At Secutech this year, on stand C6, Veracity will be demonstrating VIEWSCAPE, the integrated command and control solution developed to meet the needs of complex security applications. VIEWSCAPE is a real success story, now used in many smart cities, retail and critical infrastructure sites. VIEWSCAPE delivers a modular, advanced Command and Control platform with integration to multiple elements of CCTV and security, including video, access control, fire & intruder systems, intercom, buildin...
Johnson Controls updates its popular Illustra Pro camera family with the Illustra Pro Mini-Dome, featuring new Smart Wide Dynamic Range that optimises video quality while minimising configuration time. Available in a complete range of image resolutions and lens options, the Pro Mini-Dome is ideal for a wide variety of deployments in both medium and large-sized facilities. Smart Wide Dynamic Range available in the Pro Gen3 Mini-Dome reduces configuration time while greatly improving the quality...
Panasonic has expanded the i-Pro Extreme series with six new compact models which feature Infra-Red (IR) illumination, to provide accurate colour footage both day and night. This makes the range suited to high end surveillance applications, where the reliability of evidence is paramount should incidents occur. The inbuilt colour night vision functionality improves the user’s ability to distinguish between shades of clothing and cars in extreme low light environments (minimum luminance req...
Hardly any other topic is creating as much excitement as Artificial Intelligence (AI) at the moment. High expectations and extravagant promises abound, particularly in the field of video security technology: Here, the ideas about what it can do range from detecting unusual behaviours such as attacks on individuals to recognising individual faces even in large crowds of people to automatic detection of the proverbial ‘bomb in a suitcase’. The Regensburg-based company Dallmeier has be...
Hangzhou Hikvision Digital Technology Co., Ltd (“Hikvision”) has announced a new business team dedicated towards developing intelligent solutions for fentanyl-related substances regulation. This is a solid move to respond and contribute to the joint efforts between the governments of China and the U.S., together with the international community, to combat drug crimes and protect the public health and safety. Relying on Hikvision’s advanced video technology and big data analytic...
Zenitel Group, the provider of Intelligent Communication solutions is releasing a new strategy and platform at ISC West 2019: IC-EDGE. “Our industry is at an explosive inflection point”, said Jim Hoffpauir, President of Zenitel Americas. “CSO’s are demanding a security information management platform that can support intelligent communications across the enterprise. This includes supporting virtual security operation centers on premise or through a managed service. This...
Zenitel Group and AMAG Technology have collaborated to deliver to the market more innovative and intelligent integrated solutions. This comes at a time in the security industry where interoperability of core systems, and the high functionality of those individual system components, is most crucial. Zenitel and AMAG both acknowledge this demand and exceed it by providing easy to configure, plug and play solutions through IC-EDGE and Symmetry Access Control v9.1 and Symmetry CompleteView Video Management System platforms without compromising on visual quality or audio intelligibility. Responding to incidents in real-time “Voice communications are critical to the operation and to the security program of all organisations,” said Kelly Lake, Director, Strategic Alliances, Zenitel USA. “It provides a level of engagement at the time of need not found in other forms of technology. By integrating intelligible two-way and broadcast voice communications into a unified security strategy with access and video, the user can respond to any incident real-time without the lag time of a guard response.” “With a unified Zenitel and AMAG solution, the operator can more securely guard entrances with dual-authentication through audio and visual verification,” said Jason Schimpf, VP Product & Partner Programs, AMAG Technology. “Additionally, users can automate and synch responses to critical events, and fully manage all system reports through the Symmetry solution.” Intelligent communication solution Zenitel and AMAG are designed to expand in order to continuously meet the needs of any industry so that as a company grows, security can easily accommodate new demands. This ensures that the investment a company makes in an intelligent communication solution is one that will continue to be effective as it adapts to meet the ever-changing environments of your unique enterprise. “When you are able to see, hear, and interact from virtually anywhere, you are able to make better decisions and be more efficient with your resources,” said Lake. “It is the only way to be truly present at the time of need.”
ShotSpotter, Inc., the provider of gunshot detection solutions that help law enforcement officials identify, locate and deter gun violence, announces a new technology innovation unit – ShotSpotter Labs – to expand the company’s current efforts supporting innovative uses of its technology to help protect wildlife and the environment. ShotSpotter Labs is launching with an initial focus on helping combat rhino poaching in South Africa. Later this year, the unit intends to explore other applications for global wildlife protection such as combatting illegal blast fishing in Malaysia with underwater sensors. Multiple poacher apprehensions In 2014, ShotSpotter began a pilot of its gunshot detection technology in the Intensified Protection Zone of Kruger National Park in South Africa, home to 60% of the last remaining rhinos. Given the vast expanse of the park, most poaching incidents went undetected with carcasses found days or weeks after the fact. With the introduction of ShotSpotter to detect, locate and alert park rangers to gunfire incidents in under 60 seconds, there have been multiple poacher apprehensions within the coverage area since its debut. The resulting speed and accuracy of the response not only increases our chances of making contact and effecting an arrest" “ShotSpotter changes the game by giving our rangers the exact location of the shot within seconds,” said Glenn Phillips, Managing Executive of Kruger National Park. “The resulting speed and accuracy of the response not only increases our chances of making contact and effecting an arrest, but over time we hope will send a powerful message to poachers to stay away.” Unmanned aerial vehicles In addition to significantly expanding coverage area in the park, ShotSpotter Labs plans to integrate with unmanned aerial vehicles (UAVs) for automated dispatch to the precise latitudinal and longitudinal coordinates of the gunfire. The UAVs will provide a video stream to rangers so that they can track the poachers. ShotSpotter has had to adapt its sensors and software for use in the sprawling expanse of Kruger National Park with no electricity available to power sensors. These types of system innovations required for anti-poaching are already being applied in other applications such as solar-powered sensors in freeway deployments with limited access to electricity. “I’ve seen the devastation to the rhino population firsthand in South Africa and it’s meaningful that ShotSpotter can make a difference to help these amazing animals survive for future generations,” said Ralph A. Clark, president and CEO of ShotSpotter. “This kind of engagement is not only the right thing to do, but it’s also an opportunity for us to develop innovative technology that can ultimately be incorporated back into core products across our business.”
