HD CCTV
Alarm.com has released the first commercially available video doorbell that rings without requiring any contact to reduce public health risks and make home visits and deliveries safer for all. The Alarm.com Touchless Video Doorbell is the next generation of video doorbells, combining sleek design with some of the most advanced video intelligence available to consumers for touch-free operation. It is the latest technology innovation from the company that pioneered smart home security. Touchless...
Tavcom Training, one of the world’s pioneering provider of accredited security systems training courses and part of the Linx International Group, announced the addition of two one-day CCTV courses to its extensive online learning platform. The CCTV Control Room Refresher and CCTV Legislation courses are available now, with the option of accredited (BTEC) and non-accredited certificates, as well as CPD points available. The CCTV Control Room Refresher Course is essential for security pract...
Zoox, the globally renowned company in Robotics, Artificial Intelligence (AI) technology and mobility-as-a-service solutions, has revealed the first look of its self-driving, electric and autonomous vehicle built for the rider, not the driver. The Machine Learning solutions company announced that they are happy to confirm that FLIR Systems will supply them with thermal imaging cameras for their Zoox robotaxi vehicle. FLIR Systems also shared more details on their involvement with Zoox and why t...
Artificial intelligence (AI) is more than a buzzword. AI is increasingly becoming part of our everyday lives, and a vital tool in the physical security industry. In 2020, AI received more attention than ever, and expanded the ways it can contribute value to physical security systems. This article will revisit some of those development at year-end, including links back to the originally published content. In the security market today, AI is expanding the use cases, making technologies more power...
When securing a sensitive facility against unwanted threats, there are several challenges that need to be addressed. Whether one is trying to protect an embassy, bank, power plant, data centre, military base or airport, no perimeter is tightly secure until all of the people and vehicles entering are screened in the right manner. While it’s clear that old-school methods like a guard with a mirror are outdated and present many time-consuming challenges, there are technological solutions tod...
UVeye, a supplier of high-tech vehicle-inspection systems, is planning to expand in the United States with the introduction of products especially designed for car dealers, used-car auction houses and major vehicle-fleet operators. The company plans to open sales and product development offices in Ohio and New York within the next four months, is assembling a team of regional sales representatives and also is exploring various North American locations for production and warehouse facilities in 2...
News
Tavcom Training, the world’s renowned provider of accredited security systems training courses and part of the Linx International Group, has announced that the organisation is supporting the Naomi House & Jacksplace hospices by making a donation for every classroom and online course booked. Naomi House & Jacksplace Naomi House & Jacksplace provide expert hospice care to more than 525 life-limited and life-threatened children, young adults and their extended families from the regions of Hampshire, Wiltshire, Dorset, Berkshire, West Sussex, Surrey and the Isle of Wight in the United Kingdom. Lisa Congdon, Corporate Fundraiser at Naomi House & Jacksplace, stated “We are so grateful for the support of Tavcom Training. This year has been particularly difficult and presented challenges unlike anything we have ever had to face in the past. Therefore, the support of our community is appreciated more than ever now.” Fundraising for NGO Naomi House & Jacksplace have long been jewels in our community and is close to the heart of the Tavcom Training" First launched in 1995, this year Tavcom Training is marking its 25th anniversary, while Naomi House & Jacksplace opened its doors to the public in 1997. “Naomi House & Jacksplace have long been jewels in our community and is close to the heart of the Tavcom Training team, as well as the many security professionals from the surrounding areas that attend our courses,” explains Kevin Matthew, the Operations Director at Tavcom Training. Corporate Social Responsibility Kevin adds, “Making a donation for every course booked, as well as running other fun fundraising initiatives throughout the forthcoming year, is something we are proud to do, to help this fantastic and inspiring charity to support our local children.” For individuals looking to book a course online or to get more information about Naomi House & Jacksplace, including how to make a donation to its Christmas Appeal 2020, so as to give the gift of a magical Christmas Journey to a child at a children’s hospice, can log onto to the official website.
Particularly affordable, particularly compact and particularly powerful when the essentials matter: the new uEye XLE camera family from IDS has been specially developed for high-volume and price-sensitive projects. Thanks to their space-saving design, practical USB3 interface and support of the USB3 Vision Standard, the industrial cameras can be easily integrated into any machine vision system. Customers can choose between single-board cameras with or without C-/CS-mount or S-mount as well as variants with coated plastic housing. Classic industrial applications The first models will be equipped with the light-sensitive 5 MP sensor ON Semiconductor AR0521. There are almost no limits to the possible applications of the new camera family. The cameras also show their strengths in classic industrial applications such as surface inspection "It will prove its worth in small appliance construction, measurement technology, transport and even agricultural applications," explains Jürgen Hejna, Product Manager at IDS. The cameras also show their strengths in classic industrial applications such as surface inspection. Thanks to their compact dimensions, the models fit into the smallest of spaces, for example as embedded vision solutions. Optimal user experience The price-optimised design makes the cameras particularly interesting for applications where costs are the main concern. Therefore, the company also offers a large number of inexpensive lenses for the cameras. All uEye XLE models feature a USB3 interface (SuperSpeed USB, 5 Gpbs) and are 100 percent GenICam-compliant. The cameras can be used with any software that supports the USB3 Vision Standard. For an optimal user experience, the company recommends the use of IDS peak. The free SDK includes all necessary components from source code samples to transport layer, so that customers can start developing their own applications right away.
With system designers having so many options when it comes to specifying the most appropriate cameras to monitor large areas, Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe, provides an overview of the merits of some of the most suitable camera formats. PTZ cameras PTZ cameras have traditionally been used for city and wide area surveillance applications such as airports, car parks, shopping centres, sports stadia and warehouses, with operators able to track the movement of objects and zoom in to observe close-up detail of any activity. The ability of an operator to proactively monitor an incident and zoom in to verify what is occurring, ensures they are able to quickly decide on the most appropriate response. Many PTZ cameras feature auto-tracking, as well as continuous pan and pre-set positioning In addition, many PTZ cameras feature auto-tracking, as well as continuous pan and pre-set positioning, which means that images of a moving object will be captured and recorded even when operators are distracted or are away from their workstations. The deterrent effect of PTZ cameras configured to automatically tour an area should also not be underestimated as they will create a strong impression to would be offenders that they are being watched, even if the images captured by the cameras are not being monitored in real-time. 8K cameras Whilst it should be emphasised that PTZ cameras still have a big part to play in detecting anti-social or criminal activity, recent advances in video surveillance technology has meant that system designers now have the option to consider specifying other types of cameras which, depending on the application, might be more suitable. The sharpness and clarity of the images captured by 8K video surveillance cameras, for example, simply ‘need to be seen, to be believed’. In reality, very few users are likely to deploy 8K cameras with the intention of just monitoring an entire field of view. The value of these cameras comes from the fact that 8K is the equivalent of 16 x 1080p Full HD images and this means that a single camera can capture a vast amount of information, enabling operators to digitally zoom into a very small part of the scene without any pixilation of the image. Fixed or PTZ cameras For this reason, a football stadium is an excellent example of where an 8K camera can be put to very good use as it would be capable of capturing evidence grade images of 20,000 or more fans occupying a football stand. As such, its price/performance ratio makes the 8K camera a viable, cost-effective alternative to the deployment of multiple fixed or PTZ cameras. PTZ cameras are a lower price option and are ideal for when operators need to scan a wide area of view When it comes to deciding whether an ultra-high resolution 8K or PTZ is the best camera format for any given location, it will very much depend on what the end-user wishes to achieve. However, budget limitations also need to be taken into consideration. In simple terms, an 8K camera is a highly impressive, high performance option if there is a requirement to continually record a camera’s entire field of view at the same time that an operator might need to zoom into a specific area of interest. Video surveillance cameras However, PTZ cameras are a much lower price option and are ideal for when operators need to constantly scan a wide area of view, whilst having the flexibility when necessary, to quickly zoom in to see what may be occurring in greater detail. The