security personnel and customers how the law supports the use of audio in public places as long as there is no expectation of privacy. By dispelling fears with facts around deploying and implementing audio sensors, customers can confidently include audio in their surveillance systems and gain a more effective security solution. Who is affected by this? Truth be told, everyone from the end user to the manufacturer is affected by this issue. Not to mention the strain this puts on law enforcement who are tired of ‘wasting time’ and effort out in the field on these nuisance alerts. When an end user receives a bill for their false alarm, many of them will immediately blame the integrator and or the monitoring center for a faulty set up and management and expect the integrator to remedy the situation, including carry the burden of paying the fines. The integrator, on the other hand, will turn to the manufacturer, assuming faulty equipment and installation instructions; therefore, looking for reimbursement for the cost. What is the average false alarm fee? It depends on many factors, and especially your first responder assigned location for responseIt depends on many factors, and especially your first responder assigned location for response. According to the Urban Institute, fees generally range from $25-$100 for the first offense, rising as high as a few thousand dollars per false alarm if a location has a large number in a single year. What’s worse, in extreme cases, alarm systems may even be blacklisted by the police dispatch center if they have raised too many false alarms in the past. Why do you believe audio is the ideal technology for secondary source verification? Video surveillance has been the main option for security monitoring and alarm validation for decades, however industry professionals are realising that video alone is not enough. Video only tells half of the story, by adding audio capture, the responsible party gains a turnkey solution with the ability to gather additional evidence to verify alerts and expand overall awareness. In reality, audio’s range is greater than the field of view for a camera. Sound pickup is 360 degrees, capturing voices, gunshots, breaking glass, sirens, or other important details that a fixed camera many not see. How would a secondary source verification system work with audio? Using a video monitoring solution equipped with audio, the microphone will pick up the sounds at the time a visual alert or alarm is triggered. If embedded with classification analytics, the microphone will send alerts for specific detected sounds. The captured audio, and any notifications are immediately sent to the monitoring station, where trained personnel can listen to the sound clip, along with live audio and video from their station. When law enforcement receives a validated alarm, they can better prioritise the response From here, an informed decision can then be made about the validity of the alarm, along with what the current threat is at the location. If the alarm is in fact valid, the information is then passed along to the law enforcement within minutes. When law enforcement receives a validated alarm, they can better prioritise the response. It also provides more information in a forensic evaluation. Are there any additional resources you would suggest looking into? Yes, we would suggest looking into the following to see a few different perspectives on the matter: NSA Support For 2018 Model Ordinance For Alarm Management and False Alarm Reduction Partnership for Priority Verified Alarm Response Support for the Term “Verified Alarm” and Prioritising Verified Alarm Responses Urban Institute Opportunities for Police Cost Savings without Sacrificing Service Quality: Reducing False Alarms
The extensive analysis and discussion preceding any decision to implement a new physical security solution – whether it’s hardware, software or a combination of both – often focuses on technology, ROI and effectiveness. When it comes to deciding what type of security entrances to install at your facility, you will almost certainly also consider the aesthetics of the product, along with throughput and, if you’re smart, you’ll also look into service concerns. Each of these factors has its important place within the evaluation process, and none should be overlooked as they all have a significant effect on how well your entrances will perform once they are installed. Culture influences door solution decisions How significant will the change from current entrances to security entrances be for employees? Still, one additional factor actually trumps everything: if you have not considered your organisation’s culture in choosing a security entrance, you may be missing the most important piece of the puzzle. Culture is a part of every other decision factor when selecting an entry solution. Before you make a decision about what type of entrance to deploy, you need to consider and understand the values, environment and personality of your organisation and personnel. For example, how significant will the change from current entrances to security entrances be for employees? If people are accustomed to simply walking through a standard swinging door with no access control, this will be a culture change. Beyond this, whether you are considering a type of turnstile, a security revolving door or possibly a mantrap portal, simply walking