Industrial security systems
It is possible to visualise sound and the user doesn’t have to be an acoustic engineer to make sense of it either: the FLIR Si124 industrial acoustic imaging camera produces a precise acoustic image that is overlaid in real-time on top of a digital camera picture. The blended visual and sound image is presented live on screen, visually displaying ultrasonic information and allowing the user to accurately pinpoint the source of the sound. Acoustic imaging is used for two primary purposes:...
ATG Access has achieved the international ISO 45001 standard, having demonstrated an outstanding commitment to occupational health and safety (OH&S) as part of its ongoing ambition to enhance trust and professionalism across the security sector. The manufacturer of road blockers, bollards and vehicle barriers has become one of a small number of businesses across the UK to be accredited to the ISO 45001 standard, after undergoing a comprehensive audit of its OH&S processes. Reduced insu...
With its major global Innovation Splash in November, MOBOTIX AG is placing 18 new hardware and software solutions on the market at once. New products The first hemispherical camera that combines infrared and LED white light in a single system is a major highlight. In addition, there is a new convenient dome camera, hemispherical modules, and Thermal CIF modules specially designed for perimeter protection for the MOBOTIX7 cameras with up to 105° wide angle of view (FoV). A fiber optic...
Video surveillance is by no means a new addition to the security market, and in fact, is one of the few solutions that almost every vertical requires. However, because so many VMS systems deployed today are outdated and utilise older technology, most businesses are not experiencing the full scope of security across their organisation as they could. Containerised VMS v/s traditional VMS Containerised VMS systems have all the prerequisites pre-configured and installed for functionality and...
Herta launches a new version of its marketing solution that now displays a control panel with relevant information about the behaviour of visitors in a business. The new version of BioMarketing has a Dashboard that shows real-time information on the performance of a business and allows users to view online data on the number of visitors and their recurrence, the average dwell time, or the level of occupancy. ROI on analysis The information of the new product allows to have a deeper descriptio...
Diversity in a company’s workforce is arguably more important now than ever. Societal awareness of the importance of diversity has grown, and many people see diversity as an important factor that reflects positively (or negatively) on a company’s culture and image in the marketplace. We asked this week’s Expert Panel Roundtable: What should the security industry do to promote workplace diversity?
Intersec, the globally renowned emergency services, security, and safety event, has announced that ex-MI6 Chief, Sir Alex Younger is one of the first announced international headliners, speaking for the first time in the UAE, as a guest speaker. Ex-MI6 Chief, Sir Alex Younger Alex Younger joined the United Kingdom’s Secret Intelligence Service (SIS), also known as MI6, in 1991 and served as a Diplomat and Undercover Operative. He was appointed Chief or ‘C’ of MI6 in 2014 and retired in 2020, making him the longest-serving Chief in 50 years. Throughout his career, Alex was posted to the Middle East in highly sensitive roles Throughout his career, Alex was posted to the Middle East in highly sensitive roles. He also acted as the Senior SIS Officer in Afghanistan, a position that marks him out as one of the world’s top authorities, on matters related to human rights in the country. Intersec’s Global Security Leaders’ Summit He will be sharing his unique insights, as the best minds in the industry gather, between January 16-18, 2022, at Intersec’s Global Security Leaders’ Summit, one of six conferences at the event, with hard-hitting discussions featuring global leaders debating and exchanging perspectives on challenges, strategic initiatives and cooperation, to foster safety and security of all. The full programme features over 500 speakers, the largest conference platform for the sector on a world class stage. Commenting on his participation at the event, Sir Alex Younger said, “I am delighted to be speaking for the first time in the UAE at Intersec, and at a time when conversations for the Security and Safety industry has been thrust into the spotlight from recent global events.” He adds, “The Middle East has always fascinated me - the ever-shifting intricate dynamics of geopolitical relationships in the region and the impact they have internationally create a complex security landscape that I have been immersed in for much of my career.” Intersec 2022 For this industry, Intersec offers the most valuable platform for knowledge exchange" Alex Younger stated, “For this industry, Intersec offers the most valuable platform for knowledge exchange, on the protection of citizens from existing and future threats, and I look forward to sharing my perspective on a topic, which remains a global priority.” Sir Alex Younger is recognised for his unrivalled understanding of the region and has also spoken widely on matters pertaining to human rights in Afghanistan, academic freedom and the geopolitical nature of China’s digital and technological interests in western infrastructure. Intelligence and security community veteran Alex Nicholl, Messe Frankfurt Middle East’s Head of Intersec, said “Intersec’s commitment to bringing the brightest, most qualified experts to the stage in 2022 is at the forefront of our strategy, to deliver the most relevant content for our audience. Sir Alex Younger is undoubtedly a legend in the intelligence and security community, and his storied career in the Middle East makes him the perfect addition to our conference line-up.” Alex adds, “This is Mr. Younger’s first time speaking publicly in the UAE and his participation underscores the value Intersec is bringing to its visitors, with exclusive opportunities, to engage with and learn from the very best in the industry. We are delighted to have Sir Alex onboard and look forward to welcoming him at the show.” Safety and security of future generations The 23rd edition of the flagship event is being held under the patronage of His Highness Sheikh Mansoor Bin Mohammed Bin Rashid Al Maktoum, at the Dubai World Trade Center, in Dubai, UAE and will be focused on the theme of ‘Uniting the world’s leading industry specialists for the safety & security of future generations.’ Demonstrating Intersec’s strategic importance to the UAE, Official Supporters include Dubai Police, Dubai Civil Defense, Security Industry Regulatory Agency (SIRA), the UAE Cyber Security Council and Dubai Municipality.
Due to the GPS in mobile phones, users live in a world where friends and family can track each other’s every move, mobile apps, and smart home devices to meet up, stay connected, and even watch one another make it safely home. But in an emergency, if a person calls 911 from a mobile phone, the operator likely has less information than a rideshare driver. Despite significant advances in technology that allows for the collection and sharing of geolocation information, few severely underfunded 911 centres have been able to utilise it to help save lives. Funding to modernise 911 centres At the same time, its been reported that staffing shortages and increased demand on 911 centre operators have contributed to longer than normal hold times for emergency calls, further tying the hands of emergency operations centres. Modernise 911 call centres to give them the capability to use geolocation and other types of data to find and help people This could change if Congress approves federal funding to modernise 911 call centres, giving them the capability to accept and use geolocation and other types of data to find and help people in their greatest time of need, as well as to seamlessly transfer calls to available operators in neighbouring communities that can process emergency calls and request assistance. Negotiators in the House Democratic caucus recently whittled down the initial proposal for $10 billion in funding to only $500 million. It is unclear what the final number will be or how much the smaller sum could deliver—but, simply put, some level of funding is imperative. Voice call versus digital message With today’s smart and connected homes, first responders have the potential to receive so much more, and better, information. For instance, today’s smart alarm systems can, with customer consent, include images from internet-connected cameras; motion detectors can verify people’s presence within a structure; perimeter cameras can capture a license plate or vehicle make and model. It’s the difference between a 911 operator getting a voice call to report a burglar alarm versus a digital message with the alarm location, a photo/video montage of a person breaking in, what kind of vehicle the suspect was driving, and whether the suspect is in the house. Better data lead to better rescue outcomes Similarly, it’s the difference between a 911 operator getting a report of a smoke alarm versus knowing what room(s) the smoke is coming from, how many people (including children) are in the house (and in what rooms), and whether there are pets. This level of intelligence not only helps people in distress but also helps protect first responders. This information is available right now, but outdated 911 call centre technology cannot yet receive it. Death of the landline The proliferation of mobile phones means that a growing number of calls can’t be automatically tracked Traditionally, a phone number was linked to a physical address because the phone was physically installed in the home or apartment. When a person called 911, an operator automatically knew the location. But the proliferation of mobile phones means that a growing number of calls can’t be automatically tracked. More than 80 percent of 911 calls now come from mobile phones, according to the FCC. While this may not be a problem if the caller can provide the address, it is less helpful in situations where a person is injured or fears for their safety, is close to their attacker, (e.g., domestic violence), or if they don’t know their exact location. Help is increasingly needed outside of the home Nearly 1 in 3 Americans live in a county that experienced a weather disaster between June and August of 2021, according to a Washington Post analysis of data from FEMA and the U.S. Census. When disasters hit, lines of communication are sometimes limited, people flee their homes for safer places, or they can become trapped in transit, meaning they frequently can’t be traced using the current 911 technology. If the current weather-related disaster rate continues, it will become even more important for 911 operators to automatically receive GPS location information. Existing tech could save 10,000 lives per year FCC estimates that if first responders could arrive just one minute faster, they would save an additional 10,000 lives per year It’s long-past time to modernise 911 call centre technology. Lives are at stake. The FCC estimates that if first responders could arrive where they need to be just one minute faster, they would save an additional 10,000 American lives per year. How many more could be saved with better information from smart homes and devices? If a driver can find a customer to deliver her takeout meal, an ambulance should be able to use the same geolocation data to save a life. Congress has the authority to act now to save lives and support 911 call centre personnel and the first responders who rely on the data they collect and supply by funding a national Next Generation 911 system upgrade. ADT calls on Congress to come together in support of the first responders and 911 centres to better protect and connect what matters most.