case for PTZ cameras is further strengthened when real-time monitoring is more important than recording video for evidence purposes and equally important, the latest generation of PTZ cameras are equipped with adaptive IR technology which adjusts the angle of the camera’s built-in IR LEDs to match the level of zoom. Multi-directional cameras typically offer the capabilities of two, three or four video surveillance cameras in a single housing and yet, as they only have a single IP connection, one will only need to purchase one VMS licence. Multi-streaming cameras Those equipped with two separate lenses are designed to capture high definition images of adjacent areas. Depending on the required field of view, there is a choice of interchangeable lens modules which can be easily fitted on site by an installation engineer. These multi-streaming cameras significantly reduce the costs which would normally be associated with installing two separate cameras to monitor, for example, an L-shaped area such as two sections of a corridor or two sides of a building. There are also multi-directional cameras available which feature four separate sensors There are also multi-directional cameras available which feature four separate sensors, with operators able to choose from a broad range of customisable angles and zoom settings per sensor. This offers cost savings for both system integrators and end users, as multi-sensor cameras use less cable, conduit and mounting hardware, compared to what would normally be required to enable up to four separate cameras to do the same job. With less network connections, they also require fewer switches. Built-in PTZ Designed for monitoring large open areas with just one camera, the images captured by the four sensors can be seamlessly stitched to produce a panoramic image covering up to 220° images. Life will also be much easier for installers if models equipped with motorised PTRZ gimbals are specified. These will reduce on-site times as they enable engineers to remotely pan, tilt and rotate the lens’ positions in order to set the camera’s field of view. It is worth noting that some manufacturers, such as Hanwha Techwin, offer 4 channel multi-sensor cameras with an additional integral PTZ camera. This can be configured to automatically zoom in and track a moving object or move to a user configured pre-set position when the motion detection function of one of the four camera sensors detects activity. 360⁰ cameras This addition of a PTZ camera means users are able to avoid incurring the higher capital, installation and maintenance costs of deploying 5 separate cameras to cover a large area, whilst achieving the same level of functionality. A single 360⁰ camera will quite often offer the most efficient and cost-effective way of monitoring a large area and particularly so when a number of standard cameras might normally be required to avoid any blind spots. Most 360⁰ or ‘fisheye’ cameras offer a variety of alternative viewing modes, including single panorama They also offer a compact option for retail stores and other environments where aesthetics is important. Savings can be achieved on maintenance costs compared to other types of cameras, as 360⁰ models have no moving parts. Most 360⁰ or ‘fisheye’ cameras offer a variety of alternative viewing modes, including single panorama, double panorama and quad views. Video management software They are also likely to feature a digital PTZ which allows operators to electronically pan, tilt and zoom in on specific areas for a more detailed view whilst continuing to monitor and record the whole 360-degree view. Some of the cameras will have onboard de-warping functionality. Where this is not the case, video management software, such as Wisenet WAVE, can be used to de-warp the fish-eye images. With so many different camera formats to choose from, consultants, system designers and integrators have an interesting challenge in deciding which cameras will best meet the requirements of a specific video surveillance project. To a large extent, the decision can be logically made with the help of the risk assessment process and by taking into account an end-user client’s operational requirements. High quality images PTZ cameras are likely to be strong contenders when the captured images are to be viewed in real-time An 8K camera, for example, would seem the obvious choice when there is a need to monitor large crowds of people in wide open areas, whilst multi-directional cameras are ideal for capturing images of adjacent areas. PTZ cameras are likely to be strong contenders when the captured images are to be viewed in real-time, as they will provide operators with a high level of control and enable them to proactively track the movement of people. Their greater deterrent effect should also not be underestimated. In reality, a combination of two or more of these types of cameras is likely to be required for most high security or mission critical applications and there is a multitude of other factors to be considered before deciding on the best cameras for a specific project. These include, for example, the required image resolution and if there is a need for the cameras to have built-in IR illumination so that they will capture high quality images regardless of the light levels. Various camera types The need for video analytics and whether the cameras have the ability to support third-party specialist applications should also be considered, as should bandwidth requirements. As always, the best advice is to work with manufacturers one believes that they can trust and ask them to provide live demonstrations of the various camera types. This will allow them to make informed judgements on which cameras have price/performance ratios that will match their specific requirements.
GJD, a manufacturer and designer of smart electronic perimeter detection and high-performance LED illumination equipment, is pleased to announce the launch of its Clarius® Hybrid IP IR/WL LED illuminator. The Clarius® Hybrid IP is a high-performance combined infra-red and white light illuminator; which incorporates the latest surface mount LED technology with enhanced optical output and outstanding reliability, delivering excellent night-time images. Minimising light wastage GJD’s Hybrid IP illuminator provides white light for colour recordings or IR light for black & white night-time CCTV image capture. The Hybrid illuminator is an internet protocol connected device with an integrated web browser. The unit includes an interchangeable lens diffuser system which allows the user to quickly and easily alter the angle of illumination. Elliptical beam profiles allow more light to be delivered where it is needed Elliptical beam profiles allow more light to be delivered where it is needed, lighting up longer distances and minimising light wastage. The system also helps to prevent overexposure of foreground objects. As standard the illuminator includes interchangeable lensing which delivers 10° circular, 30°, 60° & 95° elliptical beam profiles, with additional lenses available on request. Provide dedicated lighting Why use the Clarius Hybrid IP IR/WL illuminator? Hybrid illuminator designed to provide dedicated lighting for IP cameras via PoE+ (power over ethernet) Distances up to 187m (614') (IR) and 114m (374') (WL) Integrated browser interface Direct integration with VMS systems IEEE02at compliant IP66 weatherproof rating Built-in photocell on/off Vibration/shock sensor CleanLITE self-cleaning lens coating technology High quality anodised aluminium heat sink 5 year warranty GJD, headquartered in Heywood, Greater Manchester provides innovative presence detection and security lighting systems. GJD’s detectors and illuminators are a perfect fit for sites of all sizes and from low to high-end security requirements.
OPTEX Europe, a pioneer in sensing and detection, has entered a new partnership with UK security services company, DS Security Group Ltd. The collaboration between OPTEX and DS Security Group is two-fold. Firstly, monitoring of the new OPTEX Intelligent Visual Monitoring solution is done via DS Security’s recently launched state-of-the-art Alarm and Video Monitoring Centre, DS Operations Centre (DSOC). Secondly, the adoption and promotion of OPTEX’s suite of sensors is part of DS Security’s intrusion detection portfolio. Monitored alarm systems DS Security Group is a UK security services business that specialises in commercial services, utilising the latest security systems, access control and CCTV monitoring solutions to protect businesses and their commercial property and premises. Ben Linklater, Sales Director at OPTEX Europe, says: “We were extremely impressed by DS Security Group, in particular its expertise, professionalism and willingness to embrace new technologies. When we presented our new solution to add video to monitored alarm systems to Stephen and the rest of his team, it was clear our companies were aligned about the benefits it could bring to the customers.” Easy visual verification We are pleased to become an OPTEX Monitoring partner and add their sensor range to our portfolio" Stephen Smith, Director and Chief Operating Officer at DS Security Group, says he is looking forward to working closely with OPTEX: “Having launched our new monitoring centre, it was very interesting for us to meet with OPTEX and understand more about their Intelligent Visual Monitoring solution. We could see how implementing OPTEX intrusion sensors and linking them to IP cameras will provide an easy visual verification to our customers.” “We are pleased to become an OPTEX Monitoring partner and add their sensor range to our portfolio. We look forward to working closely with them on new projects to deliver the highest quality security solutions and level of service to our customers.” added Stephen. Visual monitoring solution The OPTEX Intelligent Visual Monitoring solution enables separate intruder and CCTV technologies installed on the same site, but acting independently, to be connected using the OPTEX Bridge and create one, seamless, integrated and intelligent visual monitoring solution. Intruder alarms can now be visually verified within seconds, without impacting the integrity of the technology installed, or its Grade. When an alarm occurs, a signal is instantly sent to the ARC whose operator can view images pre and post the alarm event via a dedicated portal to determine whether the alarm is genuine.
