“Normally when we talk about trends and the future, we are actually thinking more about the present. The reason we are keen on understanding trends is because we want to know how they will affect our current business and how we should act now to avoid being outdated.”
Significant changes have shaped the security industry during the last decade, and more exciting innovations should be expected in the 2020s. Emerging technologies and applications, such as multi-dimensional perception, UHD, low light imaging, artificial intelligence, and cloud technology, open new possibilities for the security industry. At the same time, millions of cameras and other security devices are being connected into networks, making the security industry a very important part of the future IoT world.
Hikvision shares their thoughts on a few key trends that will affect the security industry in 2020, and probably even longer into the future.
Video cameras integrated with centimetre and millimetre wave radars are becoming popular in object detection
For security cameras, image capturing simulates the sense of sight, extending the power of people’s “eyes.” But what if security cameras could use other kinds of “senses,” like “hearing,” “smelling,” or even detections that are beyond visual range, to identify and respond to incidents? For example, video cameras integrated with centimetre and millimetre wave radars are becoming popular in object detection. With deep integration of radar and video, a multi-dimensional camera extends perception beyond visual range to improve the detection of objects and movement tracking, up to a distance of 100 meters and in any weather.
Another approach is the integrated automobile horn-detection camera. Equipped with sonar arrays, this camera can precisely detect and locate the source of a vehicle’s horn, while identifying the vehicle and generating photos and videos of the event as evidence. This ability can help reduce noise pollution on roadways and in communities with rules against the unnecessary use of horns.
More “senses,” like smoke detection, heat detection, or even pressure detection, can be embedded in cameras to precisely monitor and report events or incidents. The multi-dimensional perception trend will powerfully shape security systems and endow them with more capabilities to create safety in the near future.
The computing power of security cameras has been enhanced greatly with the increased performance of AI chips
Artificial intelligence applications have been slowly emerging in the security industry for many years already, but most AI-powered security cameras can only run a single algorithm because of the limitation of computing power, which means they can incorporate only one intelligent function at a time, counting people or counting cars, for example.
Now, the computing power of security cameras has been enhanced greatly with the increased performance of AI chips. Multi-intelligence technology will be the trend for the next generation of AI-empowered cameras as several intelligent tasks will be accomplished by one camera. Vehicle intersections can be used as an example. In many cities one can see ten or more cameras installed at intersections to detect traffic flow, to identify violations, to detect vehicle types and license plate numbers, protect sidewalks, and so on.
But now, with multi-intelligence cameras, two or three cameras will be enough for an intersection. Since fewer cameras will be equipped for one application scenario, the cost of equipment, installation and maintenance and management will all be reduced. Moreover, scenario-defined cameras will become common as manufacturers can insert different algorithms into security cameras according to specific application scenarios, allowing customers to choose customised functions for their needs.
Proactive and comprehensive security systems
Proactive video analysis enables deployment of valuable comprehensive security systems
Merely reactive CCTV systems will no longer meet the demands of security operations teams as they are often looking for new opportunities to enhance their operational efficiency. Many customers are now asking for proactive and comprehensive security systems that combine CCTV monitoring, alarm systems, access control, and even fire protection.
With the development of AI technology, monitoring processes of CCTV systems are becoming more automated by analysing live and recorded video to detect, classify and track predefined objects. These processes can be especially effective in proactively identifying events as they happen and extracting information instantly from recorded video.
Meanwhile, proactive and intelligent video analysis enables deployment of valuable comprehensive security systems and improves the return on investment for integration of CCTV and non-CCTV systems. For example, now, when a camera detects an incident, a linkage will trigger the alarm system automatically, telling security personnel to check the surveillance camera live feed. Conversely, when alarm, access control or fire protection systems report an incident, the CCTV system will be activated to verify what actually happened. Digital transformation to increase productivity is a business imperative for most organizations nowadays, and proactive and comprehensive security systems will be the direction for security operations to increase their efficiency and value.
UHD is benefiting from improvements in transmission and encoding technologies
People want to see more and see with more clarity; thus pursuing ever higher image resolution has been a key driving force in the development of security industry technology. After the HD era, the Ultra High Definition (UHD) era will be the natural next step. UHD used to mean “expensive cost”, but now UHD is benefiting from improvements in transmission and encoding technologies. It is becoming more and more cost-effective for large-scale use in the security industry, from entry levels to the top.
With greater bandwidth and lower latency transmission technology, the smooth transmission of UHD images is becoming possible, and widespread adoption of 4K and 8K resolution cameras will meet real opportunities.
Furthermore, continuously optimised encoding technology, which is vastly decreasing the bitrate of video, is another stimulus for UHD applications in the security industry. As the bitrate of recorded footage is greatly reduced, bandwidth and storage costs are reduced as well.
Visibility, any time and any condition
Low light imaging technologies have become more and more popular in the security industry
Most security incidents happen at night, but images and footage from conventional security cameras may easily lose colours and critical details in ultra-low light environments. Low light imaging technologies have become more and more popular in the security industry, enhancing the visibility of objects for identifying details at any time and in any condition.
Another important innovation is thermal imaging, which can detect the heat information of any object with a temperature above absolute zero. Taking advantage of heat zone imaging, thermal imaging technology allows cameras to “see” in low-visibility conditions, such as fog, smog, rain, and snow, even at night. And thermal cameras have huge potentials in various applications, like perimeter defence, fire detection and temperature measurement.
Moving to the cloud
As mentioned at the beginning, more security devices, including cameras, are being connected over the Internet, making them parts of the IoT world. Thus, “moving to the cloud” has been a focus for the security industry, especially for video surveillance operations. Why are people enthusiastic about the cloud? It’s because cloud services can bring vast benefits in efficiency, flexibility, cost-effectiveness, and security.
Among security operations, video surveillance as a Service (VSaaS) has been a major trend in the security industry as it is an ideal choice for small and medium-sized businesses to move their video-based security systems to the cloud. It is a technology to host the hardware and software of security operations in the cloud, so that users can access their IP cameras and IoT devices and check video footage or alarm linkage from anywhere. Since no on-site server installation and system configuration is needed, it is often more convenient than traditional video surveillance solutions. On the cloud, users can distribute costs over a contract term and pay for exactly and only the services that are used.
With VSaaS, system integrators are able to provide services for their clients using the cloud
For enterprises running chain stores, demands on VSaaS are increasing greatly. Moving video surveillance services to the cloud, these businesses can quickly and economically centralize their security operations and remotely check the status of their stores. To greet the “moving to the cloud” trend, security system integrators are also taking hold of VSaaS as it is a good chance to strengthen their business models. With VSaaS, system integrators are able to provide services for their clients using the cloud, such as system checks and remote maintenance, and consistently scale their business with efficiency.