Verint Systems Inc. announces several enhancements to its Situational Intelligence Platform that help organisations strengthen their security strategies while providing Actionable Intelligence to improve operations. Sitting at the core of the Intelligent Security Operations Center (ISOC), the Situational Intelligence Platform provides a suite of integrated features that enable complete situational control in complex security environments. This integrated, modular and flexible platform drives a better user experience, facilitates real-time monitoring, provides greater situational awareness, and helps security teams respond faster and more efficiently to situations when they occur. Face mounting business These innovations are critical because cyber and physical security threats are becoming more prevalent while data is growing exponentially Customers and the market at large face mounting business and security challenges, and that has propelled Verint to infuse more analytics and automation into its Situational Intelligence Platform. These innovations are critical because cyber and physical security threats are becoming more prevalent while data is growing exponentially, driving organisations to seek more advanced solutions to better address risk. Security managers and operators rely on a multitude of solutions and systems to ensure comprehensive protection, which results in an enormous volume of data to analyse. This influx of information can often be overwhelming, and in most cases, manual processes are needed to manage an event across all security components for full awareness, which is a significant barrier to automation. Predictive threat model Verint’s ISOC concept is designed to address this challenge head on. The ISOC aggregates multiple systems into a single interface and exposes it to an analytic layer that results in the delivery of Actionable Intelligence. The ISOC facilitates utilisation of artificial intelligence (AI) and machine learning to analyse data across an enterprise’s domains and assess how it impacts the business as a whole. By unifying data to enable the detection and identification of risks, enterprises can move to a more predictive threat model. Verint’s Situational Intelligence Platform consists of several modules that can be implemented separately or as part of the integrated platform. Intelligence-powered response One of the platform enhancements announced is VMS One. With this enhanced module, users gain a single, consolidated platform for the ISOC with video at the center and seamless correlation of sensors and alarms, allowing operators to immediately gain complete situational control while determining the appropriate intelligence-powered response. In addition to VMS One, the enhanced platform provides new capabilities in the Dispatch, FaceDetect and Incident Management modules The solution fuses all relevant information, such as video, alarm notification, device state, analytics meta-data, search output and more, onto a dynamic GIS-map based interface, providing a clear and immediate picture of an incident and enabling faster and more efficient response. In addition to VMS One, the enhanced platform provides new capabilities in the Dispatch, FaceDetect and Incident Management modules. Intelligent security strategy “As threats continue to grow in complexity, mission-critical organisations face significant challenges,” said Alan Stoddard, vice president and general manager, situational intelligence solutions, Verint. “Each component of our suite of solutions is a critical part of our intelligent security strategy developed to address customer requirements for a more effective, intelligent approach to security operations and risk management. Now, our customers are equipped with comprehensive options designed to further synchronise IT, cyber, and security operations across infrastructures and proactively address and mitigate modern-day threats.” Global businesses operate in complex environments in which opportunities, requirements, and regulations can vary widely, change quickly, and evolve significantly over time. New technologies will continue to improve business operations, enhance strategic partnerships, and increase situational awareness. All of this is part of the effort to gain a more predictive risk model within the enterprise to prevent rather than react. To learn more about Verint solutions for the ISOC, visit Verint solutions at booth #26049 during the ISC West conference in Las Vegas, April 10-12.
Qognify - the trusted advisor and technology solution provider for physical security and enterprise incident management – reveals the advances that have been made since the acquisition of On-Net Surveillance Systems, Inc. (OnSSI) and SeeTec GmbH in January. The company is delivering its expanded product portfolio, complemented by enhanced service and support for its expanded global customer-base and network of channel, technology and camera partners. The new unified company will demonstrate how it is ‘Safeguarding Your World’ on Booth 13074 at ISC West in Las Vegas, April 10-12, 2019. Provider of VMS, PSIM and video analytics Qognify is dedicated to supporting and developing its portfolio of award-winning technologies, including VMS platformsQognify is one of the largest VMS, PSIM and video analytics providers for mid-market and enterprise organisations and CEO, Steve Shine states: “Our customers place a premium on their physical security strategy, either because of the complexity of their needs, or the specifics of the industries in which they operate. Therefore, our focus is to deliver the solutions they need to achieve their required outcomes.” From its research and development centres in Germany, Israel and the United States (as well as additional offshore resources), Qognify is dedicated to supporting and developing its premium portfolio of market-leading and award-winning technologies, including VMS platforms – VisionHub, Ocularis, Cayuga, NiceVision and FAST, and enterprise incident management platform – Situator. Benefits for customers Shine adds: “Qognify, OnSSI and SeeTec have always shared a similar solutions philosophy. Thus, it was a logical step to combine these companies in order to accelerate global growth and to extend the portfolio of products and technologies available to customers, resulting in faster access to new markets and vertical industries.” Customers are benefiting from expanded professional services offering, customisation capabilities and support Customers are already benefiting from expanded professional services offering, customisation capabilities and worldwide support. Furthermore, the ability to share developments across three of the market’s leading VMS solutions such as camera integrations, gateways, analytics and mobile applications, is creating some very exciting opportunities for organisations. In addition to its headquarters in Pearl River, New York, Qognify has regional offices positioned throughout Europe and Asia, ensuring it is geographically close to all its customers and partners.
Maxxess Systems, the innovator in security solutions that empower total situational awareness for security enterprises, is debuting the company’s Maxxess InSite Awareness and Response Coordination System to the American market here at ISC West 2019 (booth #6065). Maxxess InSite uniquely combines security, communications, business intelligence and data integration on a single, easy-to-use platform. “Maxxess InSite empowers total awareness by providing users with unprecedented capabilities far beyond basic system management and incident detection to help prevent incidents from happening,” said Nancy Islas, President of Maxxess Systems.Maxxess InSite enables early incident detection and action, allowing users to correlate data, improve response coordination “A new benchmark for security and business intelligence software platforms by every standard of measure, Maxxess InSite coordinates the activities of first responders and the people they are assisting from the moment a threatening event is detected with unprecedented simplicity of operation.” Early incident detection and action Maxxess InSite Awareness and Response Coordination System combines ‘system intelligence’ and ‘human intelligence’ to detect and respond to unfolding events in real-time – all of which are queued, organised and displayed on a highly-intuitive user interface. Maxxess InSite enables early incident detection and action, allowing users to correlate data, improve response coordination, and deal with issues when they’re small – before they become large and costly. Maxxess Insite harnesses the power of myriad system technologies, effectively expanding their collective capabilities while also making human interaction more intuitive. Combines technologies onto a unified platform It meshes the capabilities of virtually any system and technology onto a unified platformIt meshes the capabilities of virtually any system and technology onto a unified platform including: video surveillance; access control; two-way communications; GPS/IPS location technologies; intrusion detection; fire safety systems; perimeter detection/protection; HVAC/building management; smart phones and tablets; ID/credential badging; guard tour; visitor management; time and attendance; license plate recognition; panic device/hotkey emergency notification; reporting/forensics; wireless sensors; elevator/escalator control and database integration. Over 50 different manufacturers are already integrated with Maxxess InSite, providing more capabilities and functionality than any other cross-platform solution available. New integrations include: Mercury LP and MR62e controllers; OTIS Elevator Compass Overwatch; enhanced Milestone Systems’ MIP and Geutebruck GeViScope integrations; as well as new integrations with Salient Systems, Avigilon, ISS (Intelligent Security Systems), Nedap and RemotePoint.