Poor driving doesn’t just increase the risk of accident and injury – it also slows down traffic and increases delays for other motorists. To help local authorities to overcome these challenges, Hikvision has created its Traffic Violation Detection solution, which detects traffic and parking violations across the road network in real time and supports fast, automated incident responses and ticketing deterrents. High global cases of traffic accidents According to the World Health Organisation (WHO), traffic accidents kill approximately 1.35 million people a year and injure up to 50 million more. A large number of these accidents are preventable, caused by speeding drivers, or distracted drivers who are talking on their phones or texting on the road. As well as causing road accidents and near miss incidents, bad driving practices also increase traffic congestion As well as causing road accidents and near miss incidents, bad driving practices also increase traffic congestion, which is a major cause of inconvenience for motorists and local authorities who are required to reach the incident spots on time. Common driving behaviours that typically impact traffic flow include illegal vehicle stopping or parking, incorrect use of priority lanes, illegal u-turns and unnecessarily sharp braking at traffic lights and junctions. Traffic Violation Detection solution To help make roads safer and to keep traffic flowing without blocks, Hikvision has introduced a state-of-the-art Traffic Violation Detection solution. This video solution focuses on three key areas to ensure that motorists drive as safely as possible, and that any traffic infractions are recorded and notified to relevant public authorities. As an additional benefit, the Hikvision solution uses smart video technology to automate traffic and incident management. This not only speeds up response times compared to manual monitoring, but it also helps to save police time and free up forces to focus on major crime incidents. Hikvision cameras and velocity radars to detect speed violations Using Hikvision cameras and velocity radars mounted on checkpoint ‘gantries’, traffic violations can be detected at key locations on the road network. In particular, the speed of vehicles can be verified, either using a location-based snapshot or an average speed between two checkpoints. 1) Speed check method 1: Instantaneous speed detection: This is carried out with the use of a speed radar, a video camera, and a supplemental light to detect the speed of the vehicle as it passes the checkpoint. 2) Speed check method 2: A double-checkpoint segmentation system: This system calculates the average speed of a vehicle travelling between two checkpoints or ‘gantries’. Integrated with deep learning technology Hikvision checkpoint cameras use deep learning technology to detect a number of additional traffic violations In addition to detecting speeding violations, Hikvision checkpoint cameras use deep learning technology to detect a number of additional traffic violations. For example, the cameras can determine if drivers are wearing their seatbelt. By recognising licence number plates, checkpoint cameras can also support local authorities to detect stolen vehicles, and check that only the right types of vehicles travel on highways and urban streets by recognising vehicle attributes. Monitoring driving behaviour at intersections Traffic violations at intersections are not only dangerous for motorists, cyclists and pedestrians, but they can also slow down traffic and cause long delays. To address these challenges, the Hikvision Traffic Violation Detection solution monitors driving behaviour at intersections, helping to reduce the risk of accidents and speed up traffic flow. Detecting lane violations, illegal u-turns and wrong-way driving Most traditional intersection monitoring solutions focus on vehicles that run red lights, by cross referencing licence plate information with traffic light status. Hikvision solution also does this, but it also integrates lane properties to detect and respond to misuse of lanes, illegal u-turns, wrong-way driving, and other incidents that can cause accidents and delays. Illegal parking has major consequences for road safety and traffic congestion. This apart, it can also be inconvenient or dangerous for cyclists and pedestrians who need to pass badly parked vehicles. High-performance illegal parking detection cameras The Hikvision cameras can reliably detect vehicles and capture their licence plates The Hikvision Traffic Violation Detection solution addresses these challenges with high-performance illegal parking detection cameras. Employed with Hikvision’s DarkFighter technology, the cameras provide up-to 4 megapixel video images, even in very low-light conditions. The Hikvision cameras can reliably detect vehicles and capture their licence plates when they enter into the pre-defined illegal parking zones, including those on highways and urban streets. Hikvision illegal parking detection cameras can also be configured easily to implement rules that allow parking only during certain times of day, or for a limited time period. This makes the cameras suitable for town car parks, parking bays on high streets, airport pick-up bays, and other areas where motorists can only leave their vehicles for a short time. Intelligent technology platform integration via HikCentral VMS To maximise road safety and to help reduce traffic congestion, all elements of the Hikvision solution are integrated into a single, intelligent technology platform using HikCentral VMS. This brings cameras, velocity radars, servers, and control room infrastructure together to provide a real-time view of traffic incidents across the road network and to speed up response times dramatically. With video data streamed into the platform in real time, authorities can view vehicles that violate traffic rules, and play back footage to verify what took place, and review traffic statistics at peak demand times. The HikCentral platform can also be integrated with third-party ‘ticketing’ systems that send automated fines and other penalties to vehicle owners via email, SMS, or traditional mail.


Expert commentary
Rodrigue Zbinden, CEO at Morphean, discusses the business benefits from merging video surveillance and access control technologies as demand for ACaaS grows. The big question facing businesses today is how they will use the data that they possess to unlock new forms of value using emerging technologies such as the cloud, predictive analytics and artificial intelligence. Some data is better utilised than others: financial services were quick to recognise the competitive advantages in exploiting technology to improve customer service, detect fraud and improve risk assessment. In the world of physical security, however, we’re only just beginning to understand the potential of the data that our systems gather as a part of their core function. Benefits of ‘Integrated access control’ The first thing to look for is how multiple sources of data can be used to improve physical security functionsWhat many businesses have yet to realise is that many emerging technologies come into their own when used across multiple sources of data. In physical security, for example, we’re moving from discussions about access control and CCTV as siloed functions, to platforms that combine information for analysis from any source, and applying machine learning algorithms to deliver intelligent insights back to the business. ‘Integrated access control’ then looks not just to images or building management, but to images, building management, HR databases and calendar information, all at the same time. And some of the benefits are only now starting to become clear. The first thing to look for, of course, is how multiple sources of data can be used to improve physical security functions. For example, by combining traditional access control data, such as when a swipe card is used, with a video processing platform capable of facial recognition, a second factor of authentication is provided without the need to install separate biometric sensors. CCTV cameras are already deployed in most sensitive areas, so if a card doesn’t match the user based on HR records, staff can be quickly alerted. Making the tools cost-effective In a similar vein, if an access card is used by an employee, who is supposed to be on holiday according to the HR record, then video data can be used to ensure the individual’s identity and that the card has not been stolen – all before a human operator becomes involved. This is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalisation of a vital business functionThese capabilities are not new. What is, however, is the way in which cloud-based computing platforms for security analytics, which absorb information from IP-connected cameras, make the tools much more cost effective, accessible and easier to manage than traditional on-site server applications. In turn, this is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalisation of a vital business function. With this system set up, only access control hardware systems are deployed on premise while the software and access control data are shifted to a remote location and provided as a service to users on a recurring monthly subscription. The benefits of such an arrangement are numerous but include avoiding large capital investments, greater flexibility to scale up and down, and shifting the onus of cybersecurity and firmware updates to the vendor. Simple installation and removal of endpoints What’s more, because modern video and access control systems transmit data via the IP network, installation and removal of endpoints are simple, requiring nothing more than PoE and Wi-Fi. Of all the advantages of the ‘as a service’ model, it’s the rich data acquired from ACaaS that makes it so valuable, and capable of delivering business benefits beyond physical security. Managers are constantly looking for better quality of information to inform decision making, and integrated access control systems know more about operations than you might think. Integrating lighting systems with video feeds and access control creates the ability to control the lightsRight now, many firms are experimenting with ways to find efficiencies and reduce costs. For example, lights that automatically turn off to save energy are common in offices today, but can be a distraction if employees have to constantly move around to trigger motion detectors. Integrating lighting systems with video feeds and access control creates the ability to control the lights depending on exactly who is in the room and where they are sitting. Tracking the movement of employees Camera data has been used in retail to track the movement of customers in stores, helping managers to optimise displays and position stocks. The same technology can be used to map out how employees move around a workspace, finding out where productivity gains can be made by moving furniture around or how many desks should be provisioned. Other potential uses of the same data could be to look for correlations between staff movement – say to a store room – and sales spikes, to better predict stock ordering. What makes ACaaS truly exciting is it is still a very new field, and we’re only just scratching the surface of the number of ways that it can be used to create new sources of value. As smart buildings and smart city technology evolves, more and more open systems will become available, offering more ways to combine, analyse and draw insights from data. Within a few years, it will become the rule, rather than the exception, and only grow in utility as it does.