Vismo announces the rollout of what3words location technology on its global location monitoring and safety platform, to help organisations respond to incidents more effectively - and keep their employees as safe as possible. Vismo provides a proven, since 2012, resilient location monitoring and safety service to businesses, public sector organisations and NGOs, ensuring their travelling or remote employees can be located and protected while at work. It does this via the Vismo App, which is used by almost 0.5m customer employees worldwide, many in FTSE 100 and Fortune 500 companies. Using what3words addresses gives employees a simple way to describe, via the app, precisely where help is needed, enabling organisations to find and get resources to the scene faster. When a user presses the Red Alert or misses a Check-In on the Vismo App, administrators will receive an email and SMS notification with the details, including the what3words address. what3words in action Using what3words is useful in rural or unknown areas, where finding a precise location can be difficult" Craig Swallow, Vismo CEO, says, “Integrating what3words into our platform gives Vismo an extra edge in helping our clients and their employees. It gives administrators - those involved in the escalation process at the client end - a simple way of understanding the precise location of one or more employees. In an incident, it’s critically important to be able to convey information quickly and easily to administrators. Valuable time, and therefore lives and wellbeing, can be saved.” “Using what3words is especially useful in rural or unknown areas, where, using traditional means, finding a precise location can be difficult.” Swallow adds, “Emergencies, from a road collision in the middle of the countryside to an incident outside a sports or music stadium gate, can happen anywhere. In an emergency, identifying precisely where help is needed is key. The what3words approach to location identification uses a combination of three words that is unique to a location. ///kite.chats.dine, for example, is very useful to have – and is helping to save precious time, resources and lives every day."
The Physical Security Interoperability Alliance (PSIA) announces it has approved the Secure Credential Interoperability (SCI) 1.0 specification. The PSIA has been working with a broad group of industry pioneers in the access control industry to come up with this specification, which is likely to have a significant influence on the future of secure mobile credentials. Mohammad Soleimani, the Chief Technology Officer of Kastle Systems and the Chairman of the SCI Work Group, introduced this concept to the organisation in 2020 and has had a strong influence in engaging other companies in its development. Compatible secure credential “A standard for secure mobile credentials has been long overdue in the industry. SCI relies on established standards and the Public Key Infrastructure, to provide a simple, but elegant solution,” said Soleimani. SCI addresses the need for a universally compatible secure credential for the physical access control industry in the form of cards, fobs, mobile devices, and wearables. Progress has been dramatic, with the technology being demonstrated at a PSIA technical meeting in August featuring apps from IDEMIA and Johnson Controls and a Kastle reader developed by WaveLynx. “It has been our mission from day one, to drive secure credentials and interoperability into the market” said Laurie Aaron, Executive Vice President at WaveLynx Technologies Corp. “Joining PSIA to collaborate and execute on a standard that is made available to all, has been a fast track to mission success.” Different mobile platforms The SCI specification helps the industry to take steps towards the last mile of credential evolution" One of the important characteristics of SCI is its interoperability across different mobile platforms including iOS and Android or devices with the ability to generate ephemeral key pair, which can be communicated over various protocols such as BLE (Bluetooth Low Energy), NFC (Near Field Communication), and UWB (Ultra-wide band). “The SCI specification helps the industry to take steps towards the last mile of credential evolution where interoperability of credentials can exist. The simplicity of the use of a public key leveraging standards and best practices ensure a secure and open way to manage credentials that takes proprietary out of the picture.” says Jason Ouellette, the Head of Technology and Business Innovation for Johnson Controls Access Control and Video Solutions business. Security industries’ efforts Participants in the spec development include, ASSA ABLOY, Deister Electronics, Farpointe Data (a dormakaba company), HID, IDEMIA, Kastle Systems, LenelS2, rf IDEAS, SentryCard, Siemens, and Johnson Controls. “This is an important milestone in the security industries’ efforts to enable flexible, interoperable and scalable solutions,” states Peter Boriskin, Chief Technology Officer for ASSA ABLOY Opening Solutions Americas. “It will be essential to consider how this and other standards apply across various industries, and how current and emerging standards impact each other.”
Eagle Eye Networks announced it ranked 307 on the Deloitte Technology Fast 500™, a ranking of the 500 fastest-growing technology, media, telecommunications, life sciences, fintech, and energy tech companies in North America, in its 27th year. As the number one provider of video surveillance solutions for the third year in a row, Eagle Eye earned the number 12 overall spot in the category of Electronic Devices/Hardware. The company grew 403 percent during that period. Cloud and artificial intelligence Eagle Eye Networks CEO Dean Drako said the company’s alignment with two major trends – the move to cloud and adding artificial intelligence (AI) to cloud video surveillance – contributed to the company’s stellar growth. “I firmly believe that the confluence of cloud and AI is revolutionising video surveillance around the world,” said Drako. “Eagle Eye is at the forefront of this revolution, delivering technologies that will make the world a safer place and businesses more efficient.” Customer experience In the face of challenges, the best and brightest were able to pivot, reinvent, and transform and grow" “Working with our global network of reseller partners and an extensive ecosystem of API partners, Eagle Eye Networks’ success is driven by four key components: great customer service to earn our customers business; cybersecurity to keep customer data protected; product features and capabilities to deliver the privacy customers want and resellers need; and reliability to ensure systems are always available for our customers.” “Each year the Technology Fast 500 shines a light on leading innovators in technology, and this year is no exception,” said Paul Silverglate, vice-chair, Deloitte LLP, and U.S. technology sector leader. “In the face of innumerable challenges resulting from the pandemic, the best and brightest were able to pivot, reinvent, and transform and grow. We celebrate the winning organisations and especially the talented employees driving their success.” Need for innovative solutions “The pandemic has underscored the urgent need for tech solutions in a variety of areas across health care, fintech, energy tech, and entertainment, to name a few, so reliance on innovators like the winners of the Technology Fast 500 is more important than ever,” said Christie Simons, partner, Deloitte & Touche LLP and an industry pioneer for technology, media, and telecommunications within Deloitte’s audit and assurance practice. “These companies are not only at the cutting edge, transforming the way we do business, but most importantly, recognise the strategic importance of ongoing innovation, especially in the ever-changing world of technology.” Eagle Eye Networks ranked 187 as a Technology Fast 500™ award winner for 2020, and it earned number 133 in 2019.