SilverShield Safety & Information Systems, providers of the industry’s most advanced cloud-based, multi-platform solution, is featuring their new Self-Service Visitor Management Kiosk at ISC West this week. The kiosk is integrated with the SilverShield Visitor and Incident Management System to enable unmanned registration for visitors and guests. “Our Self-Service Kiosk helps organisations secure all of their entry points so they know who is on premises at all times, even those entry points that are unmanned,” said Robin Baker, CTO, SilverShield. “Even a single uncontrolled entrance could otherwise compromise the safety of the facility.” Silent alert notifications Visitors can self-register with the SilverShield Kiosk (SS Kiosk) using a Mac or PC computer, iOS or Android device. The process is fast and easy; users enter their credentials manually, scan their valid IDs, or scan a SilverShield Quick Badge. Once a visitor’s details are entered, SS Kiosk notifies a Kiosk Monitor (e.g., system administrator or security guard) that a visitor has completed check-in; they can then initiate access or deny access if the visitor’s details match any watchlist or sex offender entries. If a visitor’s details are matched with any watchlist or sex offender entry, the Kiosk Monitor may initiate silent alert notifications to any stakeholders the organisation chooses. Also, if the visitor that is denied access becomes a further threat, the Kiosk Monitor can initiate any additional internal or external alarms they feel are needed (e.g., Alert Security, Hard Lockdown, etc.) which produce mass emergency notifications. “The SilverShield Self-Service Kiosk ensures that all visitors are correctly checked-in, screened and badged,” said Baker. “It’s one more way that SilverShield Systems helps keep your facility safe and secure.”
Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilised by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year drew to a close, holiday and Christmas markets as well as major New Year’s Eve events, presented cities with constant public event security needs. The public nature of these events increases risks of incidents with high-speed vehicles that put attendees in danger. Fortunately, there are three ways for public space managers to prevent casualty-causing collisions and further promote the use of local public areas. Developing an effective action plan When strategising how to react to an alert, think about what time of the year and time of day the event is occurring It is important to have a plan developed before an incident or accident occurs. Warning systems, utilising doppler radar and digital loop technologies, alert guards to abnormal vehicle velocity changes in the surrounding area. Managers of public areas should organise a meeting with public safety authorities and local agencies to discuss what must immediately occur when a high-speed vehicle is approaching a public event. When strategising how to react to an alert, think about what time of the year and time of day the event is occurring. Having such a reaction plan in place combines technology and strategic planning to ensure everyone is on the same page to effectively target a threat and promote overall event safety. Securing public areas Ideally, there will be no need to implement a well-conceived action plan. After all, taking preventive measures to secure public areas where events take place is important to keep people safe from accidental vehicle collisions and intentional attacks. Protect attendees by clearly separating pedestrian and vehicle locations using security devices such as – Barricades Portable barriers Bollards Install guard booths Avoid the risk of vandalism and theft, making sure people are safe when walking back to the cars at night by keeping parking areas illuminated with flood lights. Install guard booths with employees who monitor activity in the parking area and who are prepared to react if an alert is triggered. Furthermore, prevent accidental collisions by clearly marking the parking area with informative warning signs and using barricades to direct traffic. These three tips can be used by public area managers to promote security at the next community event. Additionally, the technologies used to secure an event can also be used as infrastructure for year-round security. Installing gates that shut when the public space is closed or using aesthetically pleasing bollards are steps any public area manager can take to promote community safety.
According to the reports of not-for-profit organisation Gun Violence Archive, the year 2018 has seen 323 mass shooting incidents as of November 28 in the United States. This number is 346 for the year 2017 and 382 for 2016 (more statistics are available here), with “mass shooting” defined as cases where four or more people are shot or killed in the same time period and location. While definitions of mass shooting vary with organisations in the US, the count of over 300 incidents per year, or about once per day on average, is simply alarming. It raises public safety concerns, ignites debates and protests, which in turn lead to public unrest and potentially more violence, and increases costs for governments from the regional to federal level. Most importantly, the loss of lives demands not only improvement in post-incident handling and investigation, but also new prevention technologies. Gunshot detection solutions AI weapon detection offers a more efficient alternative to prevent active shooting There are several gunshot detection solutions in the security market, commonly used by law enforcement agencies to detect and locate gun fires. These systems function based on acoustic recordings and analyses and often in combination with signals detected by sensors of the optical flash and shockwave when a gun is fired. However, gunshot detection by nature dictates that the law enforcement can only react to a shooting incident that has occurred. With fast action, law enforcement can prevent the incident from escalating, but lives that are lost cannot be recovered. With the development of artificial intelligence in object recognition, AI weapon detection offers a more efficient alternative to prevent active shooting: AI can visually detect guns based on their shapes before they are fired. The AI is trained to recognise firearms in different shapes, sizes, colours, and at different angles in videos, so that the AI weapon detector can be deployed with existing cameras systems, analyse the video feeds, and instantly notify security staff when a gun is spotted. Comparison of the advantages for law enforcement and public security agencies Legacy gunshot detection using sensors AI weapon detection Reactive measure: detect after guns have been fired Proactive measure: detect before guns are fired Time to action: within 1 second Time to action: within 1 second Unable to provide visual data about shooter(s) Can provide data about shooter(s) based on the camera recording: clothing, luggage (backpack, handbag, etc.), facial features, vehicle Unable to track the location of the shooter(s) before and after shooting because of the lack of sound Can track the shooter(s) using AI Person & Vehicle Tracking, AI Face Recognition, and AI License Plate Recognition False detection caused by similar sound such as fireworks and cars backfiring Minimal to no false detection, as AI can distinguish different types of handguns and rifles from normal objects (umbrella, cellphone, etc.) Require physical deployment of gunshot detection sensors Can be used with existing camera systems, do not require special hardware Complicated to deploy, require highly trained professional Easy to deploy as an add-on to existing video surveillance system - Can integrate with gun-shot detection to create a “double knock” audio and video active shooter alert system Gun-shot detection advantages In addition to advantages for law enforcement and public security agencies, this type of visual-based pre-incident detector has three-fold advantages for the public: Save lives by spotting the shooter before the shooting event. Minimise the chaos entailing an incident: panic and chaos caused by a shooting incident often adds to injury, as people run, fall, trample on others… With an AI weapon detector, when a gun is spotted, the system sends an alert to security staff, who can quickly control the situation in an organised manner and apprehend the intending shooter. Can be added as a SaaS (Security as a Service) component to small business and home surveillance systems, e.g., intrusion detection alerts (home invasion incidents with firearms number over 2500 per year nationwide). For a complete active shooter detection system, video-based AI detector can operate in conjunction with gunshot detectors for enhanced security. Traditional X-ray based weapon detection or metal detection entrance systems are complicated and expensive; with AI video technology, active shooter detection system can be cost-effective, and after all, what price tag can one put on a life? Written by Paul Sun and Mai Truong, IronYun