For those of you old enough to remember, video matrix switchers were once the heyday of surveillance camera control. These cumbersome antiques were at the heart of every major video surveillance system (CCTV at the time) in premier gaming properties, government installations and corporate industrial complexes. They required more physical labour to construct and configure than perhaps the pyramids – maybe not – but you get the picture. And then digital video made its way in to the market and everything changed, transforming the physical demands for camera control and management from a hardware-centric to a software driven process. We’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely There’s no doubt that this migration also presented significant challenges as many security professionals often struggled with all things IT and software programming being one of the industry’s soft spots. Fortunately, we’ve come a long way in a few short years, and the borders that once defined IT and security continue to diminish, if not disappear completely. However, the complexities of today’s VMS functionality can be intimidating for anyone tasked with installing one of these systems given all of the user-defined options available from the simplest camera sequencing and bandwidth allocations to mobile management and enterprise level integration. This is where truly advanced VMS solutions need to shine on both the operations and the design/build sides of the equation. Smart VMS design There are more solutions products labelled “VMS solutions” out there than ever before. The issue is the fact that many of these “solutions” really don’t fall into the category of a true VMS by today’s standards but offer basic camera and NVR control. No doubt that there is a place for such software programs in the market. However, VMS solutions from the likes of OnSSI and other industry-leading companies offer distinct and superior management and control capabilities for demanding security and business intelligence applications. Perhaps of equal importance, these top-tier VMS solutions incorporate provisions for installers, so they have a clear and easier implementation path. OnSSI offers VMS solutions with smart camera drivers Here are seven attributes that can assist with the design and implementation of an advanced VMS solution: 1) Open architecture platform We need the ability to easily integrate with other systems and scale for future developments and physical system growth The ability to easily integrate with other systems and scale for future developments and physical system growth is largely dependent on a systems platform architecture. Here’s where VMS solutions with open architecture provide a distinct advantage. Open-architecture solutions expand functionality by facilitating greater integration between multiple systems and components. This not only makes VMS solutions with open architecture easier to implement, it makes them extremely cost-efficient by eliminating the need for proprietary solutions. Open architecture systems also provide adherence to industry standards such as ONVIF and PSIA, as well as compression formats such as H.265 and MJPEG, and help ensure system integration and support of an extensive range of manufacturers’ cameras and off-the-shelf hardware. Be wary of VMS solutions with limited camera manufacturer support. 2) Simple licensing processes and pricing Camera licenses and pricing is always a touchy subject, as any misunderstanding of a specific VMS solutions’ licensing terms can prove to be costly after the fact. And it often seems that some VMS suppliers have gone to great lengths to complicate the process as to obscure actual Total Cost of Ownership (TCO). Perhaps the most direct, simple and straightforward camera licensing and pricing method is to have one license per IP address used by each camera/encoder on multi-channel devices. These should be perpetual licenses with no required annual fees or subscriptions. Additionally, the licensing agreement should be all inclusive without added fees for multiple clients, failover servers, active directory support, I/O devices, redundant management servers, technical support or security patches and updates. 3) Mixing and matching camera license types The ability to mix and match different camera license types within the same system helps facilitate a seamless and simple migration of new and pre-existing systems with minimal downtime or interruption in operation. The ability to mix and match camera licenses not only saves valuable design and installation time, it can provide considerable savings when integrating large, multi-tenant systems. Mix and match capabilities also allow system designers to apply specific feature sets to specific groups of cameras to best leverage functionality and budgets, as well as providing the flexibility to implement an on-site, virtual, or cloud-based VMS solution, without any additional cost. 4) Auto camera detection and configuration Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements Another VMS set-up feature that eases the install process is the ability to forego device registrations or MAC address requirements. This functionality allows installers to instantly locate cameras on the network and configure them centrally so they can easily replace older cameras while seamlessly retaining video recorded from them. The auto detection capability should also include the ability to detect and import CSV files, which can then be stored and used to configure camera templates for future camera installation profiles. 5) Smart camera driver technology VMS solutions with smart camera drivers offer valuable assistance during system implementation, and any time new cameras are added to the network or replace older models. Manufacturer-specific smart camera drivers expand the range of model-specific static drivers. Instead of storing the device’s information (codecs, resolutions, frame rates, etc.) statically, a VMS with smart camera drivers queries devices for their capabilities using the manufacturers’ proprietary protocol. All that is required for configuration is that the camera is available on the network. Smart camera drivers eliminate the need to wait for model-specific drivers or installation of driver packs, allowing for newly released cameras to be used immediately. Network security is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers 6) Importance of network security Network Security is perhaps the greatest challenge faced by industry professionals today Network security is perhaps the greatest challenge faced by industry professionals today. This is an area where leading VMS suppliers like OnSSI have ramped up development efforts to stay ahead of hackers. New security developments to look for include TLS 1.2 encryption protocols for camera-to-server communications (SSL 3.0 supported for older cameras), as well as server-to-server communications. Additional safeguards to consider include: randomised video databases with no camera identification information to secure recorded data; support for Active Directory authentication; AES encryption between servers and clients; and AES encrypted exporting. 7) Automatic updates Regardless of the supplier you select for your VMS solution, they should be consistently providing new updates and security patches on a frequent if not regular basis. Keeping up with these updates can be a burden and are often overlooked leading to system failures and breeches. Advanced VMS solutions now feature automatic update service checks on a system-wide basis, eliminating the need to manually update individual servers and devices. This ensures that your VMS system always has the latest drivers, fixes and updates which assures overall security while reducing TCO. So next time you’re getting a demo of the latest and greatest VMS solution, remember to ask what it offers in terms of design and implementation tools. Half the battle with new technologies is getting them installed and working properly. Without the right tools to accomplish these critical first steps, all the functionality in the world will do you little good.
The use of facial recognition has become a highly debated topic recently, and has increasingly and misleadingly been criticised by some for being an unethical tool used to spy on the public. The reason for such criticism is however largely due to lack of information and regulation around the technology. Used proportionately and responsibly, facial recognition can and should be a force for good. It has the ability to do a lot more to increase security in the future – from street crime to airport security, all the way through to helping those battling addiction, the technology can take security and operations to new heights. The rise in knife crime Knife crime has dominated the headlines in the UK throughout the year. Recent statistics show the number of people being admitted to emergency care due to attacks by a sharp object to be up by nearly 40 per cent from two years ago, whilst the number of children under the age of 18 being admitted to hospitals with stab wounds is up by 86 per cent in only four years. This recent surge in knife crime has put police forces under immense pressure, and the intelligent use of facial recognition has a role to play in enabling more informed stop & search interventions. Currently UK police can stop and search an individual they suspect to be carrying drugs or weapons or both, or they can stop and search a person in a location where there have been or are considered likely to be “incidents involving serious violence.” In both cases they must do so with access to limited information, leaving themselves open to accusations of bias or discrimination. Knife crime dominated the headlines in the UK throughout 2018 Police systems benefiting crime investigations This is where facial recognition can offer up additional intelligence. These systems can memorise the faces of persons of interest, networks of gang members, wanted criminals and those suspected of involvement in serious violent crimes. Furthermore, these systems don’t need prior personal engagement to recognise an individual and see only data, not gender, age or race. The technology doesn’t take the decision away from the human police officer. However, it does bring greater transparency and context to the decision-making process of whether a stop and search intervention is justified. Similarly, the advanced technology can recognise and match an individual seen on a CCTV camera at a crime scene to someone the police encounters on the streets some time later, justifying a stop and search on that individual. Its ability to check in real time if a person is on a criminal watchlist adds an extra layer to the decision-making process prior to conducting a stop and search, lowering the likelihood of discrimination. Facial recognition thus helps eliminate both weapons and criminals off the streets and potentially prevent crimes before they have a chance to take place. Gambling addiction and how facial recognition can help There are an estimated 593,000 people in the UK currently battling a gambling problem, making it a serious public health issue in the country. Having understood the gravity of the issue, the UK gambling commission have set limits and advice in place to help those suffering this addiction; yet as with all addictions, gambling is a tough habit to beat. In order to put effective limitations in place and make a real difference, the gambling commission needs the right technology to protect those most vulnerable in the industry. Facial recognition technology is able to keep track of customers and thus help gambling companies in protecting their customers Facial recognition technology is able to keep track of customers and thus help gambling companies in protecting their customers to a higher degree. Monitoring those entering and moving around gambling areas is an extremely difficult task for human staff to do alone, especially in large crowded areas such as casinos. Facial recognition technology installed around the premises would be able to help the company and the staff to identify people who have registered as gambling addicts, and keep record of their day’s play in order to inform staff if and when it was time for them to stop. It would also be able to ensure effective self-exclusion procedures, by identifying a self-excluded individual via CCTV as soon as they entered the venue to then allow security staff to respectfully escort them out. Utilising facial recognition at airport security Facial recognition has by now become a normal sight at many airports around the world. Several people today hold a so-called biometric passport, which allows them to skip the normally longer queues and instead walk through an automated ePassport control to proceed to the gate faster without having to deal with control officers. Facial recognition used in this way has managed to significantly cut waiting times at the passport control, but it also has the ability to enhance security in and around airports. Facial recognition uses algorithms to match physical characteristics against photos and videos of people's faces Earlier this year, facial recognition technology managed to catch an imposter trying to enter the US at the Washington Dulles Airport. The false passport may have been uncaught by the human eye, yet due to the accuracy of the facial recognition technology it managed to help officers catch the imposter and bring him to justice. Facial recognition thus allows officers to identify an individual faster and more accurately than the human eye. Facial recognition uses algorithms to match physical characteristics against photos and videos of people's faces, which have been collected from visas, passports and other sources. Facial recognition allows officers to identify an individual faster and more accurately than the human eye Whilst some critics may worry about issues of privacy related to the technology, at airports the use of facial recognition has proved to both enhance security as well as speed up processes such as check-in and, in the future, even boarding proceedings. At airports the use of facial recognition has proved to both enhance security as well as speed up processes such as check-in If used correctly and proportionately, facial recognition can help safeguard the public and improve national security on several fronts. Whilst the many benefits of facial recognition are evident, the lack of regulation and understanding of the technology has led to misconception around how it works and what it is used for. Facial recognition technology can match faces in crowded public places against criminal watch lists, and register faces that match with those on criminal watch lists – whilst ignoring everyone else.