Higher demands on cybersecurity
With millions of security devices being connected in IoT, security systems are evolving from single and isolated to open and connected. People are getting more and more concerned about the security of their data and privacy, and accordingly have set higher demands for the security industry on cybersecurity.
To help minimise the risk of security breaches, a multi-layered approach, including network, application, and device layering, that addresses a full range of cybersecurity threats concurrently will be demanded and expected by security organisations and IT departments. Security manufacturers, will also have to cover the security of their products throughout the whole lifecycle.
5G, big data affect the industry
Just as 2020 is the beginning of a new decade, we expect to see a new decade of innovation in technologies and applications. Along with the prominent security industry trends mentioned above, other trends such as 5G, big data, smart enterprise operations, and stricter data protection regulations like EU’s GDPR, might also greatly affect the industry in the 2020s.
A new whitepaper published recently details market analysis of attitudes towards cloud adoption and purchasing behaviours behind hosted physical security from 1000 IT decision makers from across Europe. The in-depth survey, undertaken by Morphean, a provider of hosted security solutions, illustrates a market that has overcome initial concerns about cyber-security, has understood the clear benefits and will be seeking to adopt such solutions at pace in 2020.
The independent survey of key decision makers within companies from UK, France and Germany with more than 50 employees clearly shows better security, cost benefit and better functionality to be the most influential factors and the most commonly realised benefits of hosted security solutions including video surveillance as-a-service (VSaaS) and access control as-a-service (ACaaS).
Hosted security solution
It revealed that 84% of IT managers are currently using (48%) or considering using (36%) a hosted security solution
These solutions are part of a cloud security market that is expected to grow from USD 4.1 billion in 2017 to USD 12.7 billion by 2022, at a CAGR of 25.5%. The ‘2019 Landscape Report: Hosted Security adoption in Europe’ is the second study of its kind by Morphean, and facilitates a better understanding of market trends with comparative data from 2018.
It revealed that 84% of IT managers are currently using (48%) or considering using (36%) a hosted security solution, which is broadly consistent with the 89% who said they would consider such a solution last year. It also shows that better security ranked #3 among the main benefits realised by the cloud (44%) compared to 27% in 2018; representing a 63% increase in the year and shift in perception around cyber security concerns.
Key survey findings
2019 key survey findings include:
Better security, cost benefit and better functionality are viewed as the most influential factors AND the most commonly realised benefits of hosted security solutions
Half of respondents cited better security as the #1 benefit of using VSaaS / ACaaS; better functionality (42%) and cost benefits (38%) placed #2 and #3 respectively
Half of IT managers have identified data / information security as a priority for improvement in the next 12 months
84% of IT managers are currently using (48%) or considering using (36%) a cloud-based video surveillance or access control solution
Of those still considering VSaaS and ACaaS, 79% anticipate introducing these solutions to their business within 12 months
77% of IT managers report that physical security is not optimised; 20% have identified physical security as a priority for improvement in the next 12 months
Potential business intelligence benefits
The increased appetite for hosted security presents an opportunity for us to work with businesses"
Rodrigue Zbinden, CEO, Morphean SA reflected on the study: “Our research clearly points to a market that is overcoming initial concerns about cybersecurity, understands the clear benefits of hosted services and reflects growing confidence and purchase intent for 2020. The increased appetite for hosted security presents an opportunity for us to work with businesses to help them improve their physical security, while also educating them on the potential business intelligence benefits offered by surveillance and access control solutions when integrated in the cloud.”
The growing confidence in cloud seems to translate into more positive purchasing intentions around hosted security solutions with 77% of IT managers reporting that physical security is not currently optimised and one in five identifying it as a priority for 2020. Of those considering hosted security solutions, 4 in 5 (79%) anticipate introducing them to their business within a year.
Cloud-enabled security solutions
While this clearly represents an opportunity for the IT reseller community to enhance its service offering, the report does highlight two trends that may inhibit growth; the first being the physical security industry’s ability to adopt the as-a-service business model; the second is system integration with emergent technology such as AI.
With cloud technology we have a toolset that changes the way businesses think and act"
Alex Hilton, CEO of The Cloud Industry Forum added, “With cloud technology we have a toolset that changes the way businesses think and act, ensuring a competitive landscape for years to come. Morphean’s latest research reveals that decision makers are seeing better security, cost benefits and improved functionality as a result of a switch to cloud-enabled security solutions. Cloud presents very real opportunities, but vendors need to hone their offerings and capabilities in order for its full potential to be realised across all markets and sectors.”
Driving operational performance
The Morphean survey also found that there has been a 5% drop in cloud investment over the past year. In 2018, 33% of the IT budget was spent on cloud services over the previous 24 months and this figure has dropped to 31.38% for 2019.
This is in spite of the fact that the majority of respondents (78%) had said that they expected cloud related spending to increase due to the favourable benefits it presents. It’s not the only contradiction found in the report. Cloud is key to driving operational performance, and yet 78% of IT managers felt that this area of the business was underperforming while only 36% identified it as a priority for improvement.
MOBOTIX has been awarded ‘Secure by Default’ certification in the UK. The certification for the new MOBOTIX 7 platform includes the new IP video system M73, launched at the MOBOTIX Global Partner Conference in October 2019, as well as the Mx6 product line.
This highlights MOBOTIX’ ongoing focus on cyber security and privacy protection. MOBOTIX has been approved based on the 12 Guiding Principles of the Surveillance Camera Commissioner. The company is now globally enabled to use the official ‘Secure by Default’ logo.
Cyber-secure surveillance camera products
Many congratulations to MOBOTIX AG in self-certifying their products as ‘secure by default’"
Self-certification allows manufacturers of surveillance camera devices and components to clearly demonstrate that their products meet requirements that ensure they are secure by default. The requirements are an important step forward in providing the best possible assurance for stakeholders that products aren’t vulnerable to cyberattacks.
“Many congratulations to MOBOTIX AG in self-certifying their products as ‘secure by default’” highlights Tony Porter, Surveillance Camera Commissioner. “The certification mark demonstrates to customers and stakeholders alike that the products listed on my website meet the new minimum requirements I expect in terms of cyber-secure surveillance camera products. It’s great that we have a number of proactive manufacturers like MOBOTIX AG leading the way toward a common goal to develop products that to mitigate potential cyber-threats.”
Surveillance camera systems
Several high profile and well publicised compromises of systems were left in an unacceptable security configuration. Some of these compromises also showed the root cause of cyberattacks was down to poor design and manufacturing.
Driven by the need to ensure the UK’s resilience against this and other forms of cyber security vulnerability
Driven by the need to ensure the UK’s resilience against this and other forms of cyber security vulnerability, as well as to provide the best possible assurance to stakeholders, the requirements are an important step forward for manufacturers, installers and users alike. Secure by Default highlights the conformity to the 12 Guiding Principles as part of the surveillance camera Code of Practice as well as the development and use of surveillance camera systems, of which MOBOTIX applies conform.