Today’s security leaders encounter many challenges. They have to operate with reduced budgets and face challenging and evolving risks on a daily basis. Security leaders are often ignored and only called upon when needed or in disaster situations. Many don’t have an ongoing relationship with the C-suite because the C-suite doesn’t understand the value they bring to the whole business. In order to resolve these challenges, a security leader can apply a risk-based approach to their security program. According to dictionary.com, risk is “exposure to the chance of injury or loss; a hazard or dangerous chance”. Risk is broader than a security concern and involves the entire business. Through utilising a 3R model - considering resources, risks and resolutions - a security leader can evaluate the output from the model to build the foundation of a strong plan. This allows the leader to make security decisions based on a quantified risk measure. A business determines what resources it wants to protect, what risks it needs to protect the resources from and what resolutions it can put in place to mitigate the risk. Decisions are based on measurable evidence. Free online risk assessment tools are available to provide a fast, easy way to determine an organisation's basic security risks through an investigative approach The 3 Rs The first step in the 3R model is to figure out what resources need protection. This could be physical - such as buildings, critical infrastructure or valuable equipment, knowledge-based - such as intellectual property, or organisational - such as people or governance structure. Understanding the business will help the security leader develop a list of critical elements. Look for tangible resources such as buildings and machinery, and intangible resources like reputation, knowledge and processes. Second, determine what the resources need to be protected from. Anything that threatens harm to the organisation, its mission, its employees, customers, partners, its operations or its reputation could be at risk. These can include contextual risks (workplace safety or natural disasters), criminal risks (theft or cybercrime) or business risks (compliance or legal issues). Anything that threatens harm to the organisation, its mission, its employees, customers, partners, its operations or its reputation could be at riskFree online risk assessment tools are available to provide a fast, easy way to determine an organisation's basic security risks through an investigative approach. The tools ask several questions and determine risk based on an organisation’s location and the answers provided. Security leaders can also work with security companies and consultants that offer risk assessments to determine their company’s needs, and then offer solutions based on that assessment. The third objective is to determine how businesses can best protect the identified resource. The last of the 3 Rs - resolutions - are those security activities that enable the business to mitigate the impact of security risks. Resolutions can potentially prevent a security incident from occurring, contain the impact to resources if an event does occur and also assist the organisation in recovering from an impact more quickly or easily. The first step in the 3R model is to figure out what resources need protection, this could physical such as buildings or critical infrastructure The path forward Understanding what risks a business faces in totality provides an opportunity for the security leader to collaborate with other department heads. This gives security leaders an opportunity to engage with functions outside their norm as well as a chance to demonstrate their subject matter expertise. A risk-based approach also helps security leaders fully understand an organisation’s needs and concerns, which they can communicate to the C-suite to help them make better business decisions. Metrics can also help business leaders understand the cost/benefit of resolutions C-suite and executives help define an acceptable level of security risk tolerance to resources and make quality, educated decisions about mitigating security risks. Through collaborating with security leaders using a risk-based approach and the 3R model, metrics and reports show the impact of security expenses, and there is a transparent view of security risk. The final decision about how to mitigate and resolve risks is up to the business owner of the resource and the risk stakeholders. To obtain funding, show the risk and value of resources exposed to potential impact. Then present the recommended resolution that reduces the potential level of impact and the associated cost benefit savings. By providing this information, security leaders can ensure that the business owners can make an educated decision. Measuring success A risk-based approach aligns the security mission with the organisation’s mission. Security leaders should have these conversations with their business leaders on a regular basis. Understanding the thresholds of risk tolerance and showing when incidents or activities are trending outside of acceptable boundaries will help business leaders make educated decisions. The 3R model also helps a business to track occurrences, quantify the direct and ancillary impact and make continuous adjustments to the security program Determining a baseline of acceptance gives a foundation for security leaders to point out when the organisation is not meeting its own requirements. Metrics can also help business leaders understand the cost/benefit of resolutions and demonstrate when costs may be trending outside of acceptable boundaries. The 3R model also helps a business to track occurrences, quantify the direct and ancillary impact and make continuous adjustments to the security program. It is important to note that this process is not stagnant, and needs to be constantly revisited. Examining risks, resources and resolutions in a systematic way will help security leaders understand what they are protecting Defining risks and vulnerabilities Continuous conversations using the 3R model also help business leaders understand what security risks could interfere with meeting business objectives. It also aligns the total cost of ownership for the security program with the business value of the resources at risk.The approach puts the security risk decisions in the hands of the ones impacted by those risks And it defines the security role as risk management, not just task management. The approach puts the security risk decisions in the hands of the ones impacted by those risks…the “owners” of the resources. Examining risks, resources and resolutions in a systematic way will help security leaders understand what they are protecting, what they are protecting it from, and how they can help prevent, contain or recover against a specific risk. Followers of this approach are in a better position to ask for funding because they can clearly define and quantify risks and vulnerabilities. Applying these principles will equip security leaders with the knowledge needed to have better dialogue with colleagues in other departments, encouraging more proactive discussions about security.