through it will be a significant change as well. Training employees on door security You’ll want to know whether employees have ever used security entrances before. If these types of entrances are in place in another part of the facility, or in a facility they’ve worked in at an earlier time, the adjustment will not be as great as if they’ve never used them at all. Consider, too, how your personnel typically react to changes like this in the organisation or at your facility. They may be quite adaptable, in which case there will be less work to do in advance to prepare them. However, the opposite may also be true, which will require you to take meaningful steps in order to achieve buy-in and train employees to properly use the new entrances. With the increased importance of workplace security, discussing new entrances with workforces will help maintain a safer environment Communicate through the decision-making process All of this will need to be communicated to your staff, of course. There are a number of ways to disseminate information without it appearing to come down as a dictate. Your personnel are a community, so news about changes should be shared rather than simply decreed. As part of this process, you’ll need to give some thought to the level of involvement you want for your staff in the decision-making process. Finally, do not overlook the special needs among your personnel population. You undoubtedly have older individuals on staff, as well as disabled persons and others who bring service animals to the office. Entrances need to be accessible to all, and you never want to be in the position of having a gap in accessibility pointed out to you by the individual who has been adversely affected. New security entrance installation By communicating early and often with your personnel, you can alleviate a great deal of the anxiety Once you have made the decision about which security entrances to install, training your personnel on how to use the new security entrances – both before and after the installation – will help to smooth the transition. Because workplace security is such a big issue right now, it makes sense to discuss the new entrances in the context of helping to maintain a safer environment. They will prevent violent individuals from entering, decrease theft, and most of all, promote greater peace of mind during the workday. If you can help them take control of their own safety in a responsible way, you have achieved much more than just a compliant workforce. By communicating early and often with your personnel, you can alleviate a great deal of the anxiety and concern that surrounds a significant change in the work environment. Schedule group meetings Consider your employees; what type of communications do they respond best to? A few suggestions to educate staff on the benefits of the new entrances include: Typically, you would communicate a general message 2-3 months in advance and then provide more specific information (for example, impacts to fire egress, using certain entrances during construction) in a follow up message closer to the installation date. Schedule group meetings to: announce the rationale for increased security, share statistics on crime, review the new security changes that are coming, show drawings/photos of the new doors/turnstiles, and show the orientation videos available from the manufacturer. These meetings are an excellent way to work through user questions and directly address any concerns. Once the installation of a new security system is complete, it is a good idea to have an "ambassador" on board to help employees use these new systems Ensure you monitor public areas If you are implementing a lot of new changes, such as a new access control system, new guard service and security entrances, you might consider hosting a ‘security fair’ on a given day and have the selected vendors come for a day with tabletop displays to meet employees and answer questions during their lunch. This could be a great way to break the ice in a large organisation. Make user orientation videos (provided by the manufacturer) available in several ways, for example: Intranet Site Monitors in public areas—lounges, cafeteria, hallways, etc. Send to all staff as email attachments Immediately after installation, once the doors or turnstiles are operational but before they are put into service, train ‘ambassadors’ on how to use the door/turnstile. Have these people monitor and assist employees during peak traffic times. What is the ultimate success of the installation? By communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction If you have thousands of employees, consider dividing them into groups and introduce the new entrance to one group at a time (Group A on Monday, Group B on Tuesday, etc.) to allow a little extra orientation time. Place user education ‘quick steps’ posters next to the door/turnstiles for a few weeks to help employees remember the basic steps and guidelines, e.g., ‘stand in front of the turnstile, swipe badge, wait for green light, proceed.’ Ask your manufacturer to provide these or artwork. While there are always going to be people who are resistant to change, by communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction. Your responsiveness to any issues and complaints that arise during and after the implementation is equally fundamental to the ultimate success of the installation.