Developing solutions and strategy
Phillip Antoniou, Vice President Sales Europe South/West & MEAPAC of MOBOTIX underlines “We’re very proud to achieve the ‘Secure by Default’ certification, this demonstrates the commitment that we as MOBOTIX have towards Cyber Security. We recognise the existing and increasing concerns and as such will be further developing our solutions and strategy to address this.”
Recently, MOBOTIX has launched a free of charge Cactus Patch with latest firmware updates. With this continuous support, a stable and secure video system is sustained.
Member companies and representatives of the Open Security & Safety Alliance (OSSA) will be present at the INTERSEC 2020 show in Dubai next month. OSSA – an industry body comprised of leaders, influencers and innovative organisations from all facets within the security, safety and surveillance space – formed to help the industry focus on creating new value by reducing market fragmentation and addressing common challenges.
The aim is to bring together the industry to move forward together with one united, global approach to:
Create harmony across security and safety solutions focused on common Operating Systems and Application Programming Interfaces (API);
Drive the creation of one digital marketplace regardless of brand;
Define hardware and software measures to increase the levels of data security and privacy protection across brands;
Define specifications to ensure the right levels of performance
OSSA Technology Stack specification
In the first full year of existence, OSSA member companies by creating the first common Technology Stack specification
In the first full year of existence, OSSA member companies achieved a major component of the organisation’s vision by creating the first common Technology Stack specification including a vendor-agnostic Operating System (OS) hardened for the security and safety market. This first big step allows for installation and execution of third-party apps on video security devices. It enables app developers to develop one single software application that is suitable for all cameras leveraging OSSA’s Technology Stack, independent of brand.
The next steps in early 2020 are firstly for the OSSA-driven digital marketplace to go live and secondly for camera manufacturers to introduce their first commercial versions of products leveraging OSSA’s Technology Stack. The marketplace will give integrators and users the ability to easily add customised functionality to their cameras and security systems by way of installing apps (already developed by the early adopters and available at the launch of the marketplace) on video security cameras. It’s expected additional app developers will soon contribute solutions downloadable across devices and brands.
INTERSEC Dubai 2020
From INTERSEC, some OSSA member companies will showcase prototype cameras based on OSSA’s commonly defined Technology Stack. Visitors can learn more about the vision of OSSA, its progress and how involved companies are revolutionising the market, by visiting the Hanwha Techwin booth and enquiring with one of the OSSA representatives.
It seems that only a few days pass between cyber security stories of concern to the public such as personal data leaks and DIY home camera hacks. With this in mind and the need for increased connectivity, the industry is in need for guidance in cyber security. 2020 is set to be a year of change for the physical security industry. Here are the top four predictions to stay head of market trends in the year ahead.
1. There will be more clarity for installers about industry-standard for cyber security
The professional security industry will next year see the launch of a new set of cybersecurity guidelines
Through the work being conducted by the BSIA Cyber Security Product Assurance Group (CySPAG), the professional security industry will next year see the launch of a new set of cybersecurity guidelines. This will provide the industry with the guidance and clarity that is currently missing.
A key area of clarification is the chain of responsibility. It is not just the responsibility of the manufacturer to keep everything secure from a cyber-perspective. The whole supply chain is responsible - once a product leaves the lab where they’re manufactured, conditions change. Those who maintain, install and operate the product have a shared responsibility to ensure that a product or system remains cyber secure.
As the sector develops and more cyber-enabled products become available to the market, this cyber security approach will become more important, and a key differentiator to the DIY market, which can only be a good thing.
2. Cloud and 4G connectivity are giving end-customers better physical security
The percentage of panels connected to cloud services is now increasing every year
Manufactures have been producing cloud-ready products for several years. Initially, not all installers had been taking advantage of benefits of cloud-connected panels, however the percentage of panels connected to cloud services is now increasing every year.
Trust and education have improved, meaning that installers and end-users have realised that connectivity is positive, enabling consumers to check on their properties remotely and allow installer to remotely support their customers.
However, one area of constraint has been the dependency on customers networks which may, or may not, offer the level of performance that a robust and resilient security system demands.
With the introduction of mobile data connectivity to connected products over the past few years, and as connectivity becomes more widespread across physical security products there will also be a greater shift toward mobile technologies such as 4G, either as a back up to a router connection or for complete network independence.
3. Connectivity is changing the way installers work
Installers are a vital part of the chain of when a new alarm system is fitted into a property
Installers are a vital part of the chain of when a new alarm system is fitted into a property, providing both installation and maintenance services. Traditionally maintenance activities have always been delivered on-site.
With the increased ease of connectivity for security systems and the advancements in how these systems are used, installers are provided further opportunity to enhance customer service around the delivery of maintenance.
It is no longer a requirement to have a customer wait until an engineer can attend a property to remedy a fault, as many can now be addressed within minutes from any location in the world.
This ability allows installation businesses to focus their engineers on more critical tasks while delivering an overall higher level of customer service. Indeed, some installation businesses are moving to a model of having dedicated remote support engineers in addition to the road-based team.
4. Manufacturers are ready for IP-only alarms, ahead of the 2025 analogue switch off
The PSTN switch off being conducted by BT and other service providers is due to be completed in 2025
The PSTN switch off being conducted by BT and other service providers is due to be completed in 2025 as part of the move to Next Generation Networks, ending the use of analogue phone lines and moves communications technology into an all IP-only space.
Although some service providers have indicated that there may be some type of initial PSTN simulation, those providers that are doing this are also making it clear that this is only a temporary solution. The switch off will be a huge change for the security industry.
Where heritage, analogue alarm systems are in use, installers will need to plan to reconfigure existing systems to use the temporary PSTN simulation functions (where available) or upgrade systems to an all IP solution.
Although 2025 feels a long way off, installers and end-users need to start planning now and taking the necessary action. In our sector, manufacturers are ready for IP-only alarms through the provision of cloud-based solutions and the use of techniques such as SIA IP for ARC monitoring.
As we surpass 2019, it’s high time we realise that by merging the digital and physical realm, IoT is destined to change the way we live and work.
I have always been interested in the intersection between business and technology, and today it seems that the brave new technological world we have been dreaming over centuries has arrived. With everything from home appliances to smart vehicles, portable devices are connected to the internet and exchange crucial data. According to the statistics, there are 26.66 billion IoT connected devices around the globe. Which statistically leaves every citizen of the world with at least 3 devices.
IoT in every day life
I must say the numbers are quite mind-boggling! And this leaves a lot of room for improvement by incorporating the Internet of Things in software development; whether it’s a mobile app or web.
