Bird Home Automation Group, a provider of IP video intercom technology, announces a partnership with SIP solution provider AV LinkPro. Through this strategic partnership, Bird Home Automation now offers an easily deployed option for its DoorBird product line, specifically its MDU video intercom stations, to make calls to IP, cellular and landline phones. Since its founding in 2014, Bird Home Automation has formed partnerships with many other industry pioneers to meet the demands of its customer...
Rapiscan Systems, a global supplier of security inspection technology, is exhibiting at this year’s International Security Expo (Stand D30, 3-4 December, London Olympia). The company will demonstrate its security and screening technology excellence with its products and solutions for the aviation, event security, critical infrastructure and law enforcement sectors. Highlights on the stand include the RTT 110 Explosive Detection System, Itemiser 4DN Narcotics Trace Detection, the 920CT adv...
As the trade fair for the security industry, Security Essen is the showcase for innovations every two years. In order to also enable young companies to be present in front of trade visitors from all over the world, there has long been a promotional program in cooperation with the Federal Ministry for Economic Affairs and Energy. However, this only applies to German companies. Security Essen has therefore now set up its own program for start-ups from abroad. For the first time, young internation...
Konica Minolta is making the next big advance in intelligent video technology by launching the MOBOTIX 7 smart solution platform and the M73 IoT camera that uses it. The latest generation of MOBOTIX video cameras offers a whole new set of functions plus application solutions based on deep learning, opening up new possibilities far beyond traditional video security. The M73 comes with more than 15 apps integrated into its camera software, which can be used to optimise business processes in pract...
Nigel Waterton recently joined cloud video company Arcules to lead the sales and marketing efforts as Chief Revenue Officer (CRO). He brings to the task the benefit of 22 years of experience building and managing large, high-growth technology organisations. Waterton joins Arcules from Aronson Security Group, an ADT Commercial Company, where he served as Senior Vice President of Corporate Strategy and Development. We caught up with the new CRO to discuss his position and to reflect on how indust...
Integrated security manufacturer TDSi is proud to announce the appointment of Emily Phillips as its new Internal Customer Advisor, based at the company’s Poole headquarters. Emily’s new role will see her assisting customers from across the company’s UK and international export markets. Managing Director of TDSi, John Davies commented, “Our Customer Support services team plays a key role in delivering TDSi products, services and support to our customers, ensuring every pu...
Aiphone Corp., the international manufacturer of intercom and security communications products, announces Brad Kamcheff, an accomplished, long-time employee, has been promoted to the position of marketing manager. He will be responsible for leading the Aiphone marketing team to facilitate successful corporate communications, events and collateral, leveraging marketing resources in support of sales strategies, and to grow Aiphone’s position in the marketplace utilising market and competitor data and insights from industry resources. Accurately design and assemble intercom products Most recently in the marketing department, he served as the company’s web analyst Kamcheff has more than 30 years of broad experience at Aiphone, starting in shipping and later working in the customer and technical support departments. Most recently in the marketing department, he served as the company’s web analyst. While in the technical support department, Kamcheff developed QuikSpecTM, Aiphone’s popular online design tool, making it easier for specifiers and installers to find product information required to accurately design and assemble intercom products. This tool is just one of many contributions he has made during his Aiphone career. Award-winning quality processes As the new marketing manager, Kamcheff looks forward to helping Aiphone continue to grow its position as the brand leader in both new and existing markets. Another focus of his will be to increase awareness of the industry’s broadest intercom portfolio, award-winning quality processes, and customer service teams. “Aiphone has long been recognised for the high quality and performance of its products and services,” Kamcheff said. “I’ll be relying on my experienced marketing team to continue executing powerful and strategic work, therefore elevating our team and the company as a whole.”
Allied Universal®, a security and facility services company in North America, and SOS Security®, a renowned provider of global security services, announces that a definitive agreement has been executed with respect to a transformational merger that creates a security leader in North America and beyond. “I am thrilled to welcome Edward Silverman - one of the most highly regarded leaders of the security industry - and the SOS Security team to the Allied Universal family,” said Steve Jones, CEO of Allied Universal. Providing new security solutions SOS Security brings a complementary and scalable approach to security services to Allied Universal “Like Allied Universal, SOS Security has built a renowned and respected brand of security services. Now, working together, we will be able to combine the best of both brands to elevate security services, the breadth and reach of capabilities and opportunity to provide new security solutions.” Founded in 1969, SOS Security brings a complementary and scalable approach to security services to Allied Universal. With offices in five countries, SOS Security's 15,000 employees work around the world providing safety, security, executive protection, intelligence, consultancy and advisory services, including more than 2,000 assignments last year in over 100 countries through its subsidiary, AS Solution. The company has among the highest retention rates in the industry with respect to customers and security personnel. Comprehensive and integrated technology solutions The joining of Allied Universal and SOS Security establishes the company as a truly differentiated service provider in the global security industry with: A combined force of over 230,000 security professionals; Combined best practices to elevate security service delivery and industry norms; SOS Security’s unique capabilities in international markets and intelligence analysis; Allied Universal’s highly advanced, comprehensive and integrated technology solutions; Expertise in risk management specialising in security consulting, investigations, personal protection and threat, disaster and emergency response; High-level crowd management, event staffing and consulting providing a one-stop solution for event and site security. Delivering personalised services Following the merger, Silverman, the CEO and Founder of SOS Security, will serve as Co-Chairman of the Executive Committee and an Advisor to the Board of Directors, bringing his vision of scalable boutique security service to Allied Universal. “Delivering personalised services, whether operating under a billion or at $10 billion, has always been my mission,” said Silverman. “As part of Allied Universal, and with shared values and purpose, we have a remarkable opportunity to bring specialised security services that reflect client priorities and attract the best resources and strategic partners to the industry.”