The mindset behind a new law to prohibit the use of facial recognition and other security-related technologies by San Francisco police and other city agencies is obvious in the name of the new ordinance: “Stop Secret Surveillance.” Ordinance to stop secret surveillance The San Francisco Board of Supervisors passed the ordinance 8-1 with two abstentions on May 14, and there will be another vote next week before it becomes law. We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here" The irony of such a law emanating from northern California, where tech giants promote the use of numerous technologies that arguably infringe on privacy, is not lost on Aaron Peskin, the city supervisor who sponsored the bill. “We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here,” he told the New York Times. Regulating facial recognition technology Although the facial recognition aspects of the ordinance have been the most publicised, it also targets a long list of other products and systems. According to the ordinance, "Surveillance Technology" means “any software, electronic device, system utilising an electronic device, or similar device used, designed, or primarily intended to collect, retain, process, or share audio, electronic, visual, location, thermal, biometric, olfactory or similar information specifically associated with, or capable of being associated with, any individual or group.” Broadly interpreted, that’s a lot of devices. Includes biometrics, RFID scanners The ordinance lists some examples such as automatic license plate readers, gunshot detection hardware and services, video and audio monitoring and/or recording equipment, mobile DNA capture technology, radio-frequency ID (RFID) scanners, and biometric software or technology including facial, voice, iris, and gait-recognition software and databases. Among the exceptions listed in the ordinance are physical access control systems, employee identification management systems, and other physical control systems; and police interview rooms, holding cells, and internal security audio/video recording systems. The ordinance ban applies to city departments and agencies, not to the general public and exceptions include physical access control systems, employee identification management systems, and internal security audio/video recording systems Airport security not part of ordinance The ban only applies to city departments and agencies, not to private businesses or the general public. Therefore, San Franciscans can continue to use facial recognition technology every day when they unlock their smart phones. And technologies such as facial recognition currently used at the San Francisco airport and ports are not impacted because they are under federal jurisdiction. Furthermore, the San Francisco police department does not currently use facial recognition anyway, although it has been deployed in places such as Las Vegas, Orlando, Boston and New York City. Safeguarding privacy of citizens The ordinance appears to have a goal of avoiding government uses of technologies that can invade individual privacy, seeking to avoid worst-case scenarios such as an existing system in China that uses millions of surveillance cameras to keep close tabs on the Uyghurs, a Muslim minority population. Any new plans to use surveillance technology must be approved by the city government, and any existing uses must be reported and justified by submitting a Surveillance Technology Policy ordinance for approval by the Board of Supervisors within 180 days. Surveillance technology policy Banning use of facial recognition just when its capability is being realised is counterproductive But might such a ban on technology uses undermine their potential value as crime-fighting tools just when they are poised to become more valuable than ever? Ed Davis, a former Boston police commissioner, told the New York Times it is “premature to be banning things.” He notes: “This technology is still developing, and as it improves, this could be the answer to a lot of problems we have about securing our communities.” Technology development doesn’t happen in a vacuum and banning uses of facial recognition and other technologies just when their capabilities are being realised is counterproductive. We should be thoughtful, deliberate and transparent in how we embrace new technologies. However, discarding them out-of-hand using emotionally charged words such as “secret surveillance” does not promote the best use of technology to the benefit of everyone.
Knightscope’s long-term mission is to “make America the safest country in the world,” says William Santana Li, Chairman and CEO. “The company was started six years ago as we had grown tired and horrified by the ongoing violence in our country and decided to do something about it.” But are security robots the solution to crime and violence in the United States? “There are 2+ million law enforcement and security professionals trying to secure 328+ million people across the 50 states,” Mr. Li says. “The math just doesn’t work, which is why our country pays $1+ trillion in negative economic impact annually – a hidden tax we all pay in blood, tears and treasure.” Robots provide professionals with new tools. “We make really smart eyes and ears that operate 24/7/365 for an affordable price,” says Mr. Li. “We have actually operated more than 700,000 hours in the real world, both outdoors and indoors, across 15 states and are now operating across five time zones – fully autonomous without any human intervention.” Utilising robotics and AI AI helps Knightscope robots interact better with humans and perform activities like identifying peopleKnightscope is a security technology company that utilises self-driving technology, robotics and artificial intelligence to provide security professionals additional eyes and ears to do their jobs much more effectively – as well as provide a consistent around-the-clock physical deterrence to help minimise negative behaviour. Knightscope says its K1, K3 and K5 security robots, and accompanying user interface, the Knightscope Security Operations Center (KSOC), continue to make significant contributions to the safety of its client base. Artificial intelligence helps Knightscope robots interact better with humans and perform activities like identifying people, looking up license plates, detecting rogue wireless devices, having a machine-to-human dialogue and, in the future, detecting dangerous objects in a scene automatically. “Our long-term plan is to have the machines be able to see, feel, hear and smell, so advances in sensor capabilities, efforts in sensor fusion, and the future with 5G capabilities will make for profound advances,” says Mr. Li. Facial recognition software at ISC West 2019 was Knightscope’s fourth time exhibiting at ISC West, and they have also exhibited at GSX/ASIS, ISC East, numerous other trade shows, and have hosted some of their own. Mr. Li has seen the reaction to security robots evolve over the years. People are realising that the technology is not science fiction but science fact and looking to see how it can be an integral part of their respective security programs “At first, it was typically ‘what is that?’ or ‘what does it do?’ But the last 12 to 18 months have been very different. There has been much more meaningful, implementation-focussed dialogue, feedback, requests for new features, etc. Now folks are realising that our technology is not science fiction but science fact and looking to see how it can be an integral part of their respective security programs.” Their ISC West presence this year highlighted facial recognition software that utilises deep learning to detect, analyse and compare faces. Pechanga Resort Casino in Temecula, Calif., an existing Knightscope customer, is using the beta format on its K1 security robot platform. Additional benefits of using robots Knightscope has raised over $40 million to develop and deploy its technology and is backed by more than 6,000 family offices, accelerators, funds, private investors and four major corporations, says Mr. Li. As the machines get smarter and more capable over time – the number of applications will become endless" Robots also provide additional benefits beyond security, says Mr. Li, such as branding, community relations and public relations opportunities for clients. “In some cases, our clients have utilised our Concierge feature to allow for human-to-machine customer service interactions,” he says. “We have also been able to showcase and inspire STEM (science, technology, engineering and math) students with practical applications of technology for the good of society. And robot selfies have certainly become a thing.” Endless number of applications In terms of vertical markets, in the near term, Knightscope has seen positive scaling and growth on corporate campuses and at logistics facilities, manufacturing plants, hospitals, casinos, commercial real estate and malls. “As the machines get smarter and more capable over time – the number of applications will become endless,” says Mr. Li. They currently drop new software code every two weeks and new hardware typically a couple of times a year. “In my opinion, it is ill advised for early stage technology companies to utilise B2G (business-to-government) sales as the initial go-to-market strategy,” says Mr. Li. “For Knightscope we have been primarily focussed on B2B (business-to-business) sales and actually until 2017 were geographically constrained to California only. What we are doing is technologically extremely difficult as these are effectively self-driving cars. Additionally, despite the never-ending international interest, we are laser focussed on the United States.”
In today’s technology-driven markets, a platform is a business model that connects producers and consumers in an interactive ecosystem. Some examples of platforms are Uber and Airbnb, which have disrupted and transformed traditional markets. Isn’t it time to deploy the platform model in the physical security industry? That’s the goal of the Open Security & Safety Alliance (OSSA), a non-profit organisation. Interactions and exchange The book ‘Platform Revolution’ defines a platform as ‘a business based on enabling value-creating interactions between external producers and consumers.’ The description continues: ‘The platform provides an open, participatory infrastructure for these interactions and sets governance conditions for them. The platform’s overarching purpose is to consummate matches among users and facilitate the exchange of goods, services, or social currency, thereby enabling value creation for all participants.’ Platform for security and safety solutions OSSA’s plan is to build a common standardised platform for security and safety solutions. Founding members are Bosch Building Technologies, Hanwha Techwin, Milestone Systems, Pelco and VIVOTEK. Anyone can join the alliance, which is growing rapidly and gaining traction as the Internet of Things (IoT) expands. OSSA’s plan is to build a common standardised platform for security and safety solutions OSSA members could be found throughout the recent ISC West show in Las Vegas, and a social event after hours at the show brought them together and set the tone for development to come. A Technology Stack “We want to create an ecosystem, define a common market approach and open new market opportunities,” says Johan Jubbega, OSSA President. “We want to go from a product business to a platform business. It’s better for us and better for the end-users.” OSSA seeks to develop a specification for a common Technology Stack to cater to innovation and reduce fragmentation within the security and safety market, according to OSSA. Its mission is complementary to organisations like ONVIF. Video information and low friction The video surveillance industry creates vast amounts of information in the form of video, but typically less than 1 percent of that data is used by today’s video surveillance systems – think about that one or two frames of video among thousands that might be used to solve a crime, for example. The rest of the data remains unused, and yet the potential value of the data is huge. OSSA seeks to create a platform to leverage the value of the data. “If we don’t unlock that value in our industry, someone will do it for us,” says Jubbega. OSSA is developing a vendor-agnostic operating system that simplifies low-level device integration and standardises elements such as cybersecurity and security update patches Among the important elements in developing the platform are to create a level of trust among all the stakeholders involved, and to lower the ‘friction’ involved in participating in the platform. “We want to make it easy and fun to do business with anyone who joins the platform,” says Jubbega. “By taking away the friction, we will create scalability.” System-on-chip Development of customisable system-on-chip (SoC) components in today’s video cameras provide the capacity to host a variety of ‘apps’ to expand system functionality and leverage the value of data. OSSA is developing a vendor-agnostic operating system that simplifies low-level device integration and standardises elements such as cybersecurity and security update patches. Building on top of that operating system, vendors can create new levels of differentiation. “Our purpose is to start from a common business model to spur innovation and add value for users,” according to OSSA. Cybersecurity and data protection SAST is creating the operating system and setting up the IoT infrastructure to make apps available Simply speaking, app developers can use the standard operating system to build new functionalities that can easily be ‘loaded’ on cameras and sold in an ‘app store’ scenario. Security and Safety Things (SAST), a Bosch startup and member of OSSA, is creating the operating system and setting up the IoT infrastructure to make the apps available. Development of these elements is happening concurrently with the evolution of OSSA. “We offer you an opportunity to come with us on this journey,” Jubbega told attendees at the ISC West social event. “We want to have a common approach to tackling cybersecurity and data protection – to raise the bar in the industry. You can still differentiate, but from a higher base.” OSSA members who exhibited at ISC West included Anixter Inc., Bosch Building Technologies, Hanwha Techwin, Milestone Systems, NetApp Inc., Pelco, SAST, Socionext Inc., United Technologies and VIVOTEK Inc.