Rescu Prime launches a GPS emergency alert system that cross-references geographical information, counties, zip codes, data lists of local authorities, and more to determine a user’s exact location and contact the closest available emergency response, team. The app can dispatch emergency responders anywhere in the United States to a user’s exact location in only two taps, offering the fastest way to get help during an emergency. Two-way SMS chat In addition to these groundbreaking GPS features, Rescu Prime is also launching two-way SMS chats with Rescu dispatchers, empowering users to quietly communicate the details of their emergency. The feature is ideal for the hard of hearing or anyone who doesn’t want to give away their location. Round-the-clock security Wherever your travels take you, Rescu Prime’s nationwide GPS service empowers you to go safely" Rescu has partnered with 30,000 local police stations, fire departments, and ambulance networks across the country to provide round-the-clock security for users, anywhere in the United States. Rescu Prime subscriptions are $10/month or $99/year. Paolo Piscatelli, CEO of Rescu, shares, “Rescu was the fastest way to get help during a home emergency. Now, it’s the fastest way to get help anywhere in the United States. Wherever your travels take you, Rescu Prime’s nationwide GPS service empowers you to go safely.” Non-verbal communication Rescu is the first and only Personal Emergency Response System (PERS) in a non-hardware platform. Unlike 9-1-1, the Rescu app does not require speaking to a dispatcher. With Rescu, users can communicate non-verbally to an emergency dispatcher. Rescu leverages the first emergency dispatch API and is the only emergency alert app that has its private dispatch centre. Rescu Prime is the premium subscription option for Rescu users.
In the field of access control, face recognition has come a long way. Once considered too slow to authenticate people's identities and credentials in high traffic conditions, face recognition technology has evolved to become one of the quickest, most effective access control identity authentication solutions across all industries. Advancements in artificial intelligence and advanced neural network (ANN) technology from industry leaders like Intel have improved the accuracy and efficiency of face recognition. However, another reason the technology is gaining traction is due to the swiftly rising demand for touchless access control solutions that can help mitigate the spread of disease in public spaces. Effective for high volumes Face recognition eliminates security risks and is also virtually impossible to counterfeit Modern face recognition technology meets all the criteria for becoming the go-to solution for frictionless access control. It provides an accurate, non-invasive means of authenticating people's identities in high-traffic areas, including multi-tenant office buildings, industrial sites, and factories where multiple shifts per day are common. Typical electronic access control systems rely on people providing physical credentials, such as proximity cards, key fobs, or Bluetooth-enabled mobile phones, all of which can be misplaced, lost, or stolen. Face recognition eliminates these security risks and is also virtually impossible to counterfeit. Affordable biometric option Although there are other biometric tools available, face recognition offers significant advantages. Some technologies use hand geometry or iris scans, for example, but these options are generally slower and more expensive. This makes face recognition a natural application for day-to-day access control activities, including chronicling time and attendance for large workforces at construction sites, warehouses, and agricultural and mining operations. In addition to verifying personal credentials, face recognition can also identify whether an individual is wearing a facial covering in compliance with government or corporate mandates regarding health safety protocols. Beyond securing physical locations, face recognition can also be used to manage access to computers, as well as specialised equipment and devices. Overcoming challenges with AI So how did face recognition become so reliable when the technology was once dogged by many challenges, including difficulties with camera angles, certain types of facial expressions, and diverse lighting conditions? Thanks to the emergence of so-called "convolutional" neural network-based algorithms, engineers have been able to overcome these roadblocks. SecurOS FaceX face recognition solution FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces One joint effort between New Jersey-based Intelligent Security Systems (ISS) and tech giant Intel has created the SecurOS FaceX face recognition solution. FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces and facial expressions, including those captured under changing light, at different resolution levels, and varying distances from the video camera. Secure video management system A common face recognition system deployment begins with IP video cameras that feed footage into a secure video management system connected to a video archive. When the software initially enrolls a person’s face, it creates a "digital descriptor" that is stored as a numeric code that will forever be associated with one identity. The system encrypts and stores these numeric codes in a SQL database. For the sake of convenience and cost savings, the video server CPU performs all neural network processes without requiring any special GPU cards. Unique digital identifiers The next step involves correlating faces captured in a video recording with their unique digital descriptors on file. The system can compare newly captured images against large databases of known individuals or faces captured from video streams. Face recognition technology can provide multi-factor authentication, searching watchlists for specific types of features, such as age, hair colour, gender, ethnicity, facial hair, glasses, headwear, and other identifying characteristics including bald spots. Robust encryption SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 To support privacy concerns, the entire system features an encrypted and secure login process that prevents unauthorized access to both the database and the archive. An additional layer of encryption is available through the use of Self-Encrypting Drives (SEDs) that hold video recordings and metadata. SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 (short for Advanced Encryption Standard). Anti-spoofing safeguards How do face recognition systems handle people who try to trick the system by wearing a costume mask or holding up a picture to hide their faces? FaceX from ISS, for example, includes anti-spoofing capabilities that essentially check for the "liveliness" of a given face. The algorithm can easily flag the flat, two-dimensional nature of a face mask, printed photo, or image on a mobile phone and issue a "spoof" alarm. Increased speed of entry Incorporating facial recognition into existing access control systems is straightforward and cost-effective Incorporating facial recognition into existing access control systems is straightforward and cost-effective. Systems can operate with off-the-shelf security cameras and computers. Users can also leverage existing infrastructure to maintain building aesthetics. A face recognition system can complete the process of detection and recognition in an instant, opening a door or turnstile in less than 500ms. Such efficiency can eliminate hours associated with security personnel checking and managing credentials manually. A vital tool Modern face recognition solutions are infinitely scalable to accommodate global enterprises. As a result, face recognition as a credential is increasingly being implemented for a wide range of applications that transcend traditional access control and physical security to include health safety and workforce management. All these capabilities make face recognition a natural, frictionless solution for managing access control, both in terms of performance and cost.