Recent technology advances – from the cloud to artificial intelligence, from mobile credentials to robotics – will have a high profile at the upcoming ISC West exhibition hall. Several of these technologies were recently designated by the Security Industry Association as the Top 8 security technologies for security and public safety. Some of them will also be a focus at the ISC West conference program, SIA Education@ISC, April 9-11 at the Sands Expo Center. This article will highlight some of those conference sessions. Topic: Cloud Systems and Video Surveillance as a Service (VSaaS) Managed Video Services are saving TD Bank $500K annually, April 9, 2:45 to 3:45 p.m. Why TD Bank decided to roll out a managed services solution, what it took to deploy and how the bank is saving an astounding $500,000 annually. IT 4.0 and Video Surveillance: A Guide to the New Terminology and What It Means to You and Your Customers, April 11, 1:15 to 2:15 p.m. How IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers, including explanations of terms such as cloud data centers, personal clouds, the edge, IoT sensors and data analytics. One of the sessions to cover how IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers Topic: Artificial Intelligence (AI) In Video and Other Systems The Challenges and Opportunities of AI in Physical Security, April 10, 3:45 to 4:45 p.m. Looking toward what the future may hold for AI in physical security; the challenges and opportunities the technology has created; and how participants can leverage AI and machine learning with existing customers to grow their business. Deep Learning Demystified: Next-Generation AI Applied to Video, April 11, 9:45 to 10:45 a.m. Dispelling the myths of the terms “deep learning” and “artificial intelligence,” and what the technologies can do in practical terms. Modern cameras find and identify faces and vehicles, analyse behavior and organise and control assets Neural Processing and Smart Cameras, April 9, 8:30 to 10 a.m. Deep learning-capable hardware is evolving at a frantic pace, and GPU and NPU (neural processing unit) co-processors are commonly embedded in cameras and video management systems. Modern cameras find and identify faces and vehicles, analyse behavior and organise and control assets. Analytics in the Video Central Station: Proper Deployment, Programming and Configuration to optimise operational and cost efficiencies, April 11, 3:45 to 4:45 p.m. How analytics plays a critical role in reducing alarm traffic in a central station environment, allowing them to save money and realise other operational and performance efficiencies. Topic: Robotics and Autonomous Devices Robotic Aerial Security – Growth Trends and Best Practices, April 10, 11 a.m. to noon The lion’s share of growth in the robotic aerial security sector will come from autonomous systems and changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices How to Adapt to Address Drone Security, April 11, 1:15 to 2:15 p.m. Drone industry professionals and a physical security design engineer will cover the realistic applications of drone systems and counter-drone solutions that can protect organisations and facilities. Next Generation Threat: Racing Drones, April 11, 2:30 to 3:30 p.m. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices. This session will identify the potential risks these drones can pose to facilities, special events, and critical infrastructure. Establishing a Corporate Drone Program, April 10, 9:45 to 10:45 p.m. Is a corporate drone program an appropriate addition to an existing security program? How to understand and navigate the regulatory challenges and processes associated with starting up a commercial-use drone program. The Rise of Intelligence in Physical Security, April 11, 9:45 to 10:45 a.m. “Intelligence” incorporates a variety of subdomains from artificial intelligence to machine learning and contextual analysis. It is rapidly becoming a focus in the realm of IT security – and increasingly in the realm of physical security, too. Changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present Topic: Mobile Credentials Finding Their Place in Access Control How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. At the center of convergence is one crucial building block: strong irrefutable identity powered by biometrics. Driving the Future: How Interoperability Standards in Access Control Can Enable Smart Building Success, April 9, 1:30 to 2:30 p.m. Growing user demand is driving new open platform approaches and the adoption of interoperability standards Growing user demand for unfettered and unlimited third-party integrations is now driving new open platform approaches and the adoption of interoperability standards. They are changing the dynamic of access control and its role within the smart building environment. Topic: Facial Biometrics in Professional Solutions How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. Securing workstations, virtual desktops, turnstiles, front doors, mobile devices and more, biometric authentication is helping enterprises and governments worldwide to realise a more secure future. Topic: Voice Control in the Smart Home Environment Delivering the Smart Home of the Future, April 11, 3:45 to 4:45 p.m. With the proliferation of connected smart devices, including voice control devices, consumers have a growing array of options for defining what their Smart Home experience could be.
In the physical security industry, the advent of artificial intelligence (AI) and deep learning is most commonly associated with potential improvements in video analytics performance. However, AI is also applicable to a variety of content analytics beyond video. This is part three of our 'AI in Physical Security' series. It will be interesting to watch how companies that take the next step beyond proving viability for security purposes to deliver true business applications to the market. Right now, we’re seeing organisations working hard to develop content analytics that perform in an effective, efficient and accurate manner. Enterprise software companies This shift will create a huge disruption in our industry and cause further consolidation Many of these organisations are true AI and/or computer vision companies, and they are spending a lot of money developing very advanced algorithms. However, there’s still work to be done identifying the real benefit of these analytics for customers as part of comprehensive business intelligence solutions. Until that happens, and customers understand how those benefits apply to them directly, adoption will continue to be lower than all the marketing hype would suggest. Data capture form to appear here! Because data analytics are becoming such a significant component of today’s ‘big data’ solutions, watch for a number of large, enterprise software companies to start focusing on the security industry. This shift will create a huge disruption in our industry and cause further consolidation. Analysing mobile endpoints There is also a potential for machine learning to enable cybersecurity companies to predict the nature of future attacks based on past behaviour, similar to how Netflix displays what you want to watch based on what you’ve previously viewed. According to Jack Gold, president and principal analyst at J. Gold Associates, this innovation can assist cyber companies to transition away from a ‘signature-based’ system to detect malware. Instead, he sees more companies adopting a machine learning approach that aims to analyse past incidents in a broader manner and aggregate information from a multitude of sources. A main function of AI is to analyse past incidents in a broader manner and aggregate information from a multitude of sources Specifically, some machine learning applications for cybersecurity are effective at doing the following: detecting malicious activity, helping security officers determine what tasks they need to complete in an investigation process, analysing mobile endpoints, decreasing the number of false positive threats, automating repetitive tasks like interrupting ransomware, and potentially closing some zero-day vulnerabilities. Android mobile endpoints A number of tech giants have invested in these capabilities recently, including Google, which is employing machine learning to help protect Android mobile endpoints. Amazon also bought a startup called harvest.AI to help it aggregate and better understand data located on the S3 cloud storage service. Machine learning can help cybersecurity efforts, but it can’t replace many important functions Ultimately, machine learning can help cybersecurity efforts, but it can’t replace many important functions. There will always be sophisticated attacks that no machine learning algorithm will be able to find. Pairing human intellect with machine technology is the best approach. In another application, AI-driven robots can be deployed for security in places where it may not be feasible to have a human patrol, such as the outskirts of a vital electric substation located hundreds of miles from the nearest town. Evolution of artificial intelligence A robot can easily traverse the harsh terrain and notify authorities when something is amiss. Another use is during disaster recovery efforts. Robots don’t get tired, and they don’t have to use the bathroom, eat or take a break. With the abilities afforded by AI, robots can also navigate any designated area autonomously to keep an eye out for suspicious behaviour or alert first responders to those who may need aid. In situations where health and safety concerns preclude the ability of having a human to watch the site, such as at toxic waste dumps, robots can be deployed. Although drones still largely require a human operator to chart their flight paths and control their movements, the evolution of artificial intelligence is also revolutionising the capabilities of machines to work autonomously. If you missed part two, see it here. Or, to start from part one, click here.