According to the statistics, there are 26.66 billion IoT connected devices around the globe. Which statistically leaves every citizen of the world with at least 3 devicesIt may interest you to know that the Internet of Things has the potential to touch every domain and nearly every aspect of human life. According to sources, impact on IoT leads to:
By 2020, 50 billion devices are expected to connect to the internet
In 2015, 3.5 connected devices per person have now reached almost 7
8 billion mobile broadband access points by 2019
5 million IoT jobs by 202070 percent a year growth through 2018 in total sales of clothing and accessories incorporating computer technology, rising from $3 billion today to $42.5 billion
$3.3 trillion market for ‘Smart City’ applications and services by 2025
The impact of smart homes
Instead of saying the home is where our heart is; a home is where a bot is. However, IoT hasn’t entirely arrived in our homes. I mean, we are still required to order groceries the minute we run out of eggs and Greek yogurt. Slowly and steadily we are getting there; it seems the latest advancements in artificial intelligence and big data analytics will definitely work wonders for us.
Smart homes are no longer a dream project; we can soon expect everything to be governed by the “brain” or a central platform. Moreover, bots will be seen tackling a certain set of functions related to more difficult tasks, and lastly niche bots, in charge of single tasks such as vacuuming the house or addressing more complex duties like accounting, coaching or household managing. Tech giants, or should I call them current development frontrunners like Amazon, Google, Samsung and Apple are expected to come up with something nerve-cracking.
The benefits of IoT
Other than this, with IoT, you will be able to work smarter and not harder. Artificial intelligence and advanced analytics can help create a more intelligent work environment. For example, the right AC temperature in shared office spaces help us book the most convenient meeting room, and moreover, take into account the room preference by setting the right temperature, lighting, and can automatically restock office supplies.
This simply leads to:
More efficient office operations
Comfortable work environments
Consequently increased employee productivity
The dark side of the Internet of Things
The potential risks
Every technology indeed comes as a boom, but that doesn’t mean the grass will be greener on the other side. Furthermore, we will uncover how even after offering so much convenience why IoT poses so much risk. Like I said before, IoT can be integrated into anything from coffee machines to fitness watches leading to make our lives more convenient. But what happens if they turn bad? When being unwillingly infected or hacked, these blessings can certainly turn into huge threats.
IoT can be integrated into anything, leading to make our lives more convenient
Devices, systems and the lack of security
It may interest you to know that IoT devices can become bots that blindly follow commands to commit crimes as part of a botnet. What is a botnet, you may ask? Well, it is a network of infected devices that are mainly abused by the attacker to perform tasks such as carrying out DDoS attacks, Bitcoin mining and spreading spam emails. Mainly being used to carry out DDoS attacks and to mine for cryptocurrencies, these botnets have the potential to have a larger impact by making IoT devices do much more, such as send spam messages featuring dangerous malware. Botnets can also carry out click-jacking campaigns, distribute fake advertisements, and even worse, infect other IoT devices.
Botnets can also carry out click-jacking campaigns, distribute fake advertisements, and even worse, infect other IoT devices Much like most malware, botnets can be found on dark marketplaces. The source code can be purchased and leaked, depending on the type of service. In case, an IoT device is already infected, another bot can attempt to replace the infection with its code and in some cases also "repair" the security vulnerability. But most of the time it fails! No matter how innocent these proof-of-concept attacks may seem, one cannot deny the fact that IoT devices and systems aren’t properly secured. Hackers can easily gain control of them and cause complete chaos like never before.
Collecting information at a cost
But how much information can an IoT device collect? What I mean is that by hacking a webcam, one can see what they are pointed at without you even knowing it, smart TVs and personal assistants can pick up sound, and smart cars can give clues to whether or not someone is home. Honestly, the amount of information collected on these IoT devices cannot be determined at any cost. And with everything in the cloud, such information can be intercepted or rerouted to a malicious server and be abused if not properly secured.
The more we surround ourselves with IoT devices, the more motivation cybercriminals receive to target us! With the time passing by, let’s simply hope that connected device security will dramatically improve.
Look who’s talking about the top issues in the physical security industry in 2019. Our website’s Expert Panel Roundtable discussions in 2019 reflected some of the most timely and important topics in the industry.
The very most-clicked-on Expert Panel Roundtable discussion in 2019 was about the year before – reviewing what caused disruptions in 2018. The second most popular was about 2019, the year ahead. Other hot topics that made the Top-10 list of roundtable discussions included what makes a good security salesperson, the need for greater cybersecurity awareness, and how millennials are changing the industry.
Here is a roundup of the Top 10 Expert Panel Roundtable discussions posted in 2019, along with a “sound bite” from each discussion and links back to the full articles.
Thanks to everyone who contributed to Expert Panel Roundtable in 2019 (including the quotable panelists named and linked below).
1. What caused the most disruption in 2018 in the physical security space?
“The industry is in the midst of a dynamic technology revolution, and we are seeing increased use of security solutions that leverage machine-based learning, artificial intelligence, and robotics. This past year, the market embraced these emerging technologies, with a myriad of solutions now being embedded with these capabilities, including IP cameras, access control systems, security robots, and drones.” – Travis Deyle, Cobalt Robotics
2. What technology trend will have the biggest impact on physical security in 2019?
“IoT (Internet of Things) will continue to make us more efficient. We’re already seeing the increased integration of IoT devices into enterprise-level solutions. The rise in city-living is also putting pressure on infrastructure, so it will become increasingly important for the truly smart and safe city to move beyond a vision into reality.” – Jamie Barnfield, IDIS
3. What are the security challenges of hospitals and the healthcare industry?
“Preventing security incidents is a priority and a challenge for healthcare directors. Traditionally, the success of a healthcare facility’s safety program has been equated to the number of issues that warranted a response; though, the simple number of emergency responses is not helpful in preventing the same situations from occurring again.” – Julie Brown, Johnson Controls
4. What characteristics do salespeople require in the physical security industry?
“To be a good salesperson, you must understand each customer’s needs and help them solve their problems. In physical security, this need is typically some kind of risk mitigation – guarding themselves and their organisations against threats, danger and liability. This makes the conversation more fraught than if you were selling a business product such as lighting, HR software or insurance, since ultimately you are talking about people’s lives and livelihoods.” – Dave Whitis, Boon Edam
5. How does security technology make our schools safer?
“IP-based physical security solutions can help deliver safer environments so that students, staff, and faculty can focus on learning. Video surveillance provides a live and recorded visual representation of what’s happening across a school and can readily be called upon to access important information during an investigation. Electronic access control on doors and barriers not only regulates who goes where, but also provides protection for property and assets.” – Terry Schulenberg, Genetec