Security beat
Security’s intersection with consumer electronics is on view at CES 2020, the world’s largest technology event, Jan. 7-10 in Las Vegas. The giant show features more than 170,000 attendees, 4,500 exhibitors and 1,100 industry thought-leaders featured on the CES stage. A range of technologies will be on display, from artificial intelligence (AI) to 5G, vehicle technology to AR/VR (augmented and virtual reality), robotics to home automation. Security plays a prominent role, too.The impact of this event for the smart home could be about delivering home analytics and enhancing privacy" Smart home market on the forefront The smart home market is a major focus. “For the smart home market at CES this year, we expect to see numerous announcements regarding home awareness,” says Blake Kozak, Senior Principal Analyst at IHS Markit. “This will include brands offering up additional analytics for consumer security cameras with a focus on edge-based solutions.” “The impact of this [event] for the smart home could be about delivering home analytics and enhancing privacy through cloudless architectures and new electronic door lock approaches,” he adds. An example of cloud analytics is the Resideo Home app, introduced in December, which will make whole-home monitoring possible for four critical networks of the home – water, air, energy and security. Resideo promises a “simplified and integrated smart home experience.” Video is also prominent at the show. “For cameras, we can expect to see more cameras focused on the outdoor space and possibly new form factors for video doorbells,” says Kozak. Familiar security industry brands exhibiting at CES 2020 include ADT, Ring, August Home and Yale (both part of ASSA ABLOY), Bosch and Alarm.com. Focus on Cybersecurity In 2020, companies will continue to focus on solutions for protecting consumer data" Cybersecurity is an aspect of many of the devices on display at CES. “Device security and data privacy play a key role in the adoption of connected devices,” says Elizabeth Parks, President, Parks Associates. “Consumer security concerns for smart home products will continue to be a barrier to adoption in the U.S. and Europe, and these concerns can actually intensify with device adoption-71% of U.S. smart home households are concerned about cybersecurity. In 2020, companies will continue to focus on solutions for protecting consumer data. One big area of interest is protection on the network router, providing whole home solutions, which are very appealing to consumers.” “At CES we will see the traditional players introducing new DIY (do-it-yourself) products, as well as new players announcing new product features, services, and partnerships,” Parks adds. Smart access control Smart locks will be among the security products at CES 2020. For example, PassiveBolt, a lock company, will show the Shepherd Lock, a touch-enabled smart lock with enhanced security through sensors and AI. The add-on lock converts existing locksets into touch-activated devices. Another lock manufacturer is Kwikset, whose door locks and door hardware include Wi-Fi-enabled smart locks, Bluetooth-enabled smart locks, keyless and keyway-less locks and connected home technology. Video doorbells, including industry-innovator Ring, have been a hit in the consumer market. At CES, Ring will expand the mission to make neighbourhoods safer by creating a “Ring of Security” around homes and communities with a suite of home security products and services. The “Neighbors by Ring” app enables affordable, complete, proactive home and neighbourhood security. Homeguard offers a range of affordable CCTV solutions for home and small business DIY CCTV demonstrations DIY security systems are another market. Homeguard is a leading DIY consumer brand offering a range of affordable CCTV solutions for home and small business, including wired and wireless CCTV kits, smart cameras, home alarm systems and wire-free HD CCTV kits. Swann Communications is also at the forefront of surveillance and monitoring with new products developments including wire-free HD cameras and doorbells, professional CCTV video surveillance systems, and 1080p full HD systems with “True Detect” heat and motion sensing. AVTECH, and subsidiary YesGo Tech, will demonstrate a compact Wi-Fi home security set, a series of special cameras with face recognition, thermal detection and license plate recognition, customised central management software and a university ID tag that is compatible with access control, OEM and ODM opportunities. Security and automation solutions D-Link’s home networking, security and automation solutions will help consumers connect, view, share, entertain, work and play. SECO-LARM, manufacturer of a Room Occupancy Monitor that shows whether a room is in use, has a line of keypads and proximity readers with built-in Bluetooth for convenient access. Another smart home security solutions provider, Climax Technology, integrates wireless security, home automation, energy management, home emergency monitoring and live visual monitoring. Personal safety mobile application Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens" WaryMe designs and develops a personal safety mobile application to improve a user’s security in public places, schools, transports and companies by addressing major risks such as terrorism attacks, intrusion, fire and even industrial accidents. An all-in-one mobile application integrates alerting, crisis management and mass notification features. “Market players are looking to expand beyond established smart home devices like smart thermostats and networked cameras to products like smart water leak detectors, smart pet feeders, and smart air purifiers,” says Elizabeth Parks. “Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens. This trend is part of a broader security marketing effort to extend the perimeter of home security beyond traditional home access points.” “Familiarity with smart home devices lags behind familiarity with smart entertainment products; it even lags that of smart speakers, which are quite new in the market,” adds Parks. “In 2020, we will see players working to advance the visibility and marketing around device integration, and specifically focus on use case scenarios around safety, security, and convenience, which have always been the primary drivers of adoption of these types of products.”
Whether it is video analytic platforms to monitor traffic patterns or cameras deployed to help law enforcement ensure public safety, many cities are looking at advancements in video technology. Upgrade costs and technology compatibility issues are often front-and-centre when it comes to blending new technology with existing infrastructure. For example, if the city law enforcement officials want to improve video camera image quality, which can improve the evidentiary value of footage in prosecutions, they may look at newer HD or IP-based video systems. Upgrading to a hybrid DVR system Applications include perimeter monitoring, public parking, city transportation, square/town safety To stretch a tight budget, a migration plan to an IP-based camera system could be phased in over time by centering the upgrade on a new hybrid DVR system. This way, both existing analogue and newer IP-based cameras can be hooked into the system. For example, Hikvision’s Smart City Solutions include systems for government services, transportation and traffic management, or any combinations of these. Applications include perimeter monitoring, public parking, city transportation, square/town safety and temporary surveillance. Data capture form to appear here! Heart of City strategy Dahua Technology, a video-centric smart IoT solution and service provider, has introduced its ‘Heart of City (HOC)’ strategy, which is in line with the top-level design experience from hundreds of city projects. The strategy is based on the maturity of five technologies – artificial intelligence (AI), big data, cloud computing, IoT and 5G. The combination will enable the evolution of smart city 3.0 and bring great changes to our life, according to Dahua. A 300-plus camera city centre video surveillance scheme in the UK city of Lincoln has been installed and commissioned using Dahua's cameras, monitors and switching equipment A 300-plus camera city centre video surveillance scheme in the UK city of Lincoln has been installed and commissioned using cameras, monitors and switching equipment from Dahua Technology. The design of the new all-wireless encrypted system was based around delivering flexible technology, reducing the total cost of ownership, ease of installation, lower maintenance requirements, smart edge analytics and remote connectivity. Future-proof radio network design Environmentally friendly aspects of the project included specifying lower-energy equipment, integrating remote support and recycling hardware wherever possible. The installation of the new IP full HD system and network is part of Lincoln’s smart city strategy – Vision 2020 – which seeks to harness new technologies to improve the lives of citizens. One of the results is the provision of free Wi-Fi in the city, working alongside the Dahua cameras using the same IP wireless network. Wearables are another new aspect of city surveillance system. For example, FLIR Systems, Inc. has announced FLIR TruWITNESS, a wearable sensor platform designed for city-level security and public safety operations. TruWITNESS combines video, audio, location data, Internet of Things (IoT) capabilities, and cloud and management software in one solution, allowing organisations to reach a new level of situational awareness. TruWITNESS is worn on an individual’s body or mounted inside vehicles and is designed for any public safety organisation that requires on-scene, real-time mobile surveillance TruWITNESS is designed for any public safety organisation that requires on-scene, real-time mobile surveillance. Worn on an individual’s body or mounted inside vehicles, TruWITNESS includes visible-video, audio, global navigation satellite system (GNSS), gyroscope, accelerometer and magnetometer sensors. These sensors combine to send alerts and stream data to a central command centre in real-time to ensure full situational awareness and global event handling. Featuring FLIR Neighbor Aware inter-device connectivity, TruWITNESS acts as an IoT device, triggering nearby TruWITNESS devices, fixed and motorised Pan-Tilt-Zoom (PTZ) security cameras, and other connected sensors to act upon an alarm event. TruWITNESS becomes a key component of FLIR Systems’ Video Management System, United VMS, which command centres use to manage video surveillance. United VMS combines video, audio, and other related data and makes it available for real-time situation management and forensic purposes. Video analytics for crowd monitoring Crowd monitoring video analytics solutions continuously monitor vast areas instantly alerting police of any overcrowding areas. Qognify’s crowd monitoring video analytics solution was successfully used during the Maratha Morcha in the city of Kolhapur, India, on October 15th, 2016. The system monitored approximately one million protestors through 165 cameras installed across city. Smart threshold alerts were streamed