NEC Corporation has announced that NEC Technologies India (NECTI), a pioneer in the integration of IT and network technologies, has partnered with the Centre for Development of Advanced Computing (C-DAC) to deploy its industry-leading automated fingerprint identification system (AFIS) for the Kerala State Police in India. The new AFIS will be used by the Kerala State Police to match unknown fingerprints against a central database of known fingerprints for criminal investigation. More than 600 police/enforcement facilities across the state, including police stations and the district police headquarters, will have access to the system for verification and new registration of fingerprints. Faster and accurate fingerprint verification The new system is able to enhance the quality of fragmented fingerprints captured at crime scenesThis new system will help state police accelerate investigations more efficiently by providing a faster and more accurate fingerprint verification. The new system is able to enhance the quality of fragmented fingerprints captured at crime scenes and makes it possible to match the prints against the central database. NEC's AFIS boasts the world's no. 1 authentication accuracy and is a core technology of the company's portfolio of leading biometric solutions, ‘Bio-Idiom’. Mr. Takayuki Inaba, Managing Director, NECTI, said, "NEC has always been at the forefront of public safety. As a world leader in biometrics technologies, we are delighted to be working with C-DAC and the Kerala State Police to implement a new fingerprint recognition infrastructure, and are committed to building safer and smarter cities in India."
A boiler business subjected to hundreds of thousands of pounds of theft has installed Palisade fencing, electric doors and barriers to combat the threat. Perimeter security specialists Fieg Access Systems (FAS Ltd) of Madeley have beefed up protection at the victimised business on recommendations made by security consultant John Bracewell. He recommended Palisade fencing from Wolverhampton steel fencing manufacturer Zaun Ltd, the first panels of which were delivered within a week. Bracewell said: “Their service was excellent; their product is always top quality; and their lead times and delivery were great – and the combination of measures should drive the thieves away.” Uncompromised site security Zaun’s Palisade fencing comes with either ‘D’ or ‘W’ and with three different pale head options – triple point, round and notched and single point – in heights from 1.2m to 3.6m. Palisade fencing panels can be easily raked to follow the undulations of the site without compromising the rigidity of the system or the security of the site. Zaun is the sole remaining manufacturer of Palisade, welded and woven mesh fencing systems that manufactures the entire system in the UK. FAS Ltd was initially set up to provide the end user with a repair and service provider of perimeter security and access control equipment. The business now fabricates its own gates and supplementary equipment from a factory in Madeley, Telford.