6. Is greater awareness helping to increase cybersecurity?
“On a daily basis, we hear of widely publicised cybersecurity incidents which affect our customer’s businesses, peace of mind, and assets. This new world is one the physical security industry has not been familiar with. What follows these well-publicised events is frustration and confusion, particularly for small and medium-sized businesses. Confusion then leads to application of ineffective security tools or, worse, inaction.” – Drew Alexander, STANLEY Security
7. What security markets are likely to embrace AI?
“Transportation seems to be the market that could benefit the most from embracing artificial intelligence. As it relates to people tracking, AI could single out deviating behavior, such as someone walking against the flow of rush-hour traffic, and in turn could initiate a real-time response so authorities can determine whether or not intervening is necessary.” – Per Björkdahl, ONVIF
8. How are Millennials changing the security industry?
“Over the last few years, we’ve seen the Millennial generation have a profound impact on the security industry, and this is largely due to the fact that those born in this time period have a very knowledgeable and in-depth experience with technology. Millennials are accustomed to smart devices, automation and at-your-fingertips accessibility, which has created new and unfamiliar demands when it comes to security systems and solutions.” – Ron Virden, ACRE
9. What are the mainstream uses for thermal cameras?
“Thermal cameras have been the go-to solution for perimeter protection applications for decades. This year, we’re seeing more integrations of thermal cameras with other solutions like radar to improve redundancy, long-range detection and alarm verification for airports and other large sites. Thanks to new technology partnerships and thermal offerings, customers are seeing the value of thermal beyond traditional use cases.” – Fredrik Wallberg, FLIR Systems
10. How do software improvements drive physical security?
“Software improvements ultimately drive greater interoperability among technology partners and system integration in physical security solutions. From a surveillance standpoint, software is also increasingly used to enhance system performance and overall longevity by identifying anomalies. For example, to ensure video data is preserved and not lost, customers are using health monitoring software on surveillance hard drives.” – Jessica Burton, Seagate Technology
Security’s intersection with consumer electronics is on view at CES 2020, the world’s largest technology event, Jan. 7-10 in Las Vegas. The giant show features more than 170,000 attendees, 4,500 exhibitors and 1,100 industry thought-leaders featured on the CES stage.
A range of technologies will be on display, from artificial intelligence (AI) to 5G, vehicle technology to AR/VR (augmented and virtual reality), robotics to home automation. Security plays a prominent role, too.The impact of this event for the smart home could be about delivering home analytics and enhancing privacy"
Smart home market on the forefront
The smart home market is a major focus. “For the smart home market at CES this year, we expect to see numerous announcements regarding home awareness,” says Blake Kozak, Senior Principal Analyst at IHS Markit. “This will include brands offering up additional analytics for consumer security cameras with a focus on edge-based solutions.”
“The impact of this [event] for the smart home could be about delivering home analytics and enhancing privacy through cloudless architectures and new electronic door lock approaches,” he adds. An example of cloud analytics is the Resideo Home app, introduced in December, which will make whole-home monitoring possible for four critical networks of the home – water, air, energy and security. Resideo promises a “simplified and integrated smart home experience.”
Video is also prominent at the show. “For cameras, we can expect to see more cameras focused on the outdoor space and possibly new form factors for video doorbells,” says Kozak. Familiar security industry brands exhibiting at CES 2020 include ADT, Ring, August Home and Yale (both part of ASSA ABLOY), Bosch and Alarm.com.
Focus on Cybersecurity
In 2020, companies will continue to focus on solutions for protecting consumer data"
Cybersecurity is an aspect of many of the devices on display at CES. “Device security and data privacy play a key role in the adoption of connected devices,” says Elizabeth Parks, President, Parks Associates.
“Consumer security concerns for smart home products will continue to be a barrier to adoption in the U.S. and Europe, and these concerns can actually intensify with device adoption-71% of U.S. smart home households are concerned about cybersecurity. In 2020, companies will continue to focus on solutions for protecting consumer data. One big area of interest is protection on the network router, providing whole home solutions, which are very appealing to consumers.”
“At CES we will see the traditional players introducing new DIY (do-it-yourself) products, as well as new players announcing new product features, services, and partnerships,” Parks adds.
Smart access control
Smart locks will be among the security products at CES 2020. For example, PassiveBolt, a lock company, will show the Shepherd Lock, a touch-enabled smart lock with enhanced security through sensors and AI. The add-on lock converts existing locksets into touch-activated devices. Another lock manufacturer is Kwikset, whose door locks and door hardware include Wi-Fi-enabled smart locks, Bluetooth-enabled smart locks, keyless and keyway-less locks and connected home technology.
Video doorbells, including industry-innovator Ring, have been a hit in the consumer market. At CES, Ring will expand the mission to make neighbourhoods safer by creating a “Ring of Security” around homes and communities with a suite of home security products and services. The “Neighbors by Ring” app enables affordable, complete, proactive home and neighbourhood security.
Homeguard offers a range of affordable CCTV solutions for home and small business
DIY CCTV demonstrations
DIY security systems are another market. Homeguard is a leading DIY consumer brand offering a range of affordable CCTV solutions for home and small business, including wired and wireless CCTV kits, smart cameras, home alarm systems and wire-free HD CCTV kits.
Swann Communications is also at the forefront of surveillance and monitoring with new products developments including wire-free HD cameras and doorbells, professional CCTV video surveillance systems, and 1080p full HD systems with “True Detect” heat and motion sensing.
AVTECH, and subsidiary YesGo Tech, will demonstrate a compact Wi-Fi home security set, a series of special cameras with face recognition, thermal detection and license plate recognition, customised central management software and a university ID tag that is compatible with access control, OEM and ODM opportunities.
Security and automation solutions
D-Link’s home networking, security and automation solutions will help consumers connect, view, share, entertain, work and play. SECO-LARM, manufacturer of a Room Occupancy Monitor that shows whether a room is in use, has a line of keypads and proximity readers with built-in Bluetooth for convenient access.
Another smart home security solutions provider, Climax Technology, integrates wireless security, home automation, energy management, home emergency monitoring and live visual monitoring.
Personal safety mobile application
Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens"
WaryMe designs and develops a personal safety mobile application to improve a user’s security in public places, schools, transports and companies by addressing major risks such as terrorism attacks, intrusion, fire and even industrial accidents. An all-in-one mobile application integrates alerting, crisis management and mass notification features.
“Market players are looking to expand beyond established smart home devices like smart thermostats and networked cameras to products like smart water leak detectors, smart pet feeders, and smart air purifiers,” says Elizabeth Parks. “Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens. This trend is part of a broader security marketing effort to extend the perimeter of home security beyond traditional home access points.”
“Familiarity with smart home devices lags behind familiarity with smart entertainment products; it even lags that of smart speakers, which are quite new in the market,” adds Parks. “In 2020, we will see players working to advance the visibility and marketing around device integration, and specifically focus on use case scenarios around safety, security, and convenience, which have always been the primary drivers of adoption of these types of products.”