Dortronics, a pioneer in electric locking hardware and controls for the security industry, is showcasing several access control solutions at ISC East (Booth 447), November 20-21 at the Jacob K. Javits Convention Center. Dortronics will highlight the capabilities of its 4800 series interlock door controller, waterproof pushbuttons, and electric strikes that can accommodate a wide range of applications and markets and can solve multiple security challenges. Operating door interlock and mantrap systems Unlocking or opening one door automatically secures other designated doors within the Interlock The Dortronics Interlock (4800 series) controller is a cost-effective method for operating door interlock and mantrap systems of up to five doors, specifically for applications like cleanrooms, back areas for casinos and prisons, in addition to retail, healthcare, and professional buildings to help improve overall safety and security. The 4800 Series Door is user programmable and can be field configured. It allows for designated doors to be unlocked or open at any time. Unlocking or opening one door automatically secures other designated doors within the Interlock. Additional features include a watchdog circuit to monitor operation, LED input/output status indication and voltage spike/surge protection. Providing end users with customised solutions Dortronics Waterproof Pushbuttons (models 5276 and 5277) have been specifically designed and manufactured to withstand harsh environments. The solutions feature LED illumination, large lockdown & panic buttons, key reset operation, momentary action, pneumatic time delay, adjustable time delay, waterproof & wash-down rated units, narrow, single and dual gang plate configurations with off the shelf or custom engraving and finishes. Model 5276 is guarded and waterproof, while model 5277 is touch sensitive and weather proof. “From our interlocking and mantrap solutions to our door control products, we can provide end users and integrators with customised solutions that can solve multiple needs,” said Bryan Sanderford, National Sales Manager, Dortronics Systems, Inc. “We look forward to showcasing each product’s numerous capabilities to ISC East 2019 attendees.”
ASSA ABLOY has signed an agreement to acquire AM Group, an Australian industrial door company within entrance automation. "I am very pleased to welcome AM Group and their employees into the ASSA ABLOY Group. I welcome this complementary addition to our business, specialising in innovative entrance automation,” says Nico Delvaux, President and CEO of ASSA ABLOY. Rolling steel doors and bi-fold doors “AM Group complements both our product offering and our geographic coverage in Australia. By adding their strong product portfolio, which includes rolling steel doors and bi-fold doors, to ASSA ABLOY’s commercial network, technologies and competences, we will continue our successful journey,” says Mogens Jensen, Executive Vice President of ASSA ABLOY and Head of Entrance Systems Division. AM Group was founded in Australia in 1923 and has 425 employees. The head office is located in Sydney, Australia. Sales for 2019 are expected to reach about AUD 120 million (approx. SEK 800 million) with a good EBIT margin and the acquisition will be accretive to EPS from the start. The acquisition is subject to regulatory approval and customary closing conditions and is expected to close during the first quarter of 2020.
Tamworth-based trade association, DHF (Door & Hardware Federation), has, this week, launched its CSCS-approved card partner scheme in collaboration with the Automatic Door Suppliers Association (ADSA). The DHF CSCS card provision is for those who work with industrial doors, domestic garage doors, automated gates & traffic barriers and metal or timber doors. CSCS cards for construction workers “Whilst not a legislative requirement, CSCS cards are supported by the government and provide proof that individuals working on construction sites have the appropriate training and qualifications for the job that they are doing,” explains DHF’s Commercial Manager, Patricia Sowsbery-Stevens. She adds, “By ensuring that the workforce is appropriately qualified or experienced, the card plays a vital role in improving standards and safety on UK construction sites. Indeed, the majority of principal contractors and major house builders require construction workers on their sites to hold a valid card.” Skilled Worker card DHF is asking that anyone who is applying for a card has evidence of CPD As part of the scheme, and in addition to any criteria set by CSCS such as a relevant NVQ for the Skilled Worker card, DHF is asking that anyone who is applying for a card has evidence of CPD (continued professional development). This will usually be in the form of a valid DHF training course certificate. “Each card is specific to the requirement,” continues Patricia. “In addition to the Blue Skilled Worker card, there are several other cards available, check the DHF website for further information.” CSCS card partner scheme The launch of the CSCS card partner scheme is a further ‘feather in the cap’ for the pro-active federation who, in July of this year, announced that it is the very first UK organisation to offer an official theory-based ABBE-qualification for three of the industries it serves, approved and regulated by Ofqual, the Government Office of Examination Regulation. The move was described as ‘ground-breaking’. The launch of CSCS cards is further endorsement of DHF’s drive for safety and best practice. Gordon Jenkins, Director of Operations at CSCS commented, “CSCS is pleased to see the collaboration between DHF and ADSA in the issuing of cards for the Doors sector. This collaboration demonstrates DHF’s commitment to meeting the requirements of the CLC and ensuring that construction site workers are appropriately qualified. In the process, we are all playing our part in improving standards and safety on UK construction sites. CSCS looks forward to a long and productive relationship between our three organisations.”
Geutebrück is well positioned for the industry 4.0. The family-owned company has expanded its portfolio within a short time, from being a pure CCTV supplier of products for distributors and installers to a provider of software-based all-round solutions for safety and process optimisation, including for end customers. Part of this were not only comprehensive technical developments or a significantly higher range of services, but also organisational reorganisation, such as the Business and Development division that was newly created in April. It includes the Key Account, Key Market Development, Pre-Sales and Marketing departments. Burkhard Henzgen is the General Manager Business Development. He directly reports to the two CEOs Katharina Geutebrück and Christoph Hoffmann. Henzgen is supported by Georg Goffin, Director Sales, who is responsible for the DACH region with his team, and Dr. Christian Gutzen, who also heads the newly created "Pre-Sales" division. User-friendly video security software Museums, KRITIS, banks or public authorities from over 70 countries use Geutebrück's solutions Isabel Kluth, who only joined Geutebrück in October, is in charge of national and international marketing. The Finance, HR and Controlling departments, for which Andreas Degen is responsible as Commercial Director, have also been restructured. Katharina Geutebrück, CEO: "The new management team will ensure that we continue to be experts in a field that only a few providers worldwide are able to master.” Geutebrück is an international provider of highly available, user-friendly video security software and the corresponding hardware. The Geutebrück experts provide consulting and services to customers throughout the planning phase, during implementation and after completing the order. Well-known museums, KRITIS (critical infrastructures), companies from industry and logistics, banks or public authorities from over 70 countries use Geutebrück's solutions. The family-owned company is managed in the second generation by Katharina Geutebrück and her husband Christoph Hoffmann and celebrates its 50th anniversary in 2020.