South Africa’s Athlone Campus is home to the Western Cape College of Nursing, a sprawling complex of lecture halls, administration blocks and four hostels that house around 2000 nursing students. Gallagher Command Centre was chosen as the most effective system to manage access to the hostels and keep the students safe. The nursing college had no method of limiting access to its hostels. People came and went as they liked, there was no record of who was on site and it was difficult to enforce visitor hours. Theft was a problem and reported cases of sexual assault had become a major concern. Access needed to be more secure. Access control system for authorised entry Biometric fingerprint readers were mounted on turnstiles at each of the hostel entrances and exits to manage general accessSafety and security are essential to providing a healthy living and learning environment for students. Athlone Campus partnered with local security solutions provider, FS Systems, to install access control and video surveillance in its hostels. Gallagher Command Centre was chosen to manage the access control system, monitoring access points and allowing only authorised students, staff and visitors to enter the hostel buildings. Biometric fingerprint readers were mounted on full-height turnstiles at each of the hostel entrances and exits to manage general access. Fingerprint readers prevent unauthorised entry from people using lost or loaned cards, and the anti-passback measures built into Command Centre means students can’t ‘pass in’ a visitor or bypass the system, as it recognises and records that someone has tried to enter twice. Integrated visitor management system Gallagher’s integrated visitor management system now monitors visitors and allows the college to control visiting hours. Visitors to the college hostels must register at reception and have their fingerprint captured by the visitor management system. They are then granted access to only the hostel they are visiting. In the evening, the system generates an alarm and reports on visitors still on site – allowing security to ask people to leave and prevent further visitors from entering. The general feeling from students and staff is that they are more secure" Jason Adams, Cost and Estimating Manager for FS Systems says, “The general feeling from students and staff is that they are more secure knowing that everyone entering the facility has gone through some sort of screening or registration process at the security office. The presence of physical security barriers (full-height turnstiles) is reassuring, in that not just any person can gain entry without the necessary authorisation.” Installation of video surveillance solution Alongside access control, the college installed a comprehensive video surveillance solution to reduce incidents of violence, vandalism and crime. The entire video management system is seamlessly integrated with Command Centre, creating one easily managed security solution to track student, staff and visitor movements and ensure that when an incident does occur, security staff are quickly informed and able to respond effectively. “It’s essential for the system to be user-friendly and easy to operate and manage,” says Jason. “The detailed maps that appear onscreen with Gallagher Command Centre clearly indicate the location of alarms and give security staff the ability to respond more quickly to emergencies.” Using Gallagher Command Centre, the nursing college now has a powerful and versatile security system that meets the unique needs of its site. Reduction in criminal activity The college has achieved significant cost savings through the prevention of vandalismThe system provides a reliable way to clearly capture data to monitor students, staff and visitors, lower criminal activity and improve onsite safety. In particular, security personnel can easily find the right information for quick incident resolution, which has led to improved processes, procedures and convictions when necessary. The college has also achieved significant cost savings through the prevention of vandalism and a significant reduction in reported cases of theft. The combination of the new access control system and an increase in physical security barriers means they have also been able to decrease the number of security guards patrolling the facility, reducing overhead costs. Customising and generating reports for college management is also a straightforward task, saving time and money. Most importantly, Gallagher’s security solution has given Western Cape College of Nursing control of who is on site and when – allowing its students to be safe, secure and focussed on learning.
Senstar, global provider of video management solutions and perimeter intrusion detection systems, has published a case study detailing how its Senstar Symphony video management system (VMS) and video analytics are helping Ferretería Ochoa secure spaces and gather business intelligence. Senstar Symphony VMS Ferretería Ochoa is a hardware and home improvement retail chain that has been operating in the Dominican Republic for over 45 years. Symphony was first installed at one of its retail stores in 2013 and is now being used at six locations, including a storage facility and a manufacturing facility. Ferretería Ochoa also uses several of Senstar’s video analytics to better understand customer and employee behavior. One of the main benefits Symphony has provided Ferretería Ochoa is increased inventory control One of the main benefits Symphony has provided Ferretería Ochoa is increased inventory control. This not only refers to shoplifting by customers, but also to errors – accidental or intentional – made during shipping and receiving. Employees are aware they are being monitored at all times and understand the system’s ability to capture incidents and provide proof. Central video monitoring “It dissuades deceitful and malicious situations such as shipping more items than ordered or a more expensive item,” said Mr. Gomez. “The deterrence factor Symphony provides is probably the most important result we have achieved.” Symphony has also enabled Ferretería Ochoa to utilise security personnel more efficiently and has reduced costs by having video from all sites managed from one central location. Retail security “Senstar Symphony and analytics are ideal for retailers looking to deter theft, protect staff and customers and improve the overall customer experience,” said Senstar’s Director, North America Business Development Anthony Hackett. “We are happy to be helping Ferretería Ochoa achieve such results.”