The Global Security Exchange (GSX) seems smaller this year, which is not surprising given the absence on the show floor of several big companies such as Hikvision and ASSA ABLOY (although their subsidiary HID Global has a big booth). A trend affecting the number of companies exhibiting at GSX 2018, and other trade shows, is industry consolidation, which is impacting the show even beyond the fewer exhibitors this year in Las Vegas. GSX is the new branding for the trade show formerly known as ASIS. There was an impressive crowd of visitors waiting for the show floor to open Tuesday morning; the conference part of the program began on Monday. After the attendees filed through the doors, the foot traffic seemed brisk throughout the morning, and was somewhat steady until the end of the first day. Exhibitors as a whole seemed pleased with the first day and cautiously optimistic about the rest of the show. Acquisitions and consolidation HID Global announced on the first day that they will acquire Crossmatch - emphasising the impact of consolidation Emphasising the impact of consolidation on the industry as a whole, and on this show, was an announcement from HID Global on the first day that they will acquire Crossmatch, a biometric identify management and secure authentication solutions provider. It’s a comparatively large acquisition for the company specialising in trusted identity solutions. Just days earlier, another acquisition also seemed to confirm the trend when UTC Climate, Controls and Security — the owner of Lenel — announced an agreement to acquire S2 Security. The fruits of another recent acquisition was on display at the GSX 2018 hall, where Isonas took its place near the front entrance as part of the Allegion booth, just three months after the global security provider acquired the ‘pure IP access control company.’ Isonas is well positioned in two of the three fastest growing segments of the access control market — IP hardware, which is growing 41 percent per year globally, and access control as a service, or ‘cloud’ technology, which is also outpacing the overall access control market. Allegion also has the third fast-growing segment, wireless locks, covered with its Schlage brand. "New avenues of growth" The early days of new ownership is opening fresh opportunities for both organisations as Allegion seeks to leverage Isonas’ intellectual property and the smaller company finds new avenues of growth in the larger organisation, says Rob Lydic, Isonas Global Vice President of Sales. Motorola joined Avigilon in a higher profile role at their booth, emphasizing consolidation in the industry Lydic sees a likelihood of additional acquisitions in the near future in the security space, given the large amount of capital currently available to be deployed, and the large number of entrepreneurial companies looking to make the leap, as Isonas did, from a small booth at the back of the hall to front-and-center as part of a big industry player. Another reflection of consolidation: Motorola Solutions is taking a much higher-profile role in the Avigilon booth. In addition to signage, ownership by Motorola is also impacting the Avigilon product offerings. For example, the Motorola Ally security incident management and communications system has been integrated with Avigilon’s analytics-based event detection, and is being positioned to serve the enterprise market. The system simplifies security operations with a single platform that allows access to critical data, including video and access control systems, directly from any web-enabled device. Another reflection of consolidation: Motorola Solutions is taking a much higher-profile role in the Avigilon booth Avigilon is displaying Motorola Solutions’ CommandCenter Aware integrated with Avigilon’s systems for use with public safety applications to provide dispatchers and intelligence analysts with video feeds, incident details, alerts, data mapping and responder location. Avigilon has also integrated its AI-driven Appearance Search technology with its Access Control Manager system, so video searches can be performed based on a badge credential. The system can automatically pull up any information, whether video or events in the access control system, based on the badge information. It can also be used to search for lost badges, or to view where a person is located in the building. Avigilon introduced an AI appliance that allows existing cameras to be integrated with Appearance Search The company introduced an AI appliance that allows existing (non-Avigilon) cameras (up to 20 two-megapixel cameras) to be integrated with Appearance Search. Also, the next generation of analytics allows detection of more things, such objects a person may be holding, or detection based on what they are wearing. The growth of the cannabis market Although attendees at GSX are generally understood to be more end users than integrators, Joe Grillo, CEO of ACRE, the parent company of Vanderbilt Industries and ComNet, says he sees little difference in attendees at GSX compared to the ISC West show in the spring. “We see all our resellers here,” he says. Grillo noticed that Day One booth traffic was “not consistently busy, but steady.” Grillo says ACRE expects to be active again soon in the mergers and acquisitions market. The company has grown through six acquisitions since its founding, and has had one divestiture (when it sold Mercury Security to HID last fall). Since selling Mercury, ACRE has been ‘back in the buying mode,’ just looking for the right opportunity, says Grillo. New markets are a theme at GSX, and one of the biggest new opportunities is the cannabis industry. Marijuana has been legalised in dozens of U.S. states, and Canada is on the verge of legalising the drug. March Networks works with multiple cannabis operators to provide video solutions, point-of-sale transaction data, and customer analytics March Networks is among the companies targeting the cannabis industry in a big way. Already across the U.S., March Networks works with multiple cannabis operators to provide video solutions, point-of-sale transaction data, and customer analytics. The business intelligence solutions also aid compliance in the highly-regulated industry. March Networks provides radio frequency identification (RFID) tag to track plants throughout the channel, and tracking is integrated with video systems to provide correlated video views. A couple of exhibitors mentioned to me the need for commercial companies to deploy a comparable level of automation as their employees are accustomed to in the smart home environment. That suggests a need for things such as smartphone integration and voice commands. One exhibitor putting its toe in the water is Hanwha Techwin, which showed an Amazon Echo device used to control a video management system (VMS) with voice commands. Could the simple integration be a preview of the future of control rooms, where security officers merely talk to their equipment rather than operating controls? We’ll be talking to more companies (and maybe a few machines) on Day Two of the show, and will be reporting what we hear.
Genetec Inc., a technology provider of unified security, public safety, operations and business intelligence solutions, announces its solutions have been selected by the Royal Borough of Windsor and Maidenhead (RBWM) for region-wide CCTV monitoring and community safety purposes. The new system will result in better coverage across the borough and enable information to be quickly shared with regional police as and when required. At the heart of the programme is a completely refurbished monitoring centre, equipped with the Genetec flagship unified security platform Security Center and other complementary Genetec security solutions. KiwiVision privacy protector The open federated architecture of the Genetec infrastructure provides the foundation for a system that can scale and evolve as needs change These include the KiwiVision Privacy Protector to simplify GDPR compliance, Genetec Mission Control to guide operators in providing a consistent response to incidents and Genetec Clearance for the easy and secure sharing of evidence with local law enforcement. The open federated architecture of the Genetec infrastructure provides the foundation for a system that can scale and evolve as needs change. It also allows RBWM to protect its past investments by retaining the majority of its existing cameras, alongside the 200 that will be added, upgraded or relocated. “The safety of residents and visitors in the borough is a priority, and we are pleased to be installing a new-state of the art system that delivers this,” said Cllr. Mike Airey, cabinet member for environmental services. Improved information sharing “We not only benefit from reduced operating costs and improved information sharing with local police, but we also gain access to cutting edge privacy controls that make it far simpler for us to maintain our compliance with the EU GDPR and other data protection regulations.” The project began when specialist town centre video surveillance consultancy firm Global MSC Security (MSC) was called in to assess the Royal Borough’s existing analogue video surveillance system, its fitness for purpose and how it could be cost-effectively improved. This resulted in a competitive tendering exercise won by Computerised & Digital Security Systems Ltd. Cost-effective response (CDS) who designed a state-of-the-art wireless camera system to support the Genetec open architecture video management system (CDS) who designed a state-of-the-art wireless camera system to support the Genetec open architecture video management system. Some of the key technical benefits delivered by CDS include full HD recording, advance graphical mapping, advanced incident response, customisable and extended video storage retention, and various features to aid data protection regulation compliance such as automated pixelisation of images and end-to-end encryption to enhance privacy controls “Genetec is delighted to see our solutions chosen by the Royal Borough of Windsor & Maidenhead for this well thought out upgrade that will benefit the council, local police and citizens”, added Dan Meyrick, Regional Sales Manager, Genetec Inc. “I would like to thank and congratulate our partner CDS for producing a high quality and cost-effective response that delivered against the customer’s requirements.”