Insider threat programmes started with counter-espionage cases in the government. Today, insider threat programmes have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a programme, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organisation Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organisation. They can cause brand and financial damage, along with physical and mental damage. Insider threat programme Once you determine you need an insider threat programme, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a programme Next, get a top to bottom risk assessment to learn your organisation’s risks. A risk assessment will help you prioritise your risks and provide recommendations about what you need to include in your programme. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat programme will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a programme and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of programme needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the programme. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the programme, build the culture and promote awareness. Teach employees about the behaviours you are looking for and how to report them. Behavioural analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organisation need to detect insider threats? Organisations need software solutions that monitor, aggregate and analyse data to identify potential threats. Behavioural analysis software looks at patterns of behaviour and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behaviour of people and notifies security staff when behaviour changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviours and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behaviour, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behaviour. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organisation has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat programme. Big companies should invest in trained counterintelligence investigators to operate the programme. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behaviour Using the right technology along with thorough processes will result in a successful programme You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behaviour and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat programme. IT is the most privileged department in an organisation. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat programme takes time and patience. Using the right technology along with thorough processes will result in a successful programme. It’s okay to start small and build.
Growing up, I was surrounded by the military way of life as my father was a Captain in the Marine Corps during the Vietnam War and my grandfather and uncles all served in the military. Even from a young age, I knew I was going to serve our country. My 22-year career in the military includes serving in the United States Air Force, the California Air National Guard and as a reservist assigned to an active-duty Air Force unit. Training and development operations Over the course of my military career, I held a variety of assignments from starting out as a Gate Guard to becoming a Flight Chief and Non-Commissioned Officer in Charge (NCOIC) of a Security Forces section. I retired from the military as a Master Sergeant. After my deployment to Afghanistan, I joined Allied Universal as a security director. My 17-year career at Allied Universal encompasses roles including Service Manager and General Manager at the West Los Angeles Branch and leading the Training and Development operations and Fire Life Safety Division. In 2008, I was tasked to develop and implement the company’s Healthcare Division. Attaining meaningful employment opportunities Below are just a few reasons why the physical security sector is a natural fit for military veterans: Self-Discipline and Organisation Coveted in Security Sector - I believe that the skills learned in the military, such as self-discipline and organisation, have provided the necessary tools to be successful. I truly enjoy working with other veterans at my company as we all know that we can count on each other to get the job done right. This bond and sense of commitment to each other is always there. Multi-faceted Career Paths Available - The security sector also offers veterans the ability to attain meaningful employment opportunities with multi-faceted career paths. A veteran’s background and experience are highly valued in this sector and there are many positions to match our skill sets and expertise. The responsibility we have for those in our charge is really not any different than what we have learned in the military. Team Players - Teamwork is a lesson all military veterans learn. In the military, you live and work together, and are taught to support your team members and efficiently collaborate with the people around you. This is an invaluable skill in the security sector whether you are seeking an entry level or management position. No Military to Civilian Decoder Needed - Veterans need a ‘military to civilian decoder’ system to help explain the significance of their military skills and how they translate to the general employment landscape. The physical security sector, however, understands the language of the military and don’t generally require that military responsibilities be coded into language that non-military can understand. Securing mid-level appointments The physical security sector features a wide variety of jobs from entry level, middle management to senior positions. A retired veteran with a pension may look to the security sector for part-time or full-time entry level work. Other former military, who are not eligible for retirement benefits, may secure mid-level appointments with the goal of climbing the ladder to the highest rungs. The flexibility and opportunity are unparalleled in the security sector. Veterans generally enter the workforce with identifiable skills that can be transferred to the physical security world and are often skilled in technical trends pertinent to business and industry. And what they don't know, they are eager to learn - making them receptive and ready hires in physical security environments that value ongoing learning and training.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organisation's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organisations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realising it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyse a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analogue technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organisation open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organisations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
Gallagher Security, a division of Gallagher Group, a privately-owned New Zealand company, is a global presence in integrated access control, intruder alarm and perimeter security solutions. Gallagher entered the global security industry in the 1990s with the purchase of security access control business Cardax. In the last several decades, the company has leveraged its experience in electric fence technology to develop a variety of innovative solutions used to protect some of the world's most high-consequence assets and locations. Solving business problems Among Gallagher’s recent innovations is the Security Health Check, a software utility that enables customers to run an automated check on their Gallagher Command Centre security system. To get an update on the company, we interviewed Richard Huison, Gallagher’s Regional Manager for the U.K. and Europe, who says he has a passion for technology and solving business problems. Huison says working in the industry for more than 20 years has shown him you can never stop evolving and adapting. Q: What are Gallagher's points of differentiation versus competitors? Huison: Gallagher’s strengths are in solving business problems outside of the normal access control and intrusion detection solutions. Enforcing company policy through compliance and competency is what really matters to business continuity. Using Gallagher Command Centre to oversee the security, health and safety and compliance brings true business value to the client who benefits from reduced costs and risk to the success of their growth and strategy. Q: What is the biggest challenge for customers in the security market, and how does Gallagher help to meet that challenge? Huison: A great solution fit is key. Where most fail is choosing a solution that does not meet the needs of the client in 10 to even 20 years’ time. As businesses evolve and grow, so must the security solution. In a recent conversation, a client had to replace a 300-door access control system that was no longer supported. ‘Why Gallagher?’ they asked. The answer: ‘If you had chosen Gallagher 10 years ago, we would not be having this conversation.’ Ensuing the system you choose is legacy-compliant is king. Gallagher’s brand is well known for protecting Critical National Infrastructure Q: Please describe Gallagher's geographic presence in the UK and Europe. Huison: Gallagher’s brand is well known for protecting Critical National Infrastructure. They choose to adopt our solutions because we meet the highest levels of resilience against cyber-attacks. Our ability to modernise legacy systems ensures the maximum return on investment with minimal disruption to business continuity. Gallagher solutions cover a broad mix of verticals, with strengths in high security, education and large corporate entities. Our Channel Partner network is continually growing so more clients can benefit from the diverse and powerful Gallagher Command Centre software. Q: Describe how Gallagher is typically integrated into larger systems. Huison: Our systems offer the flexibility of being standalone or globally networked via our Multi-Server environment. Most integration happens logically where data is pushing into our Command Centre database. The single point of truth allows for minimal data errors and efficiencies around manual input. The total cost of ownership is greatly reduced in allowing the system to work for the client and not the other way round. Over and above this, Integration into other solutions brings that rich data back to one software front end. Q: What is Gallagher's biggest challenge and how will the company seek to meet that challenge? Huison: Our biggest and continual opportunity is being a relentless innovator. We are not short of ideas and how we are bucking the trends with our solutions. Broadcasting these messages is not always easy in the digital age. This is why Gallagher is investing heavily in more shows, publications and specific vertical conferences globally. Q: What is the market's biggest misconception about Gallagher? Huison: Our brand is known for perimeter solutions with our monitored Pulse Fence. What many forget is we have a very powerful access control and integrated intrusion detection solution that meets Government standards around the world. We are unique in that all three can be controlled via one software platform that is cyber-resilient and infinitely configurable to suit many verticals. Q: What is your message to the security market? Huison: Many see Gallagher as only suitable for large and complex sites. I openly challenge our audience, speak to us and you may find we can provide an Enterprise Level solution that is delivered on budget and provide an outstanding return on investment for the client. Our pedigree of 80 years shows we never stop innovating and building that trusted advisor status with many lifelong clients.