With a population of more than 40,000, the City of Linden, New Jersey is part of the New York Metropolitan Area. It is located 13 miles southwest of Manhattan and borders Staten Island. In an effort to improve public safety and reduce crime, the city decided to modernise its video surveillance system. The City of Linden (the City) had more than 150 outdated, analogue cameras deployed throughout its buildings and parks. These consisted of an assortment of off-brand devices that lacked sufficient resolution, speed, and frame rates. To provide the highest quality video, the City decided to invest in a new citywide IP camera system. Purpose of video surveillance system Moving to IP cameras would require the City to increase its bandwidth capacity and upgrade its network video recorders (NVRs) to a more efficient, reliable, and secure video storage solution. This video surveillance system would need to: Support megapixel camera quality Be deployed at the network’s edge in various City buildings Stream video back to City Hall yet not be a burden on costs or bandwidth Be secure, simple to deploy, and easily expandable Work with world-class IP cameras and video management systems The City’s Department of Public Safety, led by the Police Department, oversaw the project. They hired Eastern Datacomm, a highly recommended system integrator out of Hackensack, New Jersey, to manage the entire project, from the installation of fibre lines for Internet to deploying the IP cameras and video surveillance appliances. Extra layer of security for clients Razberi makes it simple to manage and secure video surveillance and network-connected device solutionsOne reason the City of Linden chose Eastern Datacomm is because it has standardised on Razberi Technologies video surveillance appliances and software for all installations, providing an extra layer of security for its clients. Razberi makes it simple to manage and secure video surveillance and network-connected device solutions. Razberi appliances are highly reliable and network-optimised for megapixel quality. With the ability to record at the network’s edge and centrally, the Razberi suite of appliances also provide the flexibility that the City requires. A one-click VLAN setup establishes a private, secure network for camera traffic. Razberi’s intelligent video solutions are rightsized for the application including data centre, edge/fog, and rugged applications along with the ability to add cybersecurity protections. The appliances are also open to work with world-class video management solutions (VMS) and IP cameras. Built-in Razberi Monitor health monitoring software ensures the video surveillance system – all the way to each camera – is operating 24x7 without video loss or disruption. Installation of 250 IP cameras A Razberi EndpointDefender appliance is integrated with each Core device to provide Power over Ethernet+ (PoE+)Today, the City of Linden has more than 250 Panasonic IP cameras deployed across 13 locations. The main site is City Hall, which includes the Police Department. Cameras are also installed in four fire houses, two youth centres, the library, and various points around the train station and parking lot. At City Hall, Eastern Datacomm installed four Razberi Core appliances. These robust, server-class appliances centrally record heavier video surveillance workloads. This enables the City to be in compliance with the State of New Jersey’s retention law, which mandates that municipal video recordings be kept for 90 days. In addition, a Razberi EndpointDefender appliance is integrated with each Core device to provide Power over Ethernet+ (PoE+). EndpointDefender includes the Razberi CameraDefense cybersecurity software solution, should the City need it in the future. This extends industry best practice cyber protections all the way to the camera or Internet of Things (IoT) endpoint. ServerSwitchIQ edge appliances The ServerSwitchIQ’s compact size and ease of deployment worked for the City’s remote outdoor security camera locationsIn the City’s other buildings, the integrator deployed 12 Razberi ServerSwitchIQ edge appliances. More than an NVR, these devices combine a PoE+ switch, server, storage, and intelligence. By recording video near the network’s edge closer to the cameras, the appliances enable City workers at each location to monitor and play back video when needed. There is no need to constantly stream video back to City Hall, which reduces the impact of megapixel cameras on the network. The ServerSwitchIQ’s compact size and ease of deployment also worked for the City’s remote outdoor security camera locations. Each is small enough to fit into telco rooms under lock and key while handling the amount of cameras required. The City did not have to deploy servers, cabinets, and other equipment traditionally used for video surveillance systems. Eastern Datacomm monitors the video surveillance system via the Razberi Monitor software, which provides automated, real-time collection of system component properties and status such as storage disks, CPU Temperature, RAID arrays, and network traffic. With 24x7 monitoring and alerts, especially if a camera fails or goes down, Eastern Datacomm can take corrective action immediately. Reducing crime and enhancing quality of life The system is enabling the Police department to fulfil our mission to reduce crime, improve the delivery of Police services"“Our upgraded video surveillance system with the IP cameras and Razberi appliances gives the City of Linden one of the most state-of-the-art video surveillance systems in the country,” said David Hart, Chief of Police, City of Linden Police Department. “The system is enabling the Police department to fulfil our mission to reduce crime, improve the delivery of Police services, and enhance the quality of life for Linden residents. We have already solved some criminal cases using the security system with its reliable, high-quality video footage.” The City of Linden anticipates adding more cameras over time. They are working on a five-year plan to put more cameras in their 39 parks and other buildings. Each Razberi appliance can accommodate up to 24 IP cameras, making the system easily expandable.