Most customers interface with their financial institutions using automated teller machines (ATMs), which have security issues. However, there are solutions available to combat all current security threats, and the cost of protection is coming down. The ATM industry is therefore in a position to minimise losses, while ensuring consumers continue to get the vital cash they need to lead their daily lives. It is important for the ATM industry to constantly innovate to meet new security challenges. So what innovations are we going to see in the next five years?
Contactless technology will be a great help against ATM skimming, in which criminals steal personal information at ATM machines. Contactless is already being used in some European countries, and the number is increasing. Not having to insert a card into the ATM removes the opportunity to trap cards and also gets around the problem of “foreign” devices installed to read cards. So contactless technology, which some saw as the end of cash, can help make ATMs and cash more secure.
Data capture form to appear here!
Not having to insert a card into the ATM removes the opportunity to trap cards
Biometrics are certain to be used increasingly to bolster ATM security. Finger, palm, vein, iris and facial recognition all have potential in this respect. Any of these may in the future be used with or without cards, PINs and one-time codes. Speed of operation in relation to biometrics could ultimately govern their use at ATMs. There may also be privacy issues that need to be addressed.
The ATM vestibule environment must add security with proper security and surveillance equipment. ATM vestibules, or lobbies, are installed for many good reasons. For one, more convenient, 24/7 locations equals better customer retention for a bank, offering comfort and convenience. 24/7 access to ATMs, night drops, coin counters, online banking kiosks, and other self-service solutions are very much in demand. Second, ATM vestibules protect customers from inclement weather and provide a more comfortable banking environment (however, vagrancy can be an issue; therefore ATM vestibules should require card access). Security and surveillance solutions can’t just be for show.
ATMs and crime
A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands.
The common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands
The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and the United States. Rough estimates place the total amount of global losses at up to $60 million.
The protection of ATMs
ATMs in supermarkets and pharmacies tend to be targeted because they may not be as well-protected, and store personnel likely would not know who is authorised to work on the ATM. In contrast, anyone approaching an ATM at a bank location would be more likely to be challenged.
ATM jackpotting originated back in 2010 when Barnaby Jack, a New Zealand hacker and computer expert, demonstrated how he could exploit two ATMs and make them dispense cash on the stage at the Black Hat computer security conference in Las Vegas. Since then, malware has been created and made available on the “Dark Web” that can instruct an ATM to dispense all its cash on demand.
ATM jackpotting is a combination of a physical crime and a cyberattack
ATM jackpotting is a combination of a physical crime and a cyberattack. Typically, a criminal with a fake ID enters a grocery shop or pharmacy posing as an ATM technician, then uses a crowbar to open the top of the ATM – the “top hat” – to gain access to the personal computer that operates the machine.
Once he or she has access to the PC, they remove the hard drive, disable any anti-virus software, install a malware program, replace the hard drive and then reboot the computer. The whole operation takes about 30 seconds. The malware then enables the thief to remotely control the ATM and direct it to dispense all its cash on command.
If a legitimate customer approaches the machine in the meantime, it can operate as usual until activated otherwise by the malware.
Catch up on part one and part two of our banking security mini series.
It is an exciting time at German intelligent video company MOBOTIX, which has launched a next-generation platform that builds on their legacy of video at the edge while opening up the system to third-party partners that can build even more capabilities.
MOBOTIX unveiled the new M7 platform and M73 camera at the MOBOTIX Global Partner Conference in Mainz, Germany, in October. MOBOTIX M7 is a powerful, decentralised and secure modular IoT-video system based on deep learning modules. The feedback has been “overwhelming,” says MOBOTIX CEO Thomas Lausten. The new technology will also be featured in the United States at the 2020 MOBOTIX Partner Summit in Hollywood, Fla., in January.
A different video surveillance
"What you see is a different way of doing video surveillance,” says Lausten. “Our focus on the edge is the difference between us and other companies.”
The new MOBOTIX 7 open solution provides an “edge platform” that can be used for a variety of applications, which are provided as “apps” that leverage the platform’s hardware for specific uses, from object detection to face detection to people counting. The new M75 high-end camera incorporates the new platform.
The MOBOTIX application programming interface (API) makes it possible for hundreds more apps to be developed over time
Currently there are 19 apps available to empower various applications, and availability of the MOBOTIX application programming interface (API) makes it possible for hundreds more apps to be developed over time. If a MOBOTIX partner creates a new app for a specific project, “now he can use it not just for one project but can put it in the app store and sell it all over the world,” says MOBOTIX CTO Hartmut Sprave.
Field Programmable Gate Array
The new MOBOTIX platform uses Field Programmable Gate Array (FPGA) integrated circuits that provide flexibility and versatility to be adapted to a variety of needs, from deep learning, to higher resolution, or to use with a variety of sensors, such as color, black-and-white or night vision cameras, temperature sensors or microphones. “We can literally include any sensor requested by the market,” says Lausten.
The new camera can also be used for age analysis, crowd management or traffic analysis. It can even be used for fire or biohazard detection, incorporating thermal sensors and deep learning.
MOBOTIX have added to their legacy of video with a next generation platform
MOBOTIX developed its new platform in conjunction with Konica Minolta, which owns a majority share of the German manufacturer. The combined knowledge of the two companies created the new platform, with most of the engineering done in Germany. Konica Minolta provided an object detection algorithm, for example, and deep learning capabilities that are being used with the cameras. The two companies are also developing the business together. “They are rolling out our technology on their website throughout the world,” says Lausten. “We are basically part of a global development organisation.”
MOBOTIX developed its new platform in conjunction with Konica Minolta
The new platform is also completely compatible with legacy MOBOTIX systems: “We have added what we need to what we have,” says Lausten.
Cybersecurity is a top priority for MOBOTIX. “With our camera, everything is under our control, every single line of code, and we do all the penetration testing and everything is safe,” says Sprave. In fact, MOBOTIX won the French "Trophée de la Sécurité 2019" Gold Award in the cybersecurity category for the MOBOTIX Cactus Concept, which refers to the fact that all the modules in the MOBOTIX system have “digital thorns” that protect them from unauthorized access. End-to-end encryption is used with no blind spots.
Driven by cybersecurity
Stronger cybersecurity and a focus on edge devices makes MOBOTIX inherently more cybersecure than a system of networked low-cost cameras, each of which could present a possible cyber-vulnerability.
Stronger cybersecurity and a focus on edge devices makes MOBOTIX inherently more cybersecure
The flexibility of the MOBOTIX platform expands its utility beyond security to include broader business functions. For example, the same camera that can detect criminals with face recognition can track where people are moving in a retail store, and even analyse age or demographics of customers to track buying patterns.
“Cameras are required to think and process at the edge, and that is where we see a lot of focus going, driven by cybersecurity,” Lausten says.