The healthcare market is rife with opportunity for security systems integrators. Hospitals have a continuous need for security, to update their systems, to make repairs, says David Alessandrini, Vice President, Pasek Corp., a systems integrator. “It’s cyclical. Funding for large projects might span one to two years, and then they go into a maintenance mode. Departments are changing constantly, and they need us to maintain the equipment to make sure it’s operating to its full potential.” The experience of Pasek Corp. is typical of the opportunities available for security integrator companies in the healthcare vertical. A single large hospital system can supply a dependable ongoing source of revenue to integrator companies, says Alessandrini. Hospitals are “usually large enough to provide enough work for several people for an extended length of time.” Healthcare customers in Pasek’s service area around Boston provide the potential for plenty of work. “We have four major hospitals, each with in excess of 250 card readers and 200 cameras, in the Boston area,” Alessandrini says. One appeal of the healthcare market for North Carolina Sound, an integrator covering central North Carolina, is the breadth of possible equipment they can sell into the healthcare market, including access control and video, of course, but also other technologies, such as audio-video systems in a dining room. North Carolina Sound has also installed sound masking in some areas with waiting rooms to protect private patient information from being overheard. Locking systems on pharmaceutical doors are another opportunity. Data capture form to appear here! IP based networked video systems A facility’s IT folks must be convinced an IP solution will function seamlessly on their network Among North Carolina Sound’s customers is Wayne Memorial Hospital, Goldsboro, N.C., which uses about 340 video cameras, with 80 percent or more of them converted to IP. The hospital is replacing analogue with IP cameras as budget allows, building network infrastructure to support the system. The healthcare market tends to have a long sales cycle; in general, sales don’t happen overnight or even within a month or two. In fact, the period between an initial meeting with a healthcare facility and installation of a system could stretch to a year or longer. A lot happens during that time. Healthcare systems involve extensive planning, engineering, and meetings among various departments. Physical security systems that involve the information technology (IT) department, as do most systems today, can be especially complex. Installation of networked video systems based on Internet protocol (IP) requires deep and probing discussions with the IT team about how a system fits into the facility’s network infrastructure. A facility’s IT folks must be convinced an IP solution will function seamlessly on their network. Compatible with the network They must vet the technology to ensure the devices and solutions will be compatible with the network, and must sign off on technology choices. And even more important is determining if the security system will adhere to cyber security requirements of the facility. A complete solution that integrates nearly any system that lives on or uses a facility’s network is ultimately what the healthcare vertical is moving toward, says Jason Ouellette, General Manager – Enterprise Access Control & Video, Johnson Controls. Healthcare security professionals are early adopters of technology, implementing the best technology available” “We are hearing more and more from customers across industries that they want to be able to use their security systems and devices for more than just security: they want added value,” says Ouellette. Many want to use access control, video surveillance and other data sources to assess their business operations and/or workflows with the goal of improving efficiency. Upgrade cost-effectively Historically, three factors have prevented many organisations from moving forward with new technologies: lack of money, proprietary systems, and the need to “rip and replace” large parts of the installed systems, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. "Today, while funding is almost always a limiting factor at some level, the progression of industry standards and ‘open’ systems has made a big positive impact on the ability of organisations to upgrade cost-effectively,” he says. Despite any obstacles, healthcare customers generally welcome new innovations. “I would say healthcare security professionals in general are early adopters of technology and like to implement the best technology available,” says Jim Stankevich, Global Manager – Healthcare Security, Johnson Controls/Tyco Security Products. “For most, rapid implementation is limited by budgets and available funding." Read parts one and three of our heathcare mini series here and here.