directly into the control room while the crowd was building up, so that action could be taken before the crowd density reached dangerous levels, alleviating crowd safety and stability. Crowd monitoring video analytics solutions monitor vast areas instantly alerting police of any overcrowding areas At the core of the solution is Situator, Qognify’s advanced PSIM/Situation Management solution, which manages a myriad of security systems and sensors, including Qognify’s video management solution, from a newly built state-of-the-art Command and Control Center. Security operators and officials have advanced situational awareness of what is happening in their city and where. Automated, pre-defined Standard Operating Procedures (SOPs) were designed, in the local language Marathi, for handling routine security incidents as well as disaster management, ensuring that the most effective response is initiated, and procedures are executed in a consistent manner. Maintaining law, order and safety Qognify also implemented its Safe City solution in Navi Mumbai, a planned township that was established to handle the population overflow from the overcrowded and ever-growing city of Mumbai, India. Together with CIDCO (City and Industrial Development Corporation, the agency established for managing the new city) and system integrator WIPRO, Qognify designed an integrated and holistic solution that helps Navi police to maintain law, order and safety. Qognify’s Video Management Solution controls hundreds of surveillance cameras As a planned township, Navi Mumbai officials have the benefit of operating in a modern environment, allowing them to maximise Qognify’s Safe City solution. The Qognify Situator is an advanced Situation Management platform, and Qognify’s Video Management Solution controls the hundreds of surveillance cameras throughout the city. Role of standards in smart cities “Standards can assist in successfully deploying a comprehensive [safe cities] system with multiple technologies into a single, cohesive entity,” said Per Björkdahl, Chair of the ONVIF Steering Committee. “With the ability to integrate various sensors and data from many different devices synthesised through one interface, government officials and law enforcement are afforded a more complete picture of their city’s security.” Deployment of facial recognition technology Live video streaming within the smart and safe city’s infrastructure means video’s capabilities can go beyond simple evidence recording and evolve into a tool that allows operations teams to monitor and remediate against incidents as they are happening. Facial recognition technology can be added on to any video surveillance camera that is recording at a high quality This can be taken one step further with the deployment of facial recognition via live streaming video. Facial recognition technology can be added on to any video surveillance camera that is recording at a high enough quality to identify faces. The technology works by capturing video, streaming the live video back to a control centre and matching faces against any watch lists that the control centre owns. Importantly, the data of people who aren’t on watch lists is not stored by the technology. This technology can work to make the city safer in a number of ways. For example, facial recognition could spot a known drug dealer in a city centre where they weren’t supposed to be, or facial recognition could identify if a group of known terror suspects were visiting the same location at the same time, and this would send an alert to the police. Read parts one and three of our Smart Cities miniseries.
Safety and Security Things GmbH (SAST) will be both a first-time exhibitor at ISC West and also feature a larger booth – 1,800 square feet. The Bosch startup is looking to make a big splash in its first-time appearance at the largest security trade show in the United States. The International Security Conference & Exposition (ISC West) will be held April 10-12 at the Sands Expo in Las Vegas. Founded in September 2018 and based in Munich, Germany, SAST is building a new Internet of Things (IoT) ecosystem for the security and safety industry, including an app store, an open and secure camera operating system, a software developer environment, and a portal for providing knowledge and functionalities tailored to integrators. SAST’s open IoT platform The open IoT platform is based on an open standardised operating system for video security cameras The open IoT platform is based on an open standardised operating system for video security cameras that creates a common basis for innovation and growth for the security industry. Apps built on SAST will enable airports, restaurants, stadiums and other facilities to transform security cameras into smart devices. The first partners are already developing apps based on the SAST ecosystem. “We will bring all the partners of our platform together and will showcase the first applications already realised on the platform,” says Nikolas Mangold-Takao, SAST Vice President of Marketing and Product Management. “In order to showcase this effectively at ISC West, we will create a space to demonstrate solutions effectively. At the same time, we are using the booth as our meeting space and will create a collaborative environment for our partners and all participants.” IoT and access control “We want to ensure that all visitors of our booth (No. 10073) are getting to see first-hand solutions which are already realised based on first apps and cameras using our Operating System,” he adds. “We also want to demonstrate the benefits of the SAST platform for solution developers, integrators and manufacturers.” SAST is about bringing different players from the industry together in order to deliver better solutions" SAST will be looking for measurable results at ISC West. “On the one hand, we measure results by hard facts, such as the number of new partners who will join us and how satisfied our current ones are with the output,” says Mangold-Takao. “On the other hand, direct feedback from visitors at the booth, especially professionals from our industry and end-customers, is also extremely important to us, and we will measure it. SAST is about bringing different players from the industry together in order to deliver better solutions.” Openpath Access solution Another new exhibitor with a relatively large booth is Openpath, whose booth (No. 23051) will be 1,200 square feet. Openpath Access combines cloud-based software and sleek hardware with an app to enable hands-free access to an office using a smartphone that doesn’t need to leave your pocket. Although large for first-time exhibitors, the Openpath and SAST booths fall squarely in the “medium range” of overall exhibit sizes at ISC West – larger than the smallest 100-square-feet exhibits typical for many first-time exhibitors, but still smaller than the largest booths such as Hanwha Techwin America (5,500 square feet). In addition to the new exhibitors on the main show floor, the Emerging Technology Zone, located in the Venetian Ballroom, will welcome new startups in the security marketplace.
Case studies
Leonardo delivered the first two M-345 jet trainer aircraft to the Italian Air Force, which to-date has ordered 18 units from a total requirement for up to 45 aircraft. The new type of jet trainer aircraft, designated T-345A by the Italian Air Force, will gradually replace the 137 MB-339s which have been in service since 1982. M-345 jet trainer aircraft Marco Zoff, Leonardo Aircraft Managing Director, said “Building on our heritage and expertise in jet trainers, the M-345 will allow our customers to achieve a significant improvement in training effectiveness while at the same time reducing operating costs. This first delivery to the Italian Air Force is a key milestone, the result of a longstanding and productive team working closely together with the operator.” The new M-345 jet trainer aircraft, designed to meet basic and basic-advanced training requirements, will complement the in-service M-346, which is used for advanced pilot training. Integrated training system Leonardo’s integrated training system developed around the M-345 platform is representative of the company’s technological leadership in training pilots to fly current and future generation aircraft. The system benefits from experience with, and technology developed for, the M-346, which includes a ‘Live Virtual Constructive’ capability. This allows aircraft which are flying live training missions to incorporate simulated ‘friend’ or ‘foe’ elements into scenarios, allowing the pilot to be exposed to the full range of possible operational situations. M-345 HET (High Efficiency Trainer) The new M-345 HET (High Efficiency Trainer) reduces the time required for air forces to train pilots The M-345 is a high-performance aircraft which supports a pilot’s transition from basic trainers to latest-generation fighters. The Italian Air Force’s acquisition of the new aircraft is an important step forward in the modernisation of its fleet, with the M-345 replacing the MB-339A in Air Force’s second and third military pilot training phases. The M-345 has also been chosen as the new aircraft of the Italian Air Force’s acrobatic team, the ‘Frecce Tricolori’. The new M-345 HET (High Efficiency Trainer) reduces the time required for air forces to train pilots. It also gives trainees the chance to fly an aircraft that features higher performance characteristics than other basic/advanced trainer aircraft currently in service around the world. Delivering high quality training at low cost The performance of the M-345 allows it to carry out the most demanding mission types found in a training syllabus, delivering high quality training at significantly lower cost. The M-345 cockpit architecture is the same as that of frontline fighters. The aircraft is also able to perform operational roles, thanks to an extended flight envelope, with a high-speed maneuvering capability even at high altitudes, modern avionics systems, high load capacity and performance. Health and Monitoring Usage System The M-345 is designed with a long life-cycle and a two-level approach to maintenance The M-345 is designed with a long life-cycle and a two-level approach to maintenance, eliminating the need for expensive general overhauls. The aircraft’s Health and Monitoring Usage System (HUMS) also contributes to a lower cost of ownership. A sophisticated on-board training simulator confers a number of benefits. For instance, M-345 pilots are able to plan maneuvers before live training, allowing for higher efficiency during flight. Mission Planning and Debriefing Station Trainees are also able to fly in formation with other pilots in the air and those training on the ground in simulators, via a real-time data-link. The aircraft’s Mission Planning and Debriefing Station (MPDS) allow trainees to analyse the missions they have just flown. The M-345’s engine is a Williams FJ44-4M-34 turbo fan optimised for military and aerobatic use. The cockpit is based on HOTAS (Hands-On-Throttle-And-Stick) controls and features a glass cockpit with a three-colour MFD (Multi-function Display) touch screen. The aircraft’s heads-up display is mirrored on a fourth screen in the rear seat.