As anti-fraud company Revector marks 20 years of operating, CEO and Founder Andy Gent believes that telecommunications fraud is still not high enough on the corporate agenda for network operators – this should be a significant concern to shareholders. In 2001, Revector was launched to combat specific fraudulent activity against mobile network operators. The company’s management expected the business to have a shelf life of no more than five years – such as the belief that mobile operators would quickly get a grip on network fraud and reduce it to zero. Twenty years later frauds continue to persist – costing shareholders, networks, and Governments billions in lost revenue annually. Revenue through mobile service According to Andy Gent, fraudsters are, at heart, business people, exploiting an opportunity for money. Gent explains how this relates to network fraud thus, “Mobile service providers generate revenues in two ways - by having their subscribers that pay the company to access the networks they run and associated services such as voice calls, text messages, and data usage. The second – known as termination revenue – involves transporting calls from other networks.” Revenues from termination are shared between all networks that help deliver the call Revenues from termination are shared between all networks that help deliver the call, as Gent outlines: “Imagine a call from the UK to Australia. This will pass through several service providers that will each take a small percentage of the call revenues for passing on the call.” “Telecommunications companies establish relationships with others around predictable calling patterns. For example, BT may know that they need one million minutes of calls to South Africa per month. They, therefore, establish a relationship with a South African telecommunications company to provide this.” Trading termination minutes The issue comes when the unexpected happens, for example, an earthquake in Cape Town. Now UK residents with relatives in Cape Town suddenly demand a lot more telephone time. BT needs more minutes than it has. It is unlikely that its partner in South Africa can provide these – they are facing the same issue due to the increased volume of calls in and out of the country – so it will look to the open market for the minutes it needs. Gent continues, “Termination minutes are traded in the same way as other commodities. Exchanges combine minutes from multiple sources, bundle these together and sell them. The issue is where these minutes come from. The bundles may well include “white” routes – premium minutes provided by legitimate telecommunications companies. However, many will include so-called “grey” routes.” A simple but effective fraud Grey routes are not provided by the telecommunications companies but by third parties or through fraudulent means. Typically, the “grey” routes come at a lower cost than the “white” routes, but some telecommunications service providers may not know this or care about it. The natural pressure on cost means some telecommunications companies end up using “grey” route minutes. The threats to network providers’ revenues come from these “grey” routes. A primary risk is SIM Box fraud. SIM Box fraud SIM Box fraud occurs where there is a differential price between the cost of routing a call in a country and the cost of terminating a call, as Gent outlines below: “Imagine a network is offering a promotion with free calls to others on the same network. At the same time, the value of terminating a call to that network’s customers is $0.05 per call.” One single SIM card being used in this way can generate $3000 per month and there are hundreds of cards in each SIM box “If someone can procure SIM cards with the promotion, these can be loaded into a SIM Box – a device that can house hundreds of SIM cards in racks and be connected to the internet - to terminate calls. The owner of the SIM box can then offer to terminate calls for $0.03 per call. The cost to the SIM box owner is close to zero – the local minutes they are using to terminate calls are bundled with the SIM deal. The $0.03 per call is pure profit after the SIM cards and SIM boxes have been purchased.” While this sounds like a complicated scam it can be lucrative. One single SIM card being used in this way can generate $3000 per month and there are hundreds of cards in each SIM box. Loss of termination revenues Service providers can quickly find a large proportion of revenues lost to SIM boxes. Gent has seen “up to 90 percent of termination revenues being lost.” “The nature of SIM box fraud is transitory: fraudsters will pick the countries with the strongest opportunity to generate revenues quickly, sweep in and terminate calls for a month or two before the operator notices the revenue drop and takes action.” Is it illegal? If this practice sounds entrepreneurial rather than illegal, it is probably because it seems like a victimless crime. However, mobile network operators have paid millions if not billions for the ability to operate networks and generate termination revenues. A reduction in this revenue will mean less investment into next-generation networks or customer service. For the consumer, illegal termination often means poor quality calls with a lack of services such as caller line identification (CLI). But perhaps the most concerning issue is where the proceeds of crime go, as Gent outlines. “Often these SIM box frauds are run by criminal gangs using the process to launder money or finance organised crime or people trafficking.” “With widespread restrictions on the number of SIM cards that can be sold to one person, the only way to procure enough SIM cards is via criminal activity. Gangs bribe or coerce network operation staff into supplying SIM cards by the thousand, generating millions in illicit revenues.” Other telecommunications fraud Threat to operator termination revenues comes from OTT service providers that have an eye on termination revenues Another threat to operator termination revenues comes from Over-the-Top (OTT) service providers that have an eye on termination revenues as well as competing with telecommunications service providers for a share of the voice and messaging market. While most telecommunications companies see Voice over IP (or OTT) as fair competition, in recent years several new OTT service providers have grown extremely quickly. WhatsApp, for example, was incorporated in 2009 and acquired by Facebook just five years later for almost $20 billion. The business models of these companies vary. Some focus on the “freemium” approach where the initial service is free but add-ons become chargeable. OTT app fraud However, recently some OTT players are looking to terminate revenue to monetise their business models. These operators have been offering competitive termination rates by hijacking a traditional call made from one telephone number to another and terminating it within an OTT app, as Gent explains, “We are seeing OTT apps intercepting traditional telephone calls and delivering them within a user’s app.” “The call starts as a dialled telephone call, but the user receives it within an OTT app. If OTT players can achieve this, they can generate termination revenues at zero cost – other than to the traditional operator.” Using an app to make calls “Of course, if the recipient of the call believes the caller has used an app to call them, they are more likely to use this method of communication in the future – and less likely to dial a number directly. For the OTT players, termination acts as a marketing tool as well as a revenue stream.” According to Gent, one OTT service provider has gone as far as including a setting within their app that states “receive regular incoming calls within the app when possible”. This is defaulted to “on” when the app is downloaded. Only the most technologically savvy users would even know it was there. Combatting the fraud against networks Networks are less worried about losing revenue to fraud and more about grabbing as many subscribers as possible" Why do networks not do more to combat fraud? The reality, according to Gent, is a combination of priorities and ignorance. He comments, “Most mobile network operators are large but still relatively young companies – typically built around customer acquisition.” “Networks are less worried about losing revenue to fraud and more about grabbing as many subscribers as possible. This has led to a mindset where whatever the questions the answer is always more marketing promotions.” A small number of innovators around the world continue to fight these frauds directly, but the fraudsters simply move on to the next victim and, when the anti-fraud measures are relaxed, the fraudsters return. An opportunity for the future As mobile networks mature and become more commoditised, Gent believes the issues around combatting fraud will become a wider concern. “If you had told me in 2001 that fraud would still be an issue in 2021, I would have been shocked. Yet operators are still losing significant revenues to criminals. Addressing this needs to remain a priority for the industry, not just to ensure networks have the revenues to build and maintain robust networks but also to ensure that criminal behaviour that this kind of illicit activity funds is reduced. This is not just an issue for network operators but also for wider society.”
While the foundation of autonomous retail has been built up over the past few years, it is only now that retailers are beginning to fully experiment with the technology. There were an estimated 350 stores globally in 2018 offering a fully autonomous checkout process, yet this number is forecast to increase dramatically with 10,000 stores anticipated by 2024. This acceleration in the growth of unmanned retail stores has, in part, been boosted by the COVID-19 pandemic and a demand for a more contactless, socially distanced shopping experience. Physical security technologies Innovative physical security technologies can play a significant role in protecting a site while supporting its operation Many retailers are now exploring such solutions as a way to streamline their services and simplify store operations while reducing overheads. Of course, the security of unmanned sites is a concern, with many eager to embrace such a design, but wary about the prospect of leaving a store unguarded. This is where innovative physical security technologies can play a significant role in protecting a site while supporting its operation and also helping to improve customer experience. Comprehensive integrated solution To make the autonomous retail vision a reality, a comprehensive solution is needed that integrates network cameras, IP audio speakers, and access control devices. The cameras can be employed to monitor entrance points and sales areas, including checkout terminals, and can be monitored and operated remotely from a central control room. This offers management full visibility of operations, regardless of the number of stores. Recorded video material can be processed, packaged, and passed to authorities, when necessary, by applicable laws. Optimising operations As autonomous stores do not require staff to be present and run largely independently, managers can be notified automatically via mobile device if an event occurs that requires their attention. This could range from a simple need to restock popular items or clean the premises after a spillage, to a criminal break-in or attack. Again, network video surveillance cameras installed inside and outside of the premises provide high-quality video of any incident as it occurs, enabling immediate action to be taken. Improving customer experience Access control mechanisms at the entrance and exit points enable smooth, touch-free access to customers Access control mechanisms at the entrance and exit points enable smooth, touch-free access to customers, while IP audio speakers allow ambient music to be played, creating a relaxed in-store atmosphere and also offering the ability to play alerts or voice messages as required. Due to the automated nature of such audio broadcasting, consistency of brand can be created across multiple locations where playlists and pre-recorded voice messages are matched in terms of style and tone from store to store. Boosting profits The accessibility of premises 24/7 can ultimately lead to an increase in sales by simply allowing customers to enter the store and make a purchase at any time, rather than being restricted by designated retail hours. This also serves to improve customer loyalty through retail convenience. Utilising data from the access control system, managers can configure lights to turn on/off and ambient music to power down when the last person leaves the shop, to be reactivated the next time someone enters the premises. This approach can also conserve energy, leading to cost savings. Designing a future proof solution The threat of vandalism is greatly limited if everyone entering the shop can be identified, which is something that is already happening in Scandinavia using QR codes linked to an electronic identification system called BankID. This process involves a user being identified by their bank details, and their credentials checked upon entering the store. This not only streamlines the transaction process but vastly improves security because only those who want to legitimately use the services will go through the identification process, helping to deter antisocial or criminal behaviour. Physical security technology should be reliable and of high quality, without compromising the service to customers VMS-based network solution Both inside and outside of the premises, physical security technology should be reliable and of high quality, without compromising the service to customers, or hampering their experience. Door controls, network cameras, and loudspeakers, together with a comprehensive video management system (VMS), enable retailers to control every element of their store and remove any uncertainty around its management or security. Such a system, network-enabled and fully scalable to meet ongoing business requirements, can be offered using open APIs; this allows configuration and customisation while ensuring that the retailer is not limited by the technology or tied into any particular set-up or vendor as their requirements evolve. Additional security benefits As more businesses launch their unmanned stores, the benefits of such technology to streamline and improve every aspect of their operations become ever clearer. A comprehensive solution from a trusted security provider can bring complete peace of mind while offering additional benefits to support the retail business as it seeks a secure future.