Ethics is a particularly important subject in an industry such as fire and security because the result of unethical actions might make the difference in life and death. For example, if an employee acts unethically when servicing a fire extinguisher, the result could be to burn down the building. Although ethics is not a common topic of discussion in the fire and security industry, perhaps it should be. Chubb Fire and Security is a company that provides an example of how an emphasis on ethics can benefit a company, their employees, their customers and the whole world. Fire safety and security risks “The fire and security industry is different than others because lives and people’s safety are on the line,” says Harv Dulay, Director of Ethics and Compliance at Chubb Fire and Security. “Our purpose is to protect clients from fire safety and security risks. This is a business where no one should take short cuts. It is important to do the right thing all the time, every time, and it’s about protecting lives and property.” At Chubb, we have a code of ethics, our ‘bible,’ that is issued to employees when they start" “At Chubb, we have a code of ethics, our ‘bible,’ that is issued to employees when they start,” says Dulay. “Within the bible are core fundamental rules about what’s acceptable and not acceptable. We lay it out for employees very specifically. They understand and embrace the code of ethics, which is based on trust, integrity, respect, innovation and excellence.” “If you get those right, the business moves in the right direction. A key piece of our ethics policy is based on trust. We relate to others with openness, transparency, and empathy. It makes Chubb a better place to work and enables us to provide better service to customers.” Fire audit For Chubb, ethics is not just theoretical, but ethical concepts play out every day in practical ways. An example might be an engineer who goes to a customer’s site and is asked to do a task that is outside his or her duties and/or not allowed under the ethics policy. The pressure might be even greater if the employee is struggling to meet a sales figure. The code of ethics addresses specific situations and outlines the behaviour that is expected. In another example, a customer asked a Chubb technician to forge a certificate saying the customer had previously passed a fire audit in order to validate his previous year’s insurance. Showing ethical integrity, the technician was able to cite the company’s Code of Ethics and refuse to do it. The technician also reported the situation to his Ethics and Compliance Officer. Customers benefit, too. Delivering ethics excellence It’s a message heard from the top down, from everyone in the company" One of Chubb’s sales associates immediately reporting a situation in which all the tenders and competitors’ prices were visible as they prepared a tender for upload to a customer portal. Not only did the sales associate deliver ethics excellence by reporting the issue, he also helped a grateful customer who thereby avoided anti-trust issues, says Dulay. “Ethics is not just a current issue,” says Dulay. “It’s embedded in our values and has been since the beginning. Ethics is making sure people do the right things.” Ethics is integrated into the Chubb business model, and everyone knows what is expected of them. “It’s a message heard from the top down, from everyone in the company.” On-line training modules Ethics discussions begin for employees at Chubb when they join the company; clear instructions about ethics are included as part of employee induction. There are nine modules of ethics training during employee orientation, and a discussion with an Ethics and Compliance Officer is part of the onboarding process. The training program includes information about ethics, company expectations around ethics, where to go for questions about ethical issues, and details of the anonymous ombudsman program. Additionally, field staff are trained by their supervisors via regular face-to-face ethics toolbox talks. Office staff complete a series of on-line ethics training modules regularly. A series of supervisor-led trainings encourage managers to deliver face-to-face ethics training to their team, citing real-life examples. Healthy discussions are encouraged to deal with any ‘gray areas.’ Worldwide implementation of data security Some 14,000 employees globally have multiple options when it comes to reporting an issue Dulay estimates that ethics and compliance officers spend about half their time answering questions and clarifying for employees what’s expected in the code of ethics. Some 14,000 employees globally have multiple options when it comes to reporting an issue, and there are full-time Ethics and Compliances Officers in every country where Chubb does business. A reflection of Chubb’s global approach to compliance is their worldwide implementation of data security requirements of Europe’s General Data Protection Regulation (GDPR); the company saw the benefits of the program for any jurisdiction. Training and education are part of Chubb’s investment in ethics. For example, a recent module on ‘respect in the workplace’ covered the need to create a company culture in which everyone feels respected. “Training and continuous communication are embedded in the organisation,” says Dulay. Managing potential conflicts proactively “We invest in the process,” says Dulay. “We have had employees who left the company and then come back. They realised the importance of ethics and rejoined us. We start with the foundation that we would rather lose business than give up our ethical standards,” says Dulay. Some business is not worth getting if you don’t adhere to your values" “We won’t abandon our policies even if there is money at stake. Some business is not worth getting if you don’t adhere to your values. We manage potential conflicts proactively by creating and instituting methods in which employees have access to tools they can use to be successful and adaptable in times of change,” says Dulay. “Also, we will not tolerate retaliation against any employee who reports wrongdoing – regardless of the outcome of the investigation.” Forming good ethics behaviour And while there is no specific monetary value assigned to good ethical practices, success can be measured. “We measure it by people’s conduct, the number of cases we have, and awareness,” says Dulay. “It’s good for employee morale, and it’s good for customers and our business. It’s not measurable, but it is fundamental for business and customers.” “The work we do as a company can impact people’s lives so it is important that everyone has an understanding of the importance of their role,” says Dulay. A common misconception about ethics is: “If no one is watching, it must be ok.” However, Dulay says it is the things employees do when no one is watching or checking in on them that form good ethics behaviour. During training, Chubb emphasises that ethics is about doing the right thing, all the time even if no one is watching.
STANLEY Security, one of the UK’s renowned security providers, has completed a major CCTV installation for Bridgnorth Aluminium Limited, the UK's only manufacturer of aluminium flat rolled products. At 27 hectares, Bridgnorth Aluminium’s site in Bridgnorth, Shropshire is extensive. It is home to a casthouse, rolling mill, two litho centres, a multi-slitting line and finishing lines. IP CCTV system The IP CCTV system is critical to our business in terms of health and safety of our employees and site security" The company had previously been using three separate CCTV systems, each covering different parts of this large site, one of which was over 15 years old, had very poor image quality and was starting to show signs of failure. Furthermore, none of the CCTV systems had any level of redundancy, so if one failed access to those particular cameras were lost, along with any recorded footage. Steve Denton, IT Manager at Bridgnorth Aluminium, explains the decision to upgrade, stating “We needed to consolidate everything into one single CCTV system, including all of the cameras from the other three systems, and we needed to add a level of redundancy. The IP CCTV system is critical to our business in terms of health and safety of our employees and site security.” IP video surveillance Following detailed discussions with Bridgnorth Aluminium, STANLEY Security designed a new site wide IP based CCTV system, covering external areas and the perimeter of the site, along with internal areas including key indoor production spaces. The system takes advantage of Bridgnorth Aluminium’s existing IP network which is deployed in most areas of the site, negating the need to install COAX cable. Opting for an IP-based CCTV system has also enabled Bridgnorth Aluminium to make use of newer technology with better quality images, which was the key. STANLEY 2MP bullet cameras and dome cameras The cameras feed is stored in two Milestone Husky M500 Advanced Network Video Recording hardware platforms The new IP CCTV system features STANLEY 2MP bullet cameras and dome cameras, including 360⁰ dome models. The cameras feed is stored in two Milestone Husky M500 Advanced Network Video Recording hardware platforms; one of which is used in case of redundancy. Bridgnorth Aluminium is pleased with the new CCTV system as Steve Denton comments, “The image quality of the new system is streets ahead of the old system. The area of coverage is also far greater thanks to the addition of 180-degree wide angle and 360-degree cameras. The software is very easy to use and has some very useful features to aid with playback of recorded footage. The software has already helped us to retrieve footage that we would have had little chance of retrieving before.” Enhanced site security STANLEY Security has been working with Bridgnorth Aluminium since 2017 when it took over the support of the company’s existing CCTV systems. “The transition period had proved successful” states Steve, commenting on their decision to appoint STANLEY Security for this project. He adds, “The service from STANLEY has been excellent, our account manager Amber is one of a kind and always goes above and beyond for us to ensure that we receive the best service possible.”