Lausten sees opportunity for even faster growth in the U.S. market, where they already have 30 or 40 partners. In the near term, there will be large opportunities provided by the U.S. trend toward “Chinese skepticism,” and cybersecurity concerns that have plagued the lower-cost Chinese imports. MOBOTIX products are proudly “Made in Germany.”
HID Global, globally renowned provider of trusted identity solutions, has announced that the government of Argentina has selected its HID goID citizen identity technology to power the country’s digital version of its mandatory National Identity Document for its Mi Argentina app.
The collaborative effort between HID, Argentina’s Ministry of Interior, Public Works and Housing through the National Registry of Persons (Renaper), and the Ministry of Modernisation makes Argentina the first country in the world to offer a true national identity credential within a mobile app to its citizens. Currently, there are 47 million DNI cards in circulation and recent legislation has accorded full legal equivalence to the smartphone version of the card.
Mi Argentina app
The Mi Argentina app, which houses the National Identity Document, was developed by the Ministry of Modernisation and allows citizens who download the app on their mobile devices to request appointments, receive health information and access credentials, such as their drivers’ license. Powered by HID goID technology, citizens can also access their National Identity Document on a mobile device on the app while offline.
The Government of Argentina is leading the way in bringing the convenience and security of mobile identity to its citizens"
“The Government of Argentina is leading the way in bringing the convenience and security of mobile identity to its citizens,” said José D’Amico, director of Renaper, adding “This innovative application is not only easy to get, but we also believe this could be the first step in digitising identity across the government in Argentina and potentially other countries in years to come.”
Enhanced security of citizens’ mobile identity
Citizens with the ‘Mi Argentina’ app can initiate their request for a mobile ID by visiting a Renaper office, where their identity is verified and authenticated. Once approved, they receive an email with a code to activate their National Identity Document. In the event a smartphone is lost or stolen, credentials can be immediately revoked, safeguarding the citizen from potential identity theft.
The mobile ID is securely stored on the citizen’s smartphone, meaning it can still be accessed if the cell phone has no data plan or when connection to a network or Wi-Fi is not available. Storage on the phone brings additional security for the mobile ID ecosystem, as a channel back to the central database is never required.
Superior identity solutions
Renaper issues all citizens a National Identity Document at birth and requires two mandatory renewals: between the ages of 5 and 8, and at the age of 14. Adults are required to renew it every 15 years.
Argentina’s implementation of our technology provides its citizens with innovative ID access"
“HID Global is committed to providing identity solutions that meet the evolving standards of the 21st century,” said Jessica Westerouen van Meeteren, VP & Managing Director, Citizen Identity with HID Global. “The government of Argentina’s implementation of our technology provides its citizens with innovative ID access and the ease of a completely mobile experience from registration to issuance.”
Enhancing Border Security
The government of Argentina previously partnered with HID to upgrade the country’s ICAO electronic passport to a newer generation that was more cost efficient, improved security and enhanced data reading at border control checkpoints. The successful partnership was a key factor in the government’s decision to collaborate with HID Global and deploy the HID goID mobile identity solution.
The HID goID technology mobile ID ecosystem powers a more secure and connected world based on field-proven identity technology. It enables the issuance, lifecycle management and verification of mobile identities, and is a customisable solution that delivers many more functions than physical identity documents.
hagebau is an association of some 360 trading companies offering building products at more than 1700 locations across Europe. Employing around 500 staff, the Schneider group of companies has its headquarters in Erlstätt and runs 13 hagebaumarkt stores around Traunstein, most of them in the Upper Bavaria region.
Thousands of customers visit these stores every day to browse the wide range of products on offer. Busy day-to-day operations and a high turnover of goods pose significant challenges in terms of the safety of customers and employees, as well as on-site inventory protection.
Cybersafe and 100% GPDR-compliant
“Introducing digital solutions into our locations is one of our biggest challenges,” explains Martin Wohlmayer, Head of IT and Organisation at Jos. Schneider GmbH. “To do this, we need highly reliable solutions that are cybersafe and 100% GPDR-compliant.”
User rights can be assigned, meaning that access to the video material is 100% GDPR-compliant"
The in-store video surveillance system has an enormous amount to monitor on a daily basis. Theft, burglary and incidents in parking lots are just a few of the key sensitive issues. The company’s forward-looking strategy also means that any current investments need to be flexible, straightforward and expandable to tackle future challenges.
Managed via MxManagementCenter
The Traunstein store is the ninth hagebaumarkt in the Schneider Group to be fitted with MOBOTIX technology. 134 MOBOTIX cameras have been installed in total, 19 of them in Traunstein. Special MOBOTIX outdoor cameras monitor the outdoor area, delivering crystal-clear images at any time of year, day or night.
This means that all incidents that occur in parking lots or in outside areas are captured. The cameras are managed via MxManagementCenter (MxMC.) Various levels of user rights can be assigned, meaning that access to the video material is 100% GDPR-compliant.
MxMC also features an interface to the POS system so that any POS discrepancies can be immediately resolved. Customer counts and footfall analysis are also integrated to further optimise customer service and customer satisfaction.
Monitoring the retail space
Using just the MOBOTIX cameras that were monitoring the retail space in Traunstein hagebaumarkt, inventory discrepancies resulting from theft were able to be resolved. But MOBOTIX camera surveillance offers much more than anti-theft protection: The user can analyse the footage, allowing them to adjust the range of products as required and improve product positioning — an optimal approach for increasing sales potential.
Device and application security solutions provider, Trustonic has announced that OPTOLANE has selected Trustonic Secured Platform (TSP) to bring security and trust to the company’s new connected medical diagnostic device. The product is primarily used at the point-of-care for early diagnosis and preventative healthcare, particularly for diagnosing cancer, infectious diseases and congenital abnormalities.
Healthcare devices have become top targets for cybercriminals due to their critical nature, the valuable intellectual property they employ and the sensitive personal information that they collect and store. Research shows that there were 8.2 attempted cyber-attacks per connected healthcare endpoint in each month of 2018.
Smart diagnostic platform
OPTOLANE’s simple, fast and smart diagnostic platform is based on Nexell’s system on chip (SoC) platform
To ensure security, privacy and high performance, OPTOLANE’s simple, fast and smart diagnostic platform is based on Nexell’s system on chip (SoC) platform, which integrates Trustonic’s Trusted Execution Environment (TEE). OPTOLANE’s in vitro diagnostic (IVD) platform, called LOAA (Lab on an Array) Analyser, examines blood and tissue samples for multiple targets, including DNA, RNA, proteins and metabolites, in real-time. It was developed to satisfy market demand for ‘sample to answer’ IVD tools and enables sample extraction through to analysis with a single cartridge.