It’s been almost exactly a decade since HID Global launched the world's first university pilot of smartphones carrying secure mobile IDs. A lot has changed in the following 10 years. Today’s technology has matured, advanced, and proliferated across a variety of high-value use cases. To catch up on the latest developments in mobile access, we contacted Luc Merredew, Product Marketing Director, Physical Access Control, at HID Global. Q: What has changed since the first pilot implementation of smartphones used for secure mobile identification? Merredew: One of the biggest milestones several years ago was when mobile access solutions achieved certification to the ISO 27001:2013 Information Security Management System (ISMS) standard. With increasing awareness of cloud-based security threats and resulting high expectations from a solution, today’s system owners, operators, and users insist on companies being able to demonstrate that they have had their services vetted by independent laboratories and/or agencies. When adopting mobile access solutions that maximise convenience and efficiency, and deliver dramatically improved user experiences, it is neither necessary nor acceptable to compromise security in either the physical or digital domains. Q: Do universities continue to be the biggest users? Mobile IDs on devices eliminate person-to-person credentials when accessing secured areas Merredew: The use cases have grown dramatically, spread evenly across all types of organisations in locations ranging from high-rise buildings to multi-campus global enterprises. But yes, universities continue to be big adopters, and they were among those most eager to leverage the technology so they could bring people back to campus in person during the pandemic. In this environment, mobile IDs on smartphones and other devices eliminate person-to-person credential (e.g., badge or ID card) issuance or revocation, as well as the need to physically touch cards, readers, or keypads when accessing secured areas. Q: How were mobile IDs employed by your customers as they brought people back to physical locations after the pandemic shutdown? Merredew: One example is Vanderbilt University, where the challenges of COVID-19 brought renewed attention to the importance of a modern system for identity management and access control that was compatible with Near Field Communication (NFC) and Bluetooth technologies. Members of the campus community could more conveniently access buildings and services with their mobile devices, and the university could efficiently provision and de-provision credentials remotely without person-to-person contact. More recently, Vanderbilt leveraged HID Mobile Access® to deploy campus IDs on iPhone and Apple Watch through Apple Wallet. Q: Is there another example outside the university vertical? Merredew: Another example is the iconic tower Arcos Bosques Torre 1 in Mexico City, where the owners and tenants enjoy the simplicity of using their trusted mobile devices to seamlessly access their spaces. As with the Vanderbilt deployment, the drive for operational efficiency and convenience in the tower was combined with a desire to minimise the need for users to come in physical contact with the system. Having a solution like HID Mobile Access that delivers touchless entry and increased safety and security is important. Q: What have been the biggest mobile access advancements? The mobile credential provides contactless, seamless access to a wide range of devices and services Merredew: One of the most important advancements was simplifying upgrade paths to mobile access. In the Vanderbilt example, our HID Reader Manager was used to upgrade the firmware on the university’s physical access control readers and extend support for NFC-based credentials in Apple Wallet. The university uses the HID Origo™ Mobile Identities API integrated with CS Gold®, a higher education transaction system from CBORD, for credential lifecycle management. Another significant enhancement has been the expanded range of uses cases for the mobile credential, going beyond simply opening doors to include providing contactless, seamless access to a wide range of devices and services such as time-and-attendance terminals, cashless vending machines, printers, computers, workstations, and many other applications. Q: Wearables are also having an impact. Merredew: Contactless mobile experiences are also delivered through wearable wristbands. One example is the Nymi band which, once authenticated, continuously authenticates the identity of the user until it’s removed from the wrist. This delivers zero-trust security principles and access control using convenient fingerprint and heartbeat biometrics to users seeking touchless authentication. Q: What is the impact of the cloud? Merredew: The move to a cloud-based system to issue and manage mobile identity credentials has unified, automated, and simplified identity issuance at a single facility or across any number of distributed office or remote work locations. Q: What should end users look for in a mobile access solution? Look for solutions that use a secure element in the reader as well as cloud certificates, to ensure security and data privacy Merredew: Solutions should support the largest possible number of popular mobile devices – in HID’s case, this includes more than 250. Look for solutions that use a secure element in the reader, and a secure key management process, as well as cloud certificates, to ensure both security and data privacy. Make sure the solution supports Bluetooth Low Energy (BLE), Near Field Communication (NFC), and both iOS and Android operating systems. Solutions that provide Application Programming Interface (API) and Software Development Kit (SDK) support offer direct access to the solution’s access control hardware, speeding deployment while enabling integration partners to continue innovating products that deliver even better user experiences. Q: Wonder what this market will look like in 10 more years. What’s next for mobile access? Merredew: Future innovations are on the horizon with technologies such as Ultra-Wideband (UWB) wireless connectivity, which HID expects will become ubiquitous on mobile devices. It provides unprecedented accuracy and security when measuring the distance or determining the relative position of a target. It is not HID’s expectation that UWB will replace Near Field Communication (NFC) or Bluetooth, but rather supplement Bluetooth and other technologies to provide the assurance, reliability, and granularity of device position that enables truly seamless experiences.