Three leading Australian universities are introducing SafeZone technology from CriticalArc in a drive to improve safety, increase their security teams’ capabilities and provide better care for students and staff. With 30% of Australian universities now using SafeZone, this latest wave of roll-outs confirms CriticalArc’s position as the most comprehensive safety and security management solution provider in the Australian market. Adding to CriticalArc’s growing network of customers, the University of Tasmania (UTAS), the University of Southern Queensland (USQ) and the University of the Sunshine Coast (USC) have more than 75,000 students and staff working in 33 campuses and associated facilities across four States, meaning that SafeZone now serves the needs of 1.5 million students and staff at more than 500 locations across the world. Ensuring best safety standards SafeZone is a key tool in enabling campus security to be more effective, more relevant and more approachable"“UTAS, USQ and USC each have their own unique character and particular priorities but ensuring the best standards of care for students and staff is top of the list for all of them,” says Robert Christie, CriticalArc’s Customer Success Manager, Asia Pacific. “Preventing crime, managing public safety and handling emergencies are still the top concerns of university security teams, yet SafeZone is also enabling those teams do much more to address issues that are increasingly important. "From improving support around mental well-being to tackling sexual harassment and making campuses inclusive environments where everyone can feel safe and welcome, security and response teams are playing a much bigger role than they traditionally did. SafeZone is a key tool in enabling campus security to be more effective, more relevant and more approachable.” Notifications in the event of emergencies SafeZone puts individuals directly in touch with response teams at universities, hospitals, government departments and similar large organisations, making it easy for them to use their mobile phones to request help, trigger an emergency response, receive rapid notifications in the event of emergencies and benefit from a wide range of customer-care services. With the ability to ‘geo-fence’ any location, each of the universities’ security teams can now monitor care and safety of users wherever they areThe technology also lets students and staff share their situation with response team members by checking-in when working alone outside hours or in higher-risk environments such as laboratories and workshops. With the ability to ‘geo-fence’ any location, each of the universities’ security teams can now monitor care and safety of users wherever they are – including those working out-of-hours on campus, those travelling between campuses locally or on field projects, or travelling overseas for study or research placements. Precise location of vulnerable individuals With its global reach combined with its ability to precisely locate vulnerable individuals, SafeZone is helping universities around the world to better meet their duty of care obligations, says Darren Chalmers-Stevens, CriticalArc, Managing Director. “SafeZone offers all the functions that university teams want, in one easy package. It is not only helping them to deliver better care, it is letting them demonstrate this fact in an accountable way.”
CNL Software, a provider of Physical Security Information Management (PSIM) software, is pleased to announce that its award-winning PSIM technology was used to support a multiagency security program for Super Bowl LIII. The company’s IPSecurityCenter PSIM solution is installed in the Atlanta Police Department’s Video Integration Center (VIC) and helps secure the city and surrounding metro area, keep the metro area’s transportation networks and systems safe, and to help law enforcement personnel make sense of the huge volume of video intelligence that is generated day-to-day and during large-scale events like Super Bowl. Provide law enforcement Atlanta is no stranger to hosting large-scale events, which includes a previous Super Bowl, and has invested in a multitude of surveillance, analytic, data fusion, and communications systems and technologies in recent years. The City has also established an innovative public-private partnership, known as Operation Shield, that effectively leverages the surveillance assets and infrastructure of other participating Atlanta metro area departments and agencies, including the City’s Metro Atlanta Rail and Transit Authority (MARTA) and Hartsfield Jackson International Airport, and the City’s business community, while also bridging communication gaps between and across them. IPSecurityCenter by CNL Software integrates these disparate systems in the Atlanta Police Department’s VIC to provide law enforcement IPSecurityCenter by CNL Software integrates these disparate systems in the Atlanta Police Department’s VIC to provide law enforcement and other public safety professionals with the data and video intelligence they need to effectively respond to incidents before they arrive on scene. Crowd size monitoring “Estimates are that nearly one million people travelled to Atlanta for Super Bowl Week. As with all major events, ensuring public safety and security is a big job and huge concern,” comments Mike Mostow, General Manager – Americas at CNL Software. “IPSecurityCenter was installed in the VIC by the Atlanta Police Department to provide the real-time situational awareness and decision support they need to ensure public safety and security during large-scale special security events like Super Bowl LIII.” IPSecurityCenter PSIM is installed in some of the largest public safety and security programs in some of the world’s largest cities. The platform enables the most intelligent integration of the widest range of disparate public safety, security, emergency management, and homeland defence system and sensor technologies, including video and video analytics, facial recognition, license plate recognition, crowd size monitoring, gunshot detection, chemical, biological, radiological/nuclear and explosives detection, geospatial mapping, and asset tracking.
Exabeam, the next-gen SIEM company, announces that NTT DATA Corporation (NTT DATA), its partner and one of the providers of technology and services for government and business, has chosen to secure its global operations using Exabeam’s Security Management Platform (SMP), which provides unlimited data collection, machine learning and analytics for modern cyber threat detection and response. NTT DATA’s internal system is used throughout more than 50 countries and regions, 210 cities and by 34,500 employees in Japan and 75,500 employees overseas. It is a fast-moving company that has acquired many businesses over the last five to 10 years, resulting in the inheritance of a number of different legacy SIEM platforms. However, these solutions were lacking, and NTT Data wasn’t obtaining the visibility it needed to keep pace with modern cyberthreats. Disparate legacy systems Exabeam was already our valued partner, and we were so confident in the company’s security solution" “Exabeam was already our valued partner, and we were so confident in the company’s security solution, we decided to use it ourselves, to remove complexity and unify our disparate legacy systems that were ineffective at protecting against modern threats,” said Hiroshi Honjo, head of Cyber Security and Governance at NTT DATA. “Having Exabeam’s unlimited data lake and attractive pricing model made the difference for our large organisation.” Exabeam’s SMP provides NTT DATA with scalable, behavioural modelling, machine learning, and advanced analytics for comprehensive insider and entity threat detection throughout Japan, APAC, North America, and Europe. This functionality was vital to the NTT DATA team because they required greater visibility into potential cyberthreats throughout the organisation and in all locations around the world. Automated incident response “NTT DATA’s journey was a unique one, since they had multiple legacy logging platforms in use globally. Exabeam was able to replace or consolidate each system using our next generation platform, and we accomplished the initial rollout in a matter of months,” said Nir Polak, CEO, Exabeam. “The swiftness of that transition is critical to maintaining secure operations, especially when dealing with such a geographically dispersed enterprise.” Automated incident response allows teams to respond to security incidents rapidly and with less effort Automated incident response allows teams to respond to security incidents rapidly and with less effort. At the SMP’s foundation is the Exabeam security data lake, designed to store all event logs at a predictable and flat price. This frees the NTT DATA security team from manually analysing data logs – and instead they can focus on quickly identifying and responding to security threats. SIEM solution According to Honjo, “The second phase of our project will be to look at use cases and fine tune the SIEM solution to work for our business needs. Overall, we are very happy with how well Exabeam met our stated deadlines and how quickly we are able to realise value from the product. We look forward to introducing Exabeam to our global customers.” Recently, Exabeam was identified by Gartner, Inc. in the 2018 Magic Quadrant for Security Information and Event Management. The company was positioned as a Leader based on completeness of vision and ability to execute.