“Investment in connected healthtech is increasing and IVD is an important segment in the global diagnostics industry,” comments Ben Cade, CEO of Trustonic. “These solutions add significant value to diagnosis and treatment, enhancing the well-being of the general public while increasing productivity and reducing costs. But, where personal data this sensitive is being captured, processed, and transmitted, the appropriate steps must be taken to protect it from malicious actors.”
Trustonic security platform
Trustonic’s hardware-backed security platform, TSP, enables secure and private data extraction, processing, storage and transmission. The technology:
Enables a secure image processing channel from the sensor to the application processor;
Provides cryptographic tools to protect individuals’ sensitive medical data;
Ensures data integrity;
Creates a secure environment to run algorithms analysing raw data from the sensor;
Encrypts sensitive data when being shared with the cloud.
Do Young Lee, CEO of OPTOLANE, says “There is clear demand for innovative new diagnostics solutions that go from ‘sample-to-answer’ in real-time. Importantly, though, we fully understand our responsibility to protect patient data."
Enhanced data security
To deliver connectivity while protecting the sensitive personal data collected by diagnostic devices, we needed a proven hardware-backed security foundation. Trustonic’s experience protecting smartphones, wearables and IoT hardware, and securing critical mobile applications in the financial and automotive sectors, is assurance that our devices and patient data are secured to the highest standard.”
OPTOLANE expects to receive FDA certification for the new device in the first quarter of 2020. Once certification is achieved the product will be available to clinicians in healthcare facilities around the world.
Bluebird House is a specialist UK inpatient facility, providing treatment and care for young people with complex mental health problems which mean they pose a risk to themselves or others. Run by Southern Health NHS Foundation Trust, the centre also houses adolescents detained under the Mental Health Act, so the highest standards of care, protection and security are required.
As part of a wider review of security and safety across the trust, Bluebird House was earmarked for a comprehensive video surveillance upgrade and IDIS technology was chosen as the best-fit for this major project.
Providing comprehensive coverage
All IDIS equipment uses true plug-and-play set up, which minimises disruption and disturbance to patients
Galeco engineers installed 110 IDIS 12MP Super Fisheye cameras in communal and therapeutic areas inside the facility and over 40 bullets and 13 PTZ cameras cover the exterior. All the cameras are connected to six 32-channel NVRs and managed via IDIS Center video management software (VMS).
All IDIS equipment uses true plug-and-play set up, which minimises disruption and disturbance to patients, while protection against gaps in footage is provided by IDIS Smart Failover ensuring 24/7 continued recording even during network instability or drop-out. Implemented across three secure wards and two high care units, the 12MP IR Super Fisheyes provide comprehensive coverage much more affordably than two or more fixed lens cameras. Advanced IDIS video capture technology delivers complete high-definition scene coverage in all lighting conditions and allows staff to de-warp in live view as well as playback.
Automatic object detection
The 5MP bullet cameras, deployed around the building exteriors provide coverage of gardens, courtyards and car parks. IR LED that allows night-time image capture at distances up to 30m and includes intelligent functions such as active tampering alarms and trip zones and will notify the security team to any breach.
Each camera is set to perform virtual guard tours at specific times throughout the day and night
IDIS 31x Zoom IR PTZ cameras are installed along the perimeter to provide clear night-time image capture at distances up to 200m. Each camera is set to perform virtual guard tours at specific times throughout the day and night. Featuring automatic object detection, the cameras recognise and automatically track objects, people or cars capturing useful footage and alert operators of any suspicious activity. To meet patient privacy requirements, access to live and recorded footage, is limited to staff according to their ward and role.
Access to advanced features and functionality
Staff can only view and review footage from their area of responsibility at designated monitoring stations using specialist IDIS monitors designed for high-performance surveillance operations. To meet future requirements, the new IDIS solution can be linked to the trust’s local area networks (LANs) without increasing cyber- security concerns, thanks to IDIS’s use of proprietary software which is inherently resilient.
The totally cost-free IDIS Center video management software (VMS) gives security managers and senior staff a complete overview of the entire site from a 24/7 manned and centralised control room. Using the intuitive IDIS Center interface, operators have complete command and control of each camera and access to advanced features and functionality to ensure the secure and smooth day-to-day running of the site.
Authorised monitoring and access of footage
IDIS technology made this easy, and it was also the quickest and least disruptive to install
Video surveillance is a key resource for clinicians, Sr. managers and security staff at Bluebird House as they need to work closely together to deal with incidents and reduce risks of harm. Improved video coverage was needed as it would allow ongoing review of care standards and full investigation of any alleged incidents.
Patient privacy is also of paramount importance, so specialist integrator Galeco Communications was selected to implement a solution that would allow authorised monitoring and access of footage for specific rooms and wards. IDIS technology made this easy, and it was also the quickest and least disruptive to install, the most secure against cyber-attacks - in compliance with NHS requirements – and yet would deliver the lowest total cost of ownership (TCO).
Ensuring better safety and security
Replacing the centre’s ageing camera system, the IDIS solution would give complete coverage of corridors, wards and other high-risk areas in all lighting conditions. The IDIS solution has improved security, safety and care at Bluebird House by providing a complete video record of events.
Exterior cameras ensure better safety and security in outdoor communal areas
Footage from the 12MP Super Fisheye cameras give a full 360 view without any blind spots with a choice of 6 view modes and crucially provides staff with the ability to de-warp footage retrospectively. Now, if incidents need to be investigated it’s a simple task to retrieve video and provide any high-definition evidence required. Exterior cameras ensure better safety and security in outdoor communal areas, while security operators can quickly detect and respond to any suspicious activity on the perimeter.
Access and review recordings
"A key benefit for us is that this new system is so easy to use, and particularly for our clinical staff who can now access and review recordings to help them improve patient care. This video technology gives us extra confidence that our patients and staff are safe and protected” said Tracey Edwards, Head of Security at Southern Health NHS Trust.
With minimal disruption, and working in this sensitive location, Galeco engineers were able to replace an outdated system with an affordable, high-performance, cybersecure solution that is easy to maintain and operate without any ongoing license fees.
The new year comes with new opportunities for the security industry, but what technologies will dominate our discussions in 2020? Topics such as artificial intelligence (AI) and HCI (hyperconverged infrastructure) became familiar in conversations during 2019, and they are likely to dominate our thoughts again in the new year. But other buzzwords are also gaining steam, such as “blockchain” and “frictionless access control.” Connectivity and the cloud will also be timely technology topics as the industry evolves. We asked this week’s Expert Panel Roundtable: What technology buzz will dominate the security industry in 2020?
Video storage is an important – and expensive – aspect of almost any surveillance system. Higher camera counts equate to a need for more storage. New analytics systems make it easier for operators to manage video, but that video must be dependably stored and easy to access if and when it is needed. To keep up to date on the latest developments, we asked this week’s Expert Panel Roundtable: What’s new in video storage solutions?
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?