Vehicle barriers first rose to the forefront of public attention after 9/11. The focus from 2001 to 2010 was on anti-terrorism, and vehicle barriers appeared at military and government facilities around the world. The U.S. Capitol breach on Jan. 6, 2021, brought heightened attention to the risks in a society that is increasingly fractured and volatile. Various protest events in recent months have made customers more aware of possible threats and prompted many to proactively install vehicle barriers and other systems to protect their premises. Shifting market focus Since 2010, and with the anti-terrorism market mostly saturated, the market focus for vehicle barriers shifted to public safety applications such as stadiums, schools, universities, large tech companies, and data centres. It’s an example of deploying technology developed in “wartime” to the broader public good, says Keith Bobrosky, the new president of vehicle barrier company Delta Scientific Corporation. Withstanding the pandemic The only remaining hurdle for Delta Scientific is to deal with continuing uncertainty going forward Like many in the security market, Delta Scientific has withstood a tumultuous two years during the duration of the novel coronavirus pandemic. They have “come through with flying colours,” says Bobrosky. The company never closed down, and its vaccination rate is high. The only remaining hurdle is to deal with continuing uncertainty going forward. Delta Scientific’s commitment Bobrosky began working in sales at Delta Scientific in 2007. Along the way, he has expanded into management, production, and engineering management. Through it all, he has seen a company that provides employees the autonomy to do their jobs and who have a strong commitment to customers, he says. The privately-owned company is nimble; decisions can be made quickly to respond to market changes, adds Bobrosky. Addressing needs during a pandemic The company was concerned about lower demand when the economy shut down, says Bobrosky, but they did not see an impact. The business was steady as a result of government entities and other organisations taking advantage of being closed to evaluate and address security needs. “We saw a decent flow of government business because of the shutdown,” says Bobrosky. Delta Scientific focuses on the domestic U.S. market but also has a presence selling to partners in the Middle East and Europe, where the equipment is known for its ability to take multiple hits. Even after withstanding an impact according to ASTM standards, their barrier is still operational. Increased steel purchased Delta Scientific ramped up its purchasing power, staving off any shortages and striving to keep lead times short As material shortages have spread through the industry, Delta Scientific has ramped up its purchasing power, staving off any shortages and striving to keep lead times short. Steel is their major component – literally, 98% of the weight of the products is steel, and there are 5,000 pounds of steel per barrier. The price of steel has gone up and there have been shortages. The company has maintained supply by leveraging its reputation and purchasing power. Most of their components are made in the USA, which has helped them dodge the recent challenges of the global supply chain. Application of barriers and bollards Automotive dealerships are another market for Delta Scientific; their bollards and barriers are used as anti-theft devices to keep vehicles from being stolen from a sales lot. Delta Scientific’s products can foil car thieves who might otherwise use a large vehicle to plow through a barrier and then enable a parade of accomplices to drive away in additional vehicles. Auto resellers buy anti-terrorism products to protect their inventories. DSC550 Open Frame vehicle barrier Delta Scientific’s products have evolved from push buttons and relay to touch screens and microprocessors New efficient product designs enable Delta Scientific to use less steel while keeping prices competitive and maintaining crash ratings. The products are more innovative, says Bobrosky. New barriers include the DSC550 Open Frame vehicle barrier, which does not block the view as solid barriers do. During the last decade control systems for Delta Scientific’s products have evolved from push buttons and relays to touch screens and microprocessors, although some customers still prefer the simplicity of the older approach. Portable crash barriers The equipment can also be controlled remotely and integrated with PSIM-type systems. Although the systems are stand-alone, some clients have been toying with the idea of controlling them through the internet, emphasising the importance of appropriate cybersecurity. A separate line of portable crash barriers can be towed into place in 15 minutes by a vehicle or even a golf cart. They are used for events such as the Democratic and Republican National Conventions, the Oscars, music festivals, etc. There are hundreds of units in the field, available as needed for various events and rented out to event management companies and other organisers. Improving customer relations As the president of Delta Scientific, Bobrosky says his biggest opportunity is to continue improving customer relations – a never-ending goal. He will also strive to increase communication. Looking ahead, additional crash tests are scheduled for 2022, and the company will continue to look for ways to “do more with less.”
BIM (building information modeling) provides a process for creating and managing information during the building lifecycle and beyond. BIM is often equated with 3D modeling of construction projects, but the visual component is just part of the value of BIM. Additional data, such as specifications and other documentation, is also part of the process, underlying the visual aspects, helping to drive decision making and providing immediate access to detailed information about all facets of the building process. Incorporating BIM systems For the last six years, ASSA ABLOY Opening Solutions has worked with specification writers and architects in Europe, the Middle East, and Africa (EMEA) to make it easy to incorporate ASSA ABLOY Opening Solutions doors, hardware, and security solutions into BIM systems. Everyone on a project can work together in the interactive and information-rich BIM environment. BIM tools are also used by contractors, distributors, facility owners, and security consultants. BIM software BIM information relating to doors, hardware, and security solutions is available in the cloud BIM information relating to doors, hardware, and security solutions is available in the cloud with the company’s Openings Studio BIM software. This improves the process of door scheduling and visualisation and enables customers to focus on the design, installation, and management of openings. “If you have up-to-date information inside the BIM model, you can reduce mistakes and misunderstanding in the building industry,” says Marc Ameryckx, ASSA ABLOY Opening Solutions’ BIM Manager for the EMEIA region. “It helps to eliminate mistakes before they happen or as early as possible in the building process. The earlier, the less it costs. We provide data as soon as possible in the process.” (ASSA ABLOY Opening Solutions also has comparable systems available in other regions of the global company.) Centralised data in BIM 3D model Expanding the data available in BIM provides additional value compared to merely providing “BIM objects” that can be incorporated into a BIM 3D model. The combination of BIM modeling and the underlying specifications boosts the quality of the project and its key to success, says Marc Ameryckx. Even after the building is complete, the BIM model is still valuable, providing a repository of “as-built” information that can be used by building managers and security professionals tasked with operating and maintaining the building. For example, if a lock needs to be replaced, retrofitting is simpler because all the information about the lock and existing installation is available in a centralised data file. Revit and ArchiCAD A widely used BIM software is Revit from Autodesk, a program that brings architecture, engineering, and construction disciplines into a unified modeling environment to drive more efficient and cost-effective projects. Another BIM software program is ArchiCAD, developed by the Hungarian company Graphisoft. Openings Studio™ added a plugin for ArchiCAD this year, in addition to Revit. Tailor-made information security solutions We provide tailor-made information security solutions with various hardware on projects with more doors" “We can provide tailor-made information security solutions with various hardware on projects with more doors, adding more flexibility,” says Marc Ameryckx. “Customers do not need to be the experts on the products because we provide expertise as part of our specifications.” For example, how often do building mistakes occur because of a misunderstanding about the electrical needs of a lock and the wrong cabling is installed? The problem is especially expensive if it is discovered only after the walls are complete. Providing complete data about the electrical lock as part of a BIM system avoids the snafu. Another example is the specification of a deadbolt lock on a door that operates with an electric strike. The deadbolt undermines the intended operation of the electric strike and can interfere with escape routes in case of an emergency. The mistake becomes obvious in the BIM environment and can be rectified before consequences impact the real world. Data addition to Opening Suites site ASSA ABLOY Opening Solutions is continuously expanding the data it provides at the Opening Suites site, covering additional functionality and more components including the door, cabling, and electrical connections. Hardware sets are linked to specific doors in the BIM models, including all the details of various components, including article numbers, technical sheets, electrical requirements, all depending on customer expectations. Physical equipment includes QR codes that can be scanned by a smartphone to provide information on the door (A mobile app is in development). More details and more data Experienced BIM consultants work with the Openings Studio software on projects ranging from single doors to large buildings with many doors. Data will be more and more important, and there will be more data inside BIM models Adding more data and detail to the BIM process at the level of each door expands the usefulness of BIM, which has historically been focused on broader issues such as structural work and HVAC. “Openings Studio™ provides all the data to integrate doors and security in the BIM process,” says Marc Ameryckx. The higher level of detail may be a new aspect even for customers who already use BIM software. “Data will be more and more important, and there will be more data inside BIM models,” says Marc Ameryckx. In the future, the use of “digital twins” could expand the capabilities even further; for example, the software could simulate escape routes in case of fire. More data makes more things possible.