Security is the biggest concern for military facilities. Modern military facilities face a wide variety of risks, from cyber attacks to data theft to terrorist attacks. The Corpus Christi Naval Air Station in Corpus Christi, Texas for example, dealt with three separate attempted intrusions in a year and a half. In one incident, man driving a stolen SUV entered the base and attempted to exit through a separate entrance, but crashed his car and was then shot by security personnel. In another incident, just eight months later, the base went on lockdown again before an armed man was taken into custody. Then, in the third incident, seven months later, there was a third attempt to break into the base, this time by a man with known ties to terrorist groups. Protect sensitive facilities The man fired at the security guard at an entrance gate and struck her bulletproof vest before she raised the barrier to prevent the attacker from getting inside the base. The base’s security did a good job of preventing any serious damage during these attacks, but with the frequency of these incidents, more modern security may be needed to ensure that the next attack doesn’t end in catastrophe. Modern times call for modern security solutions, and Helios is the perfect option to protect sensitive facilities Modern times call for modern security solutions, and Helios by UVeye is the perfect option to protect sensitive facilities. Helios is safer, improves security, makes security officers’ jobs easier, works in extreme conditions, and can even identify vehicle passengers with high body temperatures to help prevent the spread of COVID-19. Helios UVIS uses machine learning and artificial intelligence to inspect the undercarriage of any vehicle that drives over its multiple high-resolution cameras. Improved safety for facilities It alerts the user on any irregularities or foreign objects hidden in the undercarriage. Inspecting the undercarriages of vehicles is very difficult for security personnel. Before Helios, there was never an effective solution for under-vehicle inspection, and even if security officers inspect the undercarriage, they may not know what to look for. They may not recognise a threat and allow a vehicle with a weapon, bomb, or other illicit or dangerous item to enter the facility. Security officers put themselves at great risk by manually inspecting vehicles, as evidenced by the attempted terrorist attack in Corpus Christi in May. With Helios, the security guard can inspect the vehicle from a safe distance by simply looking at the high-resolution images and checking for anything suspicious or unusual in the undercarriage. Detecting potential threats Scanning all vehicle types for undercarriage threats Automatic detection of illicit materials below the vehicle on the first pass Full integration to barriers, bollards and access control systems Driver and passenger fever detection capabilities No matter how well trained a security officer is, all humans make mistakes. However, with Helios, the chances of human error are greatly reduced. The system produces high-quality images of the undercarriages and alerts the security officer of any irregularities. It will even detect issues in the undercarriage of a vehicle passing through the system for the first time. Detecting potential threats is easy with UVIS. Works in extreme conditions The high-resolution images allow a security officer to see the entire undercarriage very clearly to determine whether there is anything suspicious. Instead of manually inspecting the vehicle and putting themselves at risk, security officers can inspect the vehicle from a more relaxed and safer environment and zoom in on the smallest details. Helios can withstand up to 20 tons per axle, meaning that it will survive being run over by massive vehicles Plus, Helios provides a side-by-side view of previous scans from the same vehicle if it has gone through the system before to make it easier for the officer to notice any differences. Helios can withstand up to 20 tons per axle, meaning that it will survive being run over by even massive vehicles. It is fully operational at temperatures between -20 and 40 degrees Celsius and is IP 68/54 compliant, meaning it offers full protection against sand, dust, or rain. Combat COVID-19 UVeye’s thermal sensor can also detect the body temperatures of vehicle passengers, which can identify visitors with potential fevers, improving the safety of everyone on the base. UVeye fully supports 3rd party integration and provides a multiple layer of security for any facility Integrations made in the past: ALPR Face Detection / Recognition Arm Barriers / Bollards VMS (Video Management System) Integrating to the centralised server provides the capability of connecting multiple systems or lanes across different sites while enabling central management and control via one screen. The centralised management system enables the client to access the different systems deployed and manage the different users and historical data. Access control systems The undercarriage of a vehicle is one of the most important parts of the vehicle to inspect, but also one of the most difficult areas to inspect. Helios is the perfect solution to prevent any weapons, bombs, drugs, or other illegal and dangerous items from entering military facilities. It can make everyone in the facility safer, including security officers, who will no longer need to manually inspect vehicles and put themselves in harm’s way. Integrating with other security and access control systems can provide a multi layer approach to tighten the entry and exit points to any sensitive site while keeping personnel and data safe.
Alberta Fire and Security in collaboration with CNS Digital Media is honoured and proud to announce a new commissioned CCTV System at Corinthia Royal, Budapest. The client, Corinthia Royal,Budapest, requested the design, installation and configuration of a holistic CCTV system by AVIGILON Trusted Security Solution. To come up with a proper compliant solution and a complete coverage, Alberta proposed the installation of a full Avigilon surveillance solution including over one-hundred Avigilon cameras with self-learning video analytics, 48TB Avigilon network video recorder, and Avigilon Control Centre video management software with Avigilon Appearance Search technology. Surveillance camera system Appearance Search video analytics technology uses deep learning artificial intelligence search engine Subsequently, Corinthia Royal Budapest sought to replace their analogue cameras by an end-to-end high definition surveillance camera system to maximise protection; to enable proactive event response and facilitate the recording; and to capture and sharing of clear footage. To address the above the Alberta proposed the installation and configuration of Avigilon Appearance Search technology system. Having this high tech surveillance system in place, enables the possibility to search for a person by incorporating unique characteristics of a face and appearance to find similar recorded footage of the same person or vehicle across multiple cameras installed on site, quickly and efficiently. In addition, Avigilon Appearance Search video analytics technology uses a sophisticated deep learning artificial intelligence search engine to sort through hours of footage with ease. Analyses video data Hence, saving the Hotel time and effort during critical investigations. This is possible because Avigilon Appearance Search technology intelligently analyses video data, helping to track a person’s or vehicle’s route and identify previous and last known locations. Alberta Fire and Security takes this opportunity to thank all the people involved and that made this project a success with special thanks to Mr Mate Feher, IT Manager, Corinthia Royal.
An important heritage site which played a key role in protecting the UK during World War II is itself being made safe and secure with the installation of a comprehensive and fully integrated security system, including more than 75 Dahua HD CCTV cameras. Battle of Britain Bunker The Battle of Britain Bunker is an underground operations room in Uxbridge, formerly used by No. 11 Group Fighter Command during the Second World War, most notably in the Battle of Britain and on D-Day. The operations room was one of the key parts of the world’s first integrated defence system, which linked Fighter Command with Anti-Aircraft Command, Barrage Balloon Command, the Observer Corps, radar, and the intelligence services. The site is run by Hillingdon Council as a heritage attraction with a museum and a visitor centre. Fully integrated security solution DSSL Group installed more than 75 Dahua HD CCTV cameras linked to a Genetec Security Centre VMS DSSL Group completed a full analysis of the existing CCTV and intruder alarm systems, with the aim of creating a fully integrated security solution, to enhance the security around the site, reduce manned security costs, and speed up remote security and police response times. Using the existing wireless network also designed by them across the borough, DSSL Group installed more than 75 Dahua HD CCTV cameras linked to a Genetec Security Centre video management system (VMS), as well as Axis IP PA speakers externally. All cameras are viewable by management and the security team on site, and also from Hillingdon Council’s main CCTV control room. Surveillance cameras with smart analytics using AI External cameras are equipped with smart analytics using AI, to help secure the perimeter of the site. In 2018, a state-of-the-art wireless CCTV system consisting of more than 1,000 Dahua HD cameras, along with Dahua NVRs, XVRs and control and viewing equipment, was installed across the borough by DSSL Group. More recently, an additional 1,000 Dahua HD cameras have been added to the council's network making it 2,000 in total. In addition to the cameras, DSSL Group installed a Honeywell Galaxy 62-zone intruder alarm system which feeds back to a central monitoring station and is also integrated with the VMS. Dahua CCTV system installed Cllr Richard Lewis, Hillingdon Council’s Cabinet Member for Cultural Services, Culture and Heritage, said “The Battle of Britain Bunker is one of Hillingdon’s treasured heritage sites. It played a pivotal role in the Second World War, and it’s important that we keep it protected. Dahua CCTV system will help us to do that with their state-of-the-art system and high performing cameras.”