Police forces recognise biometrics as a potentially critical tool to improving the quality and efficiency of policing across the globe. As part of a diverse Digital Authentication strategy, automated facial recognition surveillance is becoming an integral part of our digital policing, with the UK Home Office planning to invest a huge £97 million into a broader biometric technology approach to safeguard our streets. Automated facial recognition surveillance Digital fingerprint-based authentication is still widely regarded as having a higher level of maturity However, the latest court case against the South Wales Police as well as the Amazon backlash over the sale of its technology to the US police has highlighted that acceptance of the use of biometric technology as much as the maturing of the technology is important to achieve the expected benefits for the police. Digital fingerprint-based authentication is still widely regarded as having a higher level of maturity, has an implicit acceptance linked to the identity of the individual and delivers a lower false positive result. Facial recognition, when used as a stand-alone biometric, suffers from the risk of challenge or refusal to accept as in the case of the challenge to the South Wales Police pilot program. In addition, gender and racial bias as well as scenarios such as poor lighting and individuals wearing accessories impacts on reliability. Advancements in biometrics There is clearly a need to focus on how biometrics, as technology matures, can support identity verification at scale and to gain widespread public acceptance as part of a wider digital policing initiative according to Jason Tooley, Chief Revenue Officer at Veridium. Jason comments: “Police forces around the world are looking to integrate the latest advancements in technology to enhance public security and cut costs, and biometric solutions are integral to this movement. With the maturing of biometrics techniques and many different scenarios to address, it’s imperative to use the right biometrics for the right requirements and to create a strategy that facilitates the use of multiple biometrics. We would advocate an approach that abstracts the identity verification and digital authentication processes from the services and creates a biometric platform to match the specific requirements of the police and the public.” Fingerprint recognition Fingerprint, being the most mature and widely used biometrics, has high levels of acceptance today" He adds, “There are current barriers to the acceptance of biometrics which will be overcome as trust in the technology becomes the norm. Fingerprint, being the most mature and widely used has high levels of acceptance today and is easily adopted by police and public. It requires public acceptance and doesn’t work for wider surveillance techniques but for individual verification, police moving to a digital fingerprint capture mechanism rather than physical has great benefits and the public are more likely to be accepting of enrolment. Facial recognition would be a surveillance at scale solution but the challenges of maturity and external factors as well as public acceptance are challenges to be overcome in the future.” Jason continues, “It is imperative for police forces to take a strategic approach as they trial biometric technologies, and not solely focus on a single biometric approach. With the rapid rate of innovation in the field, an open biometric strategy that delivers the ability for the police to use the right biometric techniques for the right requirements will accelerate the benefits associated with digital policing and achieve public acceptance by linking the strategy to ease of adoption.”
Round table discussion
Statistically speaking, incidents of terrorism are unlikely to impact most businesses and institutions. However, the mere possibility of worst-case-scenario attacks is enough to keep security professionals awake at night. Compounding the collective anxiety is the minute-by-minute media coverage when an attack does occur. The immediacy of the shared experience of global tragedy impacts us all – including security system decision-makers. We asked this week’s Expert Panel Roundtable: How is the rise in terrorism impacting the physical security market?
When security topics become a part of current events, it is usually in a negative light. Security generally only becomes news when it fails, sometimes in a dramatic, high profile and tragic way. However, security failures can also shed light on lessons learned and opportunities to improve. Working toward better security can translate into the purchase of more goods and equipment supplied by our market. For additional insights into the intersection of security and current events, we asked this week’s Expert Panel Roundtable: Good news or bad news? How do news reports and/or current events influence the general public’s opinion of physical security?
There is no expectation of privacy in a public space. That’s the premise on which most video surveillance applications are justified. But new concerns about privacy, specifically the General Data Protection Regulation (GDPR) in Europe, are changing expectations. And what if a camera must be positioned where a private area happens to be within its range? Fortunately, there are technology approaches to solving these dilemmas, as our Expert Panellists explain. We asked: What new technologies are helping video systems overcome concerns about privacy?