Wintec (The Waikato Institute of Technology), established in 1924 is a major New Zealand Government-funded tertiary institution, which has three Hamilton campuses; a city site overlooking the central business district, Avalon campus on the northern outskirts of the city, and a horticultural campus at Hamilton Gardens. In addition, it has regional operations at Te Kuiti and Thames and also an office in Beijing. The Avalon campus, a ten-minute drive from the city, is home to specialist trades training facilities, a state-of the-art sport and exercise complex and custom designed facilities for the School of International Tourism, Hospitality and Events. The third Hamilton campus, the Horticultural Education Centre, is situated amidst the 58 hectares of Hamilton Gardens. On-line distance education Wintec’s programmes and qualifications are nationally and internationally recognised Wintec is one of the largest institutes of technology in New Zealand, and has more than 35,000 full-time and part-time students, more than 500 full and part time staff and eleven schools within its academic faculty. International enrolments exceed 1000 from 47 countries. A range of student services provide its domestic and international students with a high level of support so they enjoy a positive, safe and secure study experience. Wintec’s programmes and qualifications are nationally and internationally recognised and its degrees have equal status to those from universities. The degree programmes include Media Arts, Midwifery, Nursing, Occupational Therapy, Early Childhood Education, Business Studies, Engineering, Technology, Information Technology, and Sport and Exercise Science and a wide range of full and part time courses for those already in the workforce. Wintec is also recognised nationally in the delivery of on-line distance education for those unable to attend regular classes for reasons of geographical access or other constraints. Electronically controlled doors Wintec strives for a balance of unobtrusive yet robust control of site activity, essential for maintaining an open campus environment. Shane Goodall, Security Manager at Wintec, describes the approach to security as highly proactive and collaborative: “by focusing on preventing issues arising, we now have a minimal policing role and the crime resolution rate is high”. This environment is underpinned by Gallagher’s security system, a core access control, intruder alarms and integration platform. Wintec first installed the Gallagher system (formerly Cardax FT) in 1999 and has since migrated this legacy system to Gallagher’s latest security technology platform. Security for the entire organisation, including satellite sites, is managed and monitored centrally from Wintec’s single Gallagher security system. Since initial installation, Wintec’s Gallagher access control system has grown from 7 to 240 electronically controlled doors in 2009, with another 40 planned - testimony to the scalability and flexibility of the system. Network friendly system communications The organisation first installed 6 cameras in 2004 which has increased to 7 DVRs and 85 cameras Wintec has integrated its imaging system to the Gallagher system delivering a visual record which can be matched to the audit trail of events in Gallagher Command Centre software. The organisation first installed 6 cameras in 2004 which has increased to 7 DVRs and 85 cameras (both analogue and IP). Another compelling aspect of the system for Wintec is the scalability and TCP/IP network friendly system communications. As well as monitoring and controlling staff and student access, equipment including computers, TVs, printers, audio visual resources at Wintec are also monitored through the Gallagher system. The ‘Gallagher Hub’, a new computer laboratory offering comprehensive IT resources is open 24 hours. The Hub contains 125 workstations, and there are plans to extend that number. Active monitoring of equipment though the Gallagher system has significantly reduced theft. Students and staff have scheduled access to shared IT resources, classrooms and lecture theatres. Manage cardholder data ‘Cardholder Import’, an XML Interface, supports the importation of cardholder data including course enrolments from their student record system to Gallagher Command Centre. Shane comments, “Student card issuing is an automated process which is enrolment-driven – a student’s access privileges are assigned according to their enrolled courses.” “To implement this, we defined a rules-based allocation of access groups in the Gallagher system using the XML interface. The interface is ‘live’ so that changes in the student enrolments database are immediately reflected in the Gallagher system. The student’s updated access privileges come into effect without delay.” Staff that interact directly with students are now empowered to manage cardholder data enabling the security team to focus on security. Students and staff utilise Mifare SmartCard functionality extensively, embracing them as an integral multiapplication tool in their modern educational environment – SmartCards are used to issue resources from the library and as pre-stored value cards enabling prepaid printing and photocopying. In the near future they will also be used in Wintec’s Pay and Display car-park and potentially as passes onto city council buses. Electronic access control At Wintec, security is not viewed as a discrete functional activity relegated to security staff only Stewart Brougham, Director of Internationalisation at Wintec, says students have given very positive feedback about their ID cards. In particular, the ability to verify the identity of staff members from their ID access cards provides peace of mind for students. The end result is a people-friendly campus. Future enhancements of Wintec’s security may include the utilisation of the CommCard solution from Gallagher to manage and monitor access to student accommodation. CommCard is a unique high level integration between the Gallagher Command Centre software and Salto off-line readers, delivering offline, non-monitored electronic access control for lower security doors. An overriding philosophy of collaboration has seen Wintec take a lateral approach to security, the value of which many organisations have yet to realise. At Wintec, security is not viewed as a discrete functional activity relegated to security staff only. The ongoing management of security is a joint effort between the security services team and the information services team. Increasing operational security The security services team manages the Gallagher system while IT looks after back end functions such as installation on the network and backup. Wintec has leveraged the convergence of security (access control) and other operational business functions recognising the tremendous potential for reducing risk and increasing operational security, safety, performance and efficiency. Looking beyond simply controlling and monitoring who goes where and when on site, Wintec is harnessing the reporting capabilities of Gallagher Command Centre to meet regulatory requirements. The Gallagher system enables the institution to report on actual space utilisation (not just space booking). Decisions are made for best use, and also to substantiate funding, based on these reports. “The key to space utilisation reporting are the frequency of reporting and the integrity and reliability of information,” states Stewart Brougham. It’s a national issue for educational institutes in New Zealand. Extending external partnerships “For Wintec, reporting is about ensuring compliance with regulatory requirements and is also a staff time management issue – reducing the administration load on lecturers, who would otherwise have to track student attendance manually.” Brian Fleming, Director of Gallagher Channel Partner, Concord Technologies, sites this lateral application of a security system as key to maximising the value of Gallagher to Wintec. Wintec has a strong relationship with Gallagher in the ongoing development of its technologies This collaborative philosophy extends to proactive external partnerships with their Gallagher Channel Partner, Concord Technologies, for the installation and maintenance of the Gallagher system, and with system designer and manufacturer, Gallagher. Having signed an agreement to continue in the capacity of a Gallagher field test site, Wintec has a strong relationship with Gallagher in the ongoing development of its technologies. Wintec’s success, in the last 5 years, as a test site reflects the competence of both its IT and security staff and the institute’s commitment to edge student services. Minimal training has been required. Software maintenance agreement There is open communication and information sharing between all internal and external parties involved, which means any issues that arise can be quickly addressed. Wintec has committed to a site maintenance plan with their security partner, Concord Technologies. The plan incorporates both software and hardware maintenance to ensure the system is maintained on the latest operating platforms within a known cost structure. A Software Maintenance Agreement also ensures enhanced ongoing system performance and reliability of the Gallagher system. Acknowledgements Gallagher would like to acknowledge the support of Wintec and security partner, Concord, with the development of this in-site study. Gallagher would also like to particularly acknowledge and thank Shane Goodall for the pivotal role he plays in championing the collaboration of these parties and for his outstanding support of the Northern Region Cardax User Group (NZ) in the capacity of Chairman of the group.
With the ability to power over 590,000 UK homes from a total capacity of 660 MW, Walney Extension is set to be the biggest offshore wind farm in the world when it is commissioned at the end of 2018. The new onshore substation covers an area of reclaimed marsh land and required an innovative perimeter and internal fencing package to be designed to offer the highest levels in security and electrical safety. Design work started in 2017 and looked at how existing fencing systems could be used to create a bespoke solution. Challenges faced by utilities industry Protecting critical national infrastructure in the utilities industry presents a number of challenges: External perimeter to offer guaranteed delay against attack All fencing to be earthed or offer non-conductive features Internal fencing to include multiple systems including rigid mesh and GRP in same fence line External perimeter and access control to be compatible with monitored pulse fencing (electric fencing) to meet security requirements Internal fencing to be base plated Prevention of unauthorised access The substation installed five systems in total from the CLD Fencing Systems range of rigid mesh fencing and security gate solutions and combined this with a Gallagher Monitored Pulse Fence to add an extra layer of security to the site. The Gallagher solution provides reliable detection and prevention of unauthorised access to the site, protecting the public from accidental or intentional entry to the site. The solution ensures operational continuity, avoiding significant costs associated with loss of supply, while protecting the site's assets from theft and damage. The system has been so successful that they want to use the same solution for all its electrical substations.
The FeeMaster Smart Console from people and vehicle access control specialist Nortech provides a simple and cost-effective way of managing access to car parks and facilities for vehicles and pedestrians. All the access control data is encoded onto a Mifare card using the FeeMaster Smart Console. As a standalone system, there is no wiring between the access control point and the console, making it easy and cost effective to install. Parking management system The console can print customer receipts and/or barcode exit tokens Part of the popular FeeMaster range, the FeeMaster Smart attendant console is a compact, elegant and easy-to-install device that reads barcode tickets issued at an entry station, calculates the fees payable based on pre-programmed tariff details, and encodes reusable Mifare access control cards with validity data. If necessary, the console can print customer receipts and/or barcode exit tokens. It is also able to control a till drawer and can optionally provide a relay output signal which can be used by third equipment i.e. barrier control whenever a card has been encoded or an exit ticket printed. The FeeMaster Smart time-based parking management system is designed to provide information about the initial arrival time of each visitor and uses cards to strictly control customers’ access rights to car parks and facilities as well as the validity period. Fee calculation system Popular applications that have used the FeeMaster attendant’s console to control visitor access include Bristol Aquarium and Edinburgh Castle, where an easy to install and operate and an automatic fee calculation system with tariff and grace period settings included was required. Bristol Aquarium required a cost-effective and efficient product that would not only save money but would also make the constant stream of visitors easy to monitor. The barcode reader connects to a barrier/turnstile/gate at each site and opens once a valid barcode has been scanned by a visitor using easy to programme modes of operation. New security products Nortech has supplied products and solutions to the security industry for over 25 years The simple to use design makes the console ideal for reducing queues and keeping the flow of people moving during busy periods, is extremely versatile and can simultaneously support several methods of revenue generation. Edinburgh Castle has been benefiting from the FeeMaster system for a number of years, using it to control and manage the strict parking at its site. The console allows the staff to control any misuse of the car park and ensures that there are enough parking spaces without the need for expensive cabling or disruption. Nortech has supplied products and solutions to the security industry for over 25 years as an independent British company. The company uses extensive experience and expertise to create new security products to fit their clients’ needs and designs everything with the customer in mind.