RPG Life Sciences Ltd. formerly Searle (India) Ltd. is a full spectrum, world class, customer focussed, innovative pharmaceutical organisation. They develop, manufacture and market, for national and international markets, a broad range of branded formulations, generics and bulk drugs developed through fermentation and chemical synthesis routes. RPG Life Sciences were facing service issues with their outsourced payroll provider. Not only was the service not up to the mark, the payroll solution provided did not include any employee self service module. This led to a large number of employee queries being unanswered each month. Comprehensive payroll solution Also the multi-location nature of the business made distribution of reports and payslips a challenge. Delays were encountered in the delivery of reports along with inflexibility of reporting formats. RPG Life Sciences approached TopSource Worldwide to provide a comprehensive payroll solution that needed to be delivered on time, accurately and be able to respond to their growing needs. The Payslip distribution took place thru Portico to the multiple locations TopSource Worldwide provided employee self service thru Portico that gave access to employees to their payslips and enabled them to make investment declarations. The Payslip distribution took place thru Portico to the multiple locations. 24X7 access to payslips was provided by Portico from anywhere via the web. Adhoc reporting requirements Special reports such as Cumulative MSR, CARO Report, Additions and Deletions report and many more were provided to facilitate internal reporting for Finance and HR. A customised JV program was built to provide the journal entries from payroll to SAP. Bonus, Exgratia and Superannuation calculations were provided along with the necessary Journal entries for accounting each month. A Cheque writing service was also implemented in a few cases where required. RPG Life Sciences has to no longer spend time on administrative work and queries related to payroll. They have eliminated the risk of issues caused due to employee dissatisfaction with payroll and are now getting their payroll reports on time. Online availability of information has changed all that. They also have the added benefit of a flexible service provider to meet their adhoc reporting requirements.
Abloy UK has been awarded a three-year contract with Thames Water, valued at an estimated ∼750k, to upgrade existing locking systems between now and June 2024. Thames Water is the UK’s largest water and wastewater company, serving 15 million customers across London and the Thames Valley. Cylinders and padlocks Products specified for the project include padlocks and a range of cylinders, which will be used to secure a variety of areas and assets. These include treatment plants and pumping stations on applications such as hatches, doors, and gates. They'll be used at over 22 sites in North and East London including Coppermills and Abbey Mills. Abloy cylinders combine flexibility with security, to provide unbeatable performance and meet the BS EN 1303 standard for Cylinder Locks. Abloy padlocks use a unique rotating disc principle and are renowned for their endurance and maximum resistance against physical attack, offering durability in even the severest of climatic conditions. Access control and keyless solution There is also the future potential to implement a PROTEC2 CLIQ access control system and BEAT keyless solution that combines a digital key, mobile application, and a heavy-duty, Bluetooth padlock, all managed with the visual Abloy OS user interface. Simon Jeff, Market Developer for Critical Infrastructure at Abloy UK, said, “We are delighted to have secured a contract of this size with such a prominent and well-respected company such as Thames Water, and look forward to successfully implementing the new locking systems over the next three years.”
Nestled on the Western shore of Lake Como, the Grand Hotel Victoria in Menaggio is one of the latest 5-star luxury properties in the Larian landscape. The magnificent resort in Art Nouveau style, which encompasses a late 19th-century palace and a former monastery, has been completely renovated to host 81 rooms, lush gardens with pool, more than 2,000 m2 spa, 2 restaurants, and 90 car places in the underground parking. End-to-end security solutions The Grand Hotel Victoria in Menaggio, wedged between the lakeside and the heights of the Lepontine Alps, promises its guests a unique experience. To make this happen, it is essential to improve the security level. Dahua Technology is a world-pioneering video-centric smart IoT solution and service provider. Based on technological innovations, it has offered end-to-end security solutions, systems, and services to create value and solve problems for clients. This is why the hotel management entrusted Dahua and MD Impianti – its system integrator partner – the realisation of the perimeter and indoor surveillance system. AI-based cameras and deep learning With deep learning, Dahua Perimeter Protection technology can recognise humans and vehicles accurately In the solution provided by Dahua Technology, 15 units of IPC-HFW5241E-ZE 2MP bullet cameras with 2.7~13.5 mm motorised varifocal lens of Dahua WizMind series – equipped with various AI functions such as perimeter protection and people counting – were installed to guard the outside of the building providing clear images even in the low-light environment due to IR LEDs (range up to 50 m), WDR (120 dB) and Starlight technology (till 0.0002 Lux before switching to B/W). With the deep learning algorithm, Dahua Perimeter Protection technology can recognise humans and vehicles accurately. In the restricted areas (such as pedestrian areas and vehicle areas), the false alarms are largely reduced. Dahua Lite series network camera After crossing the main entrance surmounted by a balcony that rests on four Doric columns, no less than 110 units of IPC-HDW2431T-AS-S2 4MP eyeball network cameras – featuring IR LEDs and Starlight themselves - discretely watch over the premises of the historical and new wings. With upgraded H.265 encoding technology, the Dahua Lite series network camera has efficient video encoding capacity, which saves bandwidth and storage space. This camera adopts the latest Starlight technology and displays better colour images in the condition of low illumination. Enterprise-level NVR NVR features a mouse shortcut operation menu, remote management and control, central storage, edge storage Two 128-channel NVR608R-128-4KS2 network video recorders with 8 hard disks and redundant power manage all streams, while the networking was implemented with ePoE, PoE, and aggregation switches, connected by CAT6 cables and optical fiber. For applications where details are critical for identification, this enterprise-level NVR provides a powerful Intel processor with up to 4K resolution. Additionally, the NVR features a mouse shortcut operation menu, remote management and control, central storage, edge storage, and backup storage. Remote monitoring All images collected by the whole system can be visualised both in the concierge and remotely. The latter is a feature that allows great flexibility to meet the needs of the end-user, who is already evaluating the integration of DSS centralisation software and a video wall. The system protecting the prestigious Gran Hotel Victoria in Menaggio demonstrates once again how Dahua Technology, along with its partners and supply chain, is capable of providing high-profile and tailor-made integrated security solutions, suitable for any scenario and compliant with current legislation.
Salient Systems, a pioneer in open architecture video management systems, has announced that its CompleteView VMS, an open platform video management system has been selected by Maine-based Brigid Farm for a multi-state video upgrade project for the company’s cannabis facilities. With headquarters in Saco, Maine, Brigid Farm is a vertically integrated cannabis firm that has been providing cannabis products for more than a decade. The company has recently expanded its operations to include multiple grow fields, an edible manufacturing facility, and two retail stores – a total of eight locations in Maine and one in Massachusetts. Remote and centralised monitoring As each location poses its security challenges, Brigid Farm chose the robust, open platform CompleteView VMS to enable remote access to and centralised management of video from all the company’s locations, including its retail operations, The Farm Stand, and The House of Hash. We were looking for a robust VMS that could help us easily monitor all of our operations from anywhere" “Given the heightened security concerns in the cannabis industry, and the unique security needs for our different locations, we were looking for a robust VMS that could help us easily monitor all of our operations from anywhere,” said Brett Messer, owner, and general manager of Brigid Farm. “It was vital for us to have an open system that can accommodate our future technology needs and expand as our company grows.” Integration software and LPR Brigid Farm also selected CompleteView for its ability to integrate with several other key operational technologies, including license plate recognition (LPR) to monitor daily incoming and outgoing deliveries, point of sale software for retail transactions, and the cannabis industry seed-to-sale tracking software, which cannabis businesses use for regulatory compliance. “Our CompleteView VMS is widely used in the cannabis market as it is uniquely positioned to solve pain points for cannabis operators,” said Sanjay Challa, chief product officer, Salient Systems. “We’re excited to work with Brigid Farm to fulfill their integrated video management needs and provide them with operational visibility across their enterprise.”