Interface Security Systems, a pioneering managed services provider that delivers managed network, business security and business intelligence solutions to distributed enterprises, recently provided Thrive Restaurant Group, one of Applebee’s largest franchisees in the US, with scalable network, communications and security services. Business security systems platform The new solutions include a next-generation secure SD-WAN architecture with network upgrades, 4G/LTE wireless capability, unified communications as service (UCaaS) with cloud-based VoIP and a secure and standardised business security systems platform. As a significant update to Thrive’s outdated legacy systems, the new Interface solution unclogs productivity bottlenecks and gives the flexibility the restaurant chain needs to address changing customer preferences. Managing multiple network and voice providers We needed a partner we could count on to manage our network, voice, and security for all locations" With 81 restaurants across the United States, Thrive found itself struggling with challenges common to many geographically distributed businesses, including managing multiple network and voice providers, dealing with outdated CCTV hardware, and a lack of accountability from vendors. “With 81 restaurants across ten states, we needed a partner we could count on to manage our network, voice, and security for all locations,” explains Brian Houchin, Director of IT for Thrive Restaurant Group. Troubleshooting technical issues When it came to managing vendors, Thrive simply had too many. Troubleshooting technical issues was challenging as it was difficult to pin accountability on a specific vendor. In addition, tracking invoices, service credits and administering multiple vendors was an inefficient and time-consuming exercise every month. Outdated hardware and changing regulations also posed a challenge. Unreliable CCTV equipment left the restaurants, employees and customers vulnerable to security risks on-premises. Constantly evolving Payment Card Industry (PCI) compliance rules meant Brian Houchin had to devote hours of his limited bandwidth to keep up with the latest changes and updates, so that Thrive could avoid major penalties and security threats. With the COVID-19 pandemic significantly disrupting Thrive’s business, restaurant staff found it challenging to handle sudden spikes in call volumes, as they had to work with a legacy phone system that was not scalable. The lack of 4G wireless coverage, outside of the restaurant premises made curbside pickup and take-out services impossible to manage. Secure, scalable network and communications Thrive turned to Interface to implement a secure, scalable network and communications backbone that would unclog the productivity bottlenecks and give the flexibility the restaurant chain needed to cater to changing customer needs. Interface implemented a next-generation secure SD-WAN architecture with network upgrades to guarantee seamless connectivity between all of Thrive’s locations. To deliver a better guest experience for customers calling in with their orders and enabling curbside pickup and payment, Interface rolled out a 4G/LTE wireless network that also doubled up as a backup when the primary network failed. UCaas with cloud-based VoIP implemented With managed network services from Interface, Brian and Thrive never have to worry about PCI compliance With managed network services from Interface, Brian and Thrive never have to worry about PCI compliance. Interface also implemented unified communications as service (UCaaS) with cloud-based VoIP and auto-attendant features for Thrive’s locations to seamlessly route high volumes of customer calls to their dedicated order centre. “We wanted to take the call-in experience out of the individual restaurants and put it into the hands of professionals who weren’t in a hurry to get off the phone,” explains Brian Houchin, adding “The VoIP service from Interface lets us take additional orders, dramatically improving our customer experience and increasing revenue.” Deploying secure video surveillance platform To solve the limitations of Thrive’s legacy CCTV infrastructure, Interface delivered a secure video surveillance platform with easy remote viewing from any location and simplified access management to boost restaurant security. Thrive’s partnership with Interface has allowed the restaurant group to focus more on their growth strategy and long-term plans. By consolidating their SD-WAN, UCaaS, CCTV and 4G/LTE services with Interface, Thrive gets real accountability without having to deal with the vendor run-around. Perhaps the greatest advantage is Thrive’s ability to aggressively expand, confident that Interface’s 24/7 managed services will always be ready to support their growth. “We’ve had a chance to test out multiple vendors for network, communications and business security and Interface definitely has provided us the best experience,” concludes Houchin.
G4S is the globally renowned integrated security company with operations in approximately 85 countries. At the core of the business is G4S Integrated Security, which combines expertise, security professionals, technology and data analytics. G4S Integrated security G4S delivers integrated security around the world with the last six months having brought significant change for the company. The sale of the conventional cash business has enhanced strategic, commercial and operational focus and strengthened the company’s financial position. G4S is transforming, with an intensified focus on integrated security solutions strategy. They are winning business faster and growing stronger than ever before. Through the launch of the global G4S Academy, the organisation is offering an opportunity to share knowledge and work more collaboratively with customers. Sector specific solutions and a global approach to risk and investment in technology are delivering clear benefits to customers and differentiating G4S’s offering in the security market. Below are some examples of G4S Integrated Security delivered to customers around the world. G4S Americas In the United States, one of G4S Americas’ Security and Risk Operations Centre helps prepare for, monitor and respond to threats from one central location. The Security and Risk Operations Centre, based in Florida, provides integrated security solutions by seamlessly combining monitoring capabilities, data analytics, enterprise risk intelligence and global response services. Through actionable data and valuable insights, G4S experts are able to identify threats early and respond quickly. Their technology enabled intelligence-gathering and data analytics enable customers to know immediately when incidents occur. They also allow the organisation to support customers by optimising spend, mitigating risk and enhancing their security programmes. G4S Europe & Middle East The diverse team of highly-trained security professionals has adapted to the changing security climate At a Critical National Infrastructure site in southwest England, G4S’s connected security professionals use technology and data to assess threats, manage incidents, and keep a large workforce safe. The diverse team of highly-trained security professionals has adapted to the changing security climate and conduct automated fever screening, as people enter their site. Specially trained security professionals use the best technology, including G4S’s proprietary software RISK360, on this complex, long-term project. G4S RISK360 proprietary software G4S RISK360 proprietary software allows the team to manage incidents, instantly share information, and detect patterns and trends. The training of connected security professionals is tailored to the site. They are setting the gold standard on securing critical infrastructure. In 2019, the Singapore Government asked the industry to prioritise technology over manpower through ‘Outcome Based Contracting’. G4S won an important contract to secure 62 schools using the Threat, Vulnerability, and Risk Assessment (TVRA) Solution. Threat, Vulnerability, and Risk Assessment Solution TVRA risk-based solution combines access control, biometric time and attendance with patrol and response The TVRA (Threat, Vulnerability, and Risk Assessment) risk-based solution combines access control, visitor management systems, biometric time and attendance with patrol and response, incident reporting, and remote CCTV monitoring. G4S security professionals and Security Risk Operations Centre are in control of the situation, at all times, using cutting edge technology and data analytics. These are just some of the ways by which G4S is securing the world. G4S Africa In South Africa, G4S security integration of risk consulting, security professionals and technology, for a global FMCG brand, is underpinned by the organisation’s data analytics. G4S security professionals protect valuable goods that are delivered all over the country. From the G4S Security and Risk Operations Centre near Johannesburg, experts use G4S RISK360 proprietary software to enable secure and reliable deliveries. The security software provides critical data and analysis that is then used to monitor and deploy resources to the highest risk areas. This data is continually shared with the customer, laying the foundation for a partnership that is building a more secure future.


Products


Round table discussion
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
They say that every choice has a cost. It's a basic principle that, economically speaking, nothing is free. If it doesn't cost actual money, it may be expensive in terms of time, attention and/or effort. These are interesting observations to keep in mind as one peruses the various "free" video management system (VMS) offerings available on the market. Some are provided by camera companies to unify their products into a "system", even if it's a small one. Other free VMS offerings are entry-level versions offered by software companies with the intent of the customer upgrading later to a paid version. For more insights, we asked this week's Expert Panel Roundtable: What is the value of “free” video management systems (VMSs) and how can a customer decide whether “free” is the right price for them?
Artificial intelligence (AI) is a current buzzword in the physical security market – and the subject of considerable hype. However, AI sometimes get negative press, too, including dire warnings of its potential and eventual impact from some of our most prominent technology thinkers. We decided to take the issue to our Expert Panel Roundtable with this week’s question: What are the negative impacts and/or new challenges of AI for physical security?
Videos
HD CCTV: Manufacturers & Suppliers
- Dahua Technology HD CCTV
- Seagate HD CCTV
- Hikvision HD CCTV
- Axis Communications HD CCTV
- LILIN HD CCTV
- Avigilon HD CCTV
- Illustra HD CCTV
- Arecont Vision HD CCTV
- IDIS HD CCTV
- LTV Europe HD CCTV
- Bosch HD CCTV
- Sony HD CCTV
- Messoa HD CCTV
- Hanwha Techwin HD CCTV
- Vicon HD CCTV
- TruVision HD CCTV
- Panasonic HD CCTV
- Dallmeier HD CCTV
- Visionhitech HD CCTV
- FLIR Systems HD CCTV