Avigilon Corporation (“Avigilon”), a Motorola Solutions company, announced it was selected to help protect the security of Independent Express Cargo Ltd. (“Independent Express Cargo”) in Dublin, Ireland. Independent Express Cargo is one of Ireland’s largest pallet delivery operators, serving as a national transport network hub and full third-party logistics supplier with 25 depots across the country and over 1,000 active clients. Avigilon Control Center VMS To improve security throughout its Dublin site, which consists of 180,000 square feet of warehouses on a nine-acre site, Independent Express Cargo worked with integrator Usee.ie to install a complete Avigilon security solution. The new system features Avigilon Control Center (ACC) video management software, which provides security operators with a more efficient way to manage video from a central location. ACC software also includes advanced artificial intelligence (AI) and video analytics capabilities ACC software also includes advanced artificial intelligence (AI) and video analytics capabilities, including Avigilon Appearance Search and Unusual Motion Detection technologies. Additionally, a combination of Avigilon cameras — including the H4 Pro, the H4 Multi-sensor and the H4A Bullet with self-learning video analytics — were deployed to achieve optimal coverage while allowing security operators to leverage the benefits of real-time analytics. Incorporating advanced AI technologies By implementing a complete Avigilon security solution that leverages advanced AI technologies, Independent Express Cargo has seen an increase in operational efficiencies and improved security of its sites, assets and resources. “With complete security solutions from Avigilon, we have been able to increase the speed at which we can detect events across our sites,” said Owen Cooke, director of Independent Express Cargo. “In the fast-paced environment of transportation logistics, this has dramatically increased efficiencies so that we can continue to focus on our number-one priority: our customers.” Intelligent video security system “Avigilon AI and analytics allow our customers to improve operations while maintaining system flexibility and ease of use,” said Bernard Pender, chief executive officer of Usee.ie. “Choosing Avigilon helps us meet our client’s goal of deploying a highly intelligent and user-friendly video security system.”
PotashCorp is the world’s largest fertilizer company by volume. They have facilities and business interests in seven countries and are dedicated to the challenges of feeding the world’s growing population. PotashCorp produces three primary crop nutrients – potash, phosphate, and nitrogen. Recognised as the world’s leading potash producer, they are responsible for 20 percent of the global capacity. Their facility in Lima, Ohio is one of four locations whose primary function is to create a range of products including ammonia, urea, nitric acid, and nitrogen solutions. Safety is PotashCorp’s number one priority, and this is evident in the number of awards they’ve received. Management are committed to providing a healthy work environment where employees have a strong personal safety ethic, rooted in awareness and focussed on incident prevention. Implementing a cost-effective solution We found that no other product could compare to Gallagher – its feature set, open API, competencies, and price"Security concerns and the need to implement a more cost-effective solution led PotashCorp to discover Gallagher. “We were looking for a system that would allow for seamless integration. After thorough research, we found that no other product could compare to Gallagher – its feature set, open Application Programming Interfaced (API), competencies, and price. The choice was easy,” says Jeff Johnston, Network Administrator for PotashCorp. “The cost of the product along with its capabilities is incomparable in the market.” It made sense for PotashCorp to replace their entire security system rather than updating an outdated and deteriorating system. Safe and secure working environment Driven to providing a best-in-class, safe, and secure working environment, PotashCorp partnered with the Digital C.O.P.S. Division of Perry proTECH, a business technology solutions company, and Gallagher, to develop a customised security solution. The system needed to be fully integrated, scalable and expandable, digitally based, and user-friendly. Benefits of PotashCorp’s new security solution include: Video integration, for safety precautions and oversight Wireless lock integration, utilising Salto locks out in the field on network cabinets User-friendly report generation, creating cost and time savings PotashCorp will soon implement Gallagher Mobile Connect, a secure and convenient access solution that allows people to use their smart phone in place of an access card. Greater efficiency in plant turnaround Gallagher Command Centre provides the flexibility to easily add cardholders to the existing databasePotashCorp is required to undertake a plant turnaround every four to five years. A turnaround, or shutdown, is a scheduled period of non-production, during which day-to-day plant operations cease. All focus shifts to maintenance, cleaning, inspection, and repair, with employees and contractors working around the clock preparing the plant to resume its regular operations. Turnarounds are one of the most crucial events in the routine operation of a chemical industrial plant and are extremely costly, due to production time lost, increased labour costs and equipment expenses. Speed and efficiency is vital as the turnaround process has the ability to strongly affect a company’s bottom line. PotashCorp can have an additional one thousand contractors and staff onsite during a turnaround. Gallagher Command Centre provides the flexibility to easily add cardholders to the existing database, while enabling management and video operators to monitor cardholder movement throughout the plant. Executing a timely turnaround that stays within budget makes a huge contribution to the plant’s efficiency and drives the company’s future success. Immediate headcount in event of emergency Mike Resar, PotashCorp’s Safety, Health and Environmental Manager at the Lima site noted, “The safety of our employees and contractors is of the highest concern for us. We are now able to generate muster reports that provide an immediate headcount in the event of an onsite emergency. We can also produce time reports easily and without the need for external programming help.” By upgrading legacy system and performing the interface with Gallagher, PotashCorp realised a $20,000 savingOne of the world’s largest chemical companies and a leading manufacturer of petrochemicals resides on the PotashCorp site and shares several turnstiles. Both companies selected Gallagher, and a system-to-system integration was developed, allowing control of the turnstiles and several doors to be shared between the two companies. Tangible cost savings By upgrading their legacy system and performing the interface with Gallagher, PotashCorp realised an immediate $20,000 saving. As the system expands, the savings have continued. After thoroughly vetting their options, PotashCorp has found that the cost per door will be one-quarter less than that of their previous system. They are still witnessing a substantial return on their investment. With the recent addition of four controllers and twelve readers, selecting Gallagher has saved PotashCorp nearly $70,000. “The open integration, cost savings, and ease of reporting is truly remarkable. The difference and quality of the system is undeniable in comparison to what we had prior to Gallagher Command Centre,” says Jeff.
Round table discussion
The high cost of thermal imaging cameras historically made their use more likely in specialised law enforcement and military applications. However, lower pricing of thermal imaging technologies has opened up a new and expanding market for thermal cameras in the mainstream. We asked this week’s Expert Panel Roundtable: What are the new opportunities for thermal cameras in mainstream physical security?
Fire and security systems are two elements of the same mission: To keep buildings and their occupants safe. However, the two systems often operate independently and may not be integrated. Should there be more integration and what are the pitfalls? We asked this week’s Expert Panel Roundtable: What are the challenges and opportunities of integrating security and fire systems?
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?