The Prague city administration together with the Criminal Investigation Department relies on security technology from Germany-based Dallmeier in Prague's Wenceslas Square, one of the largest city squares in Europe with an area of 45,000 square metres, and the Old Town Square. Wenceslas Square and Old Town Square in Prague are both steeped in history, and now as ever before remaining important hubs for tourism and traffic. To ensure the safety of the streams of people and vehicles in these places, when it comes to security equipment the Prague city administration relies on a combination of conventional cameras and a solution from the Regensburg company Dallmeier. From horse market to commercial thoroughfare Wenceslas Square in Prague was created in the 14th century and originally served as a horse market, as was reflected in its name. It was renamed "Wenceslas Square" in 1848 in tribute to Saint Wenceslas of Bohemia. Since the 19th century, the function of the square has evolved from that of a place for trading horses to a busy commercial district. The function of the square has evolved from that of a place for trading horses to a busy commercial district It is used by pedestrians, cyclists, motor vehicles, and local public transport alike, and so constitutes a major confluence point in Prague's New City. The city administration attaches great importance to ensuring that all these traffic elements can coexist in harmony, and to have a general overview of what is happening, the administration together with the police criminal investigation department rely on the sharp "eyes" of the Panomera®. Tourist magnet Old Town Square Panomera® also provides security in the 9000 square metre Prague Old Town Square. The Old Town Square is the historic heart of the city and attracts thousands of tourists every year with its atmosphere, sights, and markets. Its history dates to the 11th century, and it has always been a crossroads for commerce and a marketplace. It is a magnet for tourists and its borders abound with restaurants, museums, galleries, and shops. The astronomical clock on the tower of the Old Town Hall is one of the most well-known sights in Europe. Advantages of Panomera® technology for monitoring The solution for both Wenceslas Square and Old Town Square consists of Panomera® models from the Topline series. The Panomera® multifocal sensor system can provide coverage for vast expanses and areas. Infrastructure costs are also lower since a single Panomera® captures a much larger area and fewer installation points The advantage: The combination of general overview with the highest possible resolution of details is very important, particularly for large squares, and with this camera technology more remote objects can also be displayed with the same resolution as objects in the image foreground. Several operators can zoom into the same image at the same time. Even then, the overall scene always remains in view and the recording continues. Where previously several megapixel cameras would have been needed, the users' workload has been reduced significantly, because fewer images must be captured. Infrastructure costs are also lower since a single Panomera® captures a much larger area and fewer installation points are needed. For customers, this means savings not only in terms of infrastructure but also regarding operation and management, so total operating costs are reduced. Planning that delivers In the project planning phase, the Dallmeier 3D specialist team consisting of engineers and graphic designers created a three-dimensional simulation of the customer's environment. In the 3D model, the team simulated the real camera models and locations/installation sites, and thus also angles of vision and ranges. The completed 3D model was presented to the customer jointly with integration partner KH Servis in Prague and comprised the entire solution including the cameras and other essential components. The city administration and police authorities were delighted by this manner of project visualisation because this approach also allowed an accurate calculation of costs to be made, giving the customer certainty regarding the cost and scope of the project. "What we plan is what you get" 3D planning also guarantees that there are no surprises either on the technical or financial level 3D planning also guarantees that there are no surprises either on the technical or financial level during or after the installation. Dallmeier calls this approach "What we plan is what you get". Besides the technical advantages delivered by Panomera®, the customers were also impressed by the planning certainty they were given by the 3D visualisation, and, at the end of 2017, Dallmeier won the order to put the project into practice. Test run at the Dallmeier FAT Centre Before it was installed, the planned solution underwent a Dallmeier Factory Acceptance Test at the FAT Centre in Regensburg. All components were assembled there, and the final environment was tested in live operation. While testing was proceeding in the FAT Centre, KH Servis was also attending training in Regensburg so they would be ready for the on-site installation and so they could see the system operating flawlessly for themselves. Observation and intervention With the installation of the multifocal sensor systems, the desire for increased security and more effective intervention capabilities was realised. The cameras are used to observe situations and when necessary, enable rapid countermeasures or also a rapid investigation of incidents. In the event of criminal offences, the video material can be stored separately as evidence. Special challenge: Protection of historic monuments Permission had to be obtained from the building owners before the cameras could be mounted Both squares are bordered by buildings with historic monument status, the Panomera® cameras could not always be mounted where single sensor cameras had hung previously, enabling the "old" installation points to be used. Permission had to be obtained from the building owners before the cameras could be mounted, but this was managed successfully for all the new installation points. Conclusion The conclusion by KH Servis, Dallmeier's integration partner in Prague, "We worked together with extreme professionalism, the city administration and police authorities were ultimately convinced, not only by the quality of the systems and the image material but also the impressive planning phase and planning certainty it gave them."
A high-definition IP surveillance system from Dahua Technology is providing 24/7 security and operations management at a large freight and logistics hub, located in Cannock, West Midlands, United Kingdom. Dahua IP video surveillance system The 54-camera system has been installed throughout Pentalver’s 37-acre site. The equipment includes 5 MP dome cameras with IR illumination up to 50 metres, 180-degree panoramic domes, comprising an array of four 2 MP cameras each with IR illumination up to 60 metres, 5 MP bullet cameras, 4 MP PTZ network cameras, and 5 MP 360-degree internal dome cameras. All cameras feature Dahua’s Starlight lowlight technology and AI functionality with deep learning algorithms, to detect events, such as perimeter breaches, movement detection and scene change. DSS Express video management system The installation also includes Dahua’s DSS Express video management system, enabling users to view images only relevant to them, two Dahua 32-channel 36 TB NVRs (Network Video Recorders) and 12 ruggedised network PoE switches. The site consists of freight container storage in one section and road haulage transport in the other. It was previously equipped with an ageing analogue CCTV system, elements of which was in various states of disrepair and had become unfit for purpose. High definition site monitoring The objective for the new system was to provide high-definition monitoring of the whole site, at all times, for security and logistics managers to be able to have access to images relevant to them, partitioned by the Dahua DSS Express video management system. The installer, Richards CCTV, was tasked with providing a perimeter protection solution, as well as a range of PTZ cameras around the site. The biggest challenge was the installation of the network infrastructure, with multiple fibre links between remote buildings and the central office. This was achieved using ruggedised network PoE switches with 2 GB ports for high-speed connection. Enhanced security and visibility Security is key for us, but we also use the system to have good visibility of our operations" Richard Harte, General Manager at the Cannock terminal, said that good security and visibility of operations is essential for such a large and busy site with a bonded storage area. He stated, “With the previous system, we came to recognise how poor our sight over the depot was. Security is key for us, but we also use the system to have good visibility of our operations, as well as for health and safety and training purposes.” Richards CCTV, efficient system installer Richard Harte adds, “We found Richards CCTV to be a professional, cost-effective and efficient installer, with a fast response for their maintenance operation. I am also particularly impressed with the quality of the system components and the way we can view, and control cameras remotely with no latency.” Richard Harte and his team are so satisfied with the solution that they are advocating its rollout across other Pentalver sites and have shared their recommendations with the company’s safety team.
Round table discussion
Air travel is returning to pre-pandemic levels. COVID and its aftermath have added new compliance and operational concerns for airport security, and social and political volatility around the world emphasises the need for constant vigilance. A range of new technologies are enhancing airport security, not to mention providing new tools to simplify processes throughout the airport. We asked our Expert Panel Roundtable: Which technologies are transforming airport security?
A new generation of security professional is waiting in the wings. They will be faced with unprecedented challenges, as they seek to transform the security marketplace to the ‘next level’. Technology changes ensure the market will be very different 10 years from now and the fresh labour pool will need to be able to meet the host of new challenges. We asked our Expert Panel Roundtable: What exciting career opportunities in the security industry await the next generation?
Assembling security solutions has long been considered the role of the integrator, whose role is to pick and choose the best technology tools and then to assemble the complete system. However, more manufacturers are offering pre-integrated end-to-end solutions that include multiple elements from the same manufacturer, designed to work seamlessly together. At the end of the day, end users want to know: Whose role is it to provide security ‘solutions’ – the manufacturer or the integrator? We asked our Expert Panel Roundtable.