An integrated security system that includes new IP cameras and two-way audio technology has seen the rate of injuries as a result of attacks on Post Office staff decline by 36% in just three years. This follows the deployment of a sophisticated monitoring and intelligent threat detection platform from Morphean, a Video Surveillance-as-a-Service (VSaaS) innovator, which has not only helped to keep staff safe but has also protected ATMs from attack, helping to keep Post Office doors open. Post Office is responsible for the safety and well-being of 14,500 workers in 11,600 branches. The very nature of their combined service offering and the fact they are often located in rural areas, means branches are prime targets for thieves. Threat intelligence Opportunistic attacks on staff and equipment, and the use of expanding gas to break open ATM machines is not uncommon Opportunistic attacks on staff and equipment, and the use of expanding gas to break open ATM machines is not uncommon. In rural communities, attacks on equipment can leave branches out of operation for long periods. In the last year alone, there were 13,437 violent attacks on convenience store workers, 27% of which involved a weapon and 39% led to injury, according to The Association of Convenience Stores (ACS) annual Crime Report. The Post Office security team wanted to build on its existing threat intelligence and response system, Grapevine, with a network of IP cameras and two-way audio into branches. Axis Communications cameras, microphones and speakers, connected to the Morphean Platform and hosted in the cloud, were installed in pilot branches by Kings Secure Technologies. Security automation Now that trial implementations have been completed successfully, the security team plans to expand coverage rapidly. In addition to the cameras, the networked speakers enable control centre staff to speak directly to customers and suspected criminals, alerting them to the fact they are under surveillance. The solution is also optimised to use low bandwidth dataFurther integrations are under way to bring security automation to other branches, such as providing the ability for remote agents to lock on-site safes in the event of an attack. Because of the challenges around connectivity in the areas where the most vulnerable branches are situated, the solution is also optimised to use low bandwidth data and is capable of streaming video over a 3G mobile network. Built-in intelligence The built-in intelligence of the Morphean Platform means staff are able to monitor footage for suspicious behaviour, such as individuals loitering near an ATM, and issue an alert to security teams who can then decide on the appropriate course of action. If it’s someone trying to find their wallet, no action is taken; if a crime is in progress, police will be notified along with video footage. In addition, staff are able to trigger an alert manually using an under-the-counter activation button, which can be investigated immediately by control centre staff at the alarm receiving centre (ARC). “The safety of our staff is our number one priority,” says Physical Security Manager for Post Office, Mark Dinsdale. Make significant differences Footage goes straight to the Morphean cloud, and the platform compresses video and is fully encrypted end-to-end" “We’ll never completely eliminate crime in our branches, but we are also not powerless against it and we are able to make significant differences to the safety of our people, as demonstrated by the new technology we are deploying.” “Post Officers, particularly those in remote areas without access to a nearby police station, value the easy access to help and now report feeling much safer at work,” he concludes. Paul Ottley, Account Director at Kings Secure Technologies, says there are more subtle benefits to the Morphean Platform. “Footage goes straight to the Morphean cloud, and the platform compresses video and is fully encrypted end-to-end. This means that even if criminals attempt to destroy cameras or on-site storage appliances, recordings of any incidents are secured in a manner that is admissible as evidence. This eliminates the challenge of sending out an engineer to collect footage. It’s a simple solution that is flexible and fully compliant with regulations such as the GDPR.”
Police in the Belgian city of Lokeren can now respond more effectively to criminal incidents – thanks to an upgraded video surveillance solution that features 120 Sony security cameras, including the rugged SNC-VM772R 4K minidome camera. Lokeren video security system Like all urban centers, Lokeren faces the challenges of crime, vandalism and antisocial behavior in its streets, public buildings and open areas. Until recently, the municipal police force relied on analog security cameras to assist with detecting and responding promptly to incidents. However, these cameras’ limited resolution and image quality often prevented efforts to prosecute individuals as they could not be successfully identified. In response to requests from citizens to maximise their safety, Lokeren police chiefs and city politicians pledged to upgrade their video surveillance capabilities. In particular, the urgent need was identified to improve the accurate recognition of suspects caught on camera – an even greater challenge at night or on dull, poorly-lit days. Full HD and 4K network surveillance cameras Security specialists DS-Consulting therefore recommended upgrading Lokeren’s video security to a combination of Full HD and 4K network surveillance cameras. A competitive comparison by DS-Consulting saw Sony’s outdoor minidome and fixed box-type cameras compare favorably with other brands. The rugged SNC-VM772R 4K minidome camera delivered significantly better images in tough low-light conditions “There was only one choice when we compared the image quality of Sony’s security cameras against other market-leading brands” states Emiel De Smet of security specialist DS-Consulting. “They offer so much more detail and clarity – and that makes all the difference in critical surveillance applications.” SNC-VM772R 4K minidome camera In particular, the rugged SNC-VM772R 4K minidome camera delivered significantly better images in tough low-light conditions. The camera’s large-sized Exmor R CMOS image sensor allows it to capture more light than ordinary sensors. This allows it to ‘see’ suspicious activity clearly in conditions of almost complete darkness, where less sensitive cameras struggle. Installed by Belgian integrator Seris Technology, the complete surveillance solution features a video management platform by Genetec Security Center plus 120 strategically located Sony cameras, providing 24/7 coverage of city center streets as well as public buildings, including Lokeren’s police station, central library and city hall. Crime prevention and 24/7 video monitoring The new cameras give police a clearer picture of criminal activity in the city streets, assisting with the positive identification of suspicious persons even at night and in low light conditions. Round-the-clock video footage is routed via an optical fiber network, where images are monitored in the central dispatch office at police headquarters. Since the cameras’ installation, city police have seen a reduction in crime levels, accompanied by greater peace of mind for residents and visitors.
Round table discussion
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
The beginning of the school year and upcoming seasonal changes remind us that demand for security systems, like almost everything else, is seasonal to some extent. Making improvements to educational facilities during the summer months – including installation of security systems – is the most obvious example of seasonal demand, but there are others. We asked this week’s Expert Panel Roundtable: Which vertical markets for security are impacted by seasonal changes in demand?
Video cameras are everywhere, and hundreds more are installed every day. Our society appears to be reaching a point of perpetual surveillance. It certainly feels as if we are always being watched even though it is not yet the case. But as cameras are becoming more common than ever, we are also entering a new era of privacy concerns and sensitivities, as evidenced by GDPR and other such initiatives. We presented this quandary to this week’s Expert Panel Roundtable: Surveillance cameras can go anywhere, right? Where is it “not OK?”