Eagle Eye Networks, global provider of cloud-based video surveillance solutions, announced that it has enhanced the video analytics offered within the Eagle Eye Cloud VMS. Customers can easily and instantly activate analytics on their cameras without having to install additional hardware or software. No on-site technicians or system upgrades are needed to immediately receive analytic alerts and data.
Eagle Eye Cloud VMS
Eagle Eye Cloud VMS customers can enable analytics from the dashboard for any camera in their account. Eagle Eye Analytics will function on any camera that is supported by the Eagle Eye Cloud VMS – no analytic functions of the camera are required. Eagle Eye Analytics will even operate with analog cameras. The ability to deploy analytics quickly and without upfront hardware or software investment shows the long-term advantages of a cloud-based solution.
The following analytics are now available: Intrusion detection is used to generate a notification when an object enters that forbidden area
Line Crossing – Detects when an object crosses a virtual line. Direction may be specified, and notifications may be generated. It is useful for receiving notifications when a security boundary (fence, restricted area, and one-way road) is crossed. It is also well suited for monitoring building entrances, loading docks, and parking lots.
Intrusion Detection – Detects when an object enters a customer defined area. Intrusion detection is used to generate a notification when an object enters that forbidden area.
Object Counting – Counts how many objects cross a line in either direction. This can be used for counting cars, people, or other objects. Total count per day, per direction, and current delta of the count are maintained and displayed.
Loitering – Monitors a defined area and triggers an alert if an object lingers longer than the pre-configured dwell time.
Eagle Eye Gallery Viewer
In the enhanced Eagle Eye analytics experience, customers are able to track and view up to twenty-five analytic events in Eagle Eye’s intuitive Gallery Viewer. The Eagle Eye Gallery Viewer is an exceptional tool for quickly finding video of interest and viewing active motion and analytic events. In addition, the improved Eagle Eye Cloud VMS gives customers the ability to gain further operational insight by generating customised period graphs of the enhanced data from five minutes to seven days.
The enhanced Eagle Eye Analytics are immediately available and can be enabled within the Eagle Eye Dashboard on a camera-by-camera basis. Customers do not need to replace their existing cameras to have access to Eagle Eye Analytics.
Carbon Black, a provider of next-generation endpoint security delivered via the cloud, announces that it delivered zero delayed detections and zero tainted detections in the MITRE Corporation’s Adversarial Tactics, Techniques and Common Knowledge (ATT&CK) assessment. The MITRE assessment tests the ability to quickly detect specific adversary tactics and techniques as captured in the ATT&CK knowledgebase.
The evaluations for this initial testing period used a MITRE-developed APT3 emulation plan on behaviour detection, telemetry and enrichment, among other elements. In the assessment, CB Response demonstrated it could automatically detect and display adversarial behaviours without humans-in-the-loop across the entire MITRE ATT&CK Matrix, which includes: initial access, execution, privilege escalation, defence evasion, credential access, discovery, lateral movement, collection, exfiltration, and command and control.
MITRE has set an excellent standard for how testing should be conducted in an open, rigorous, and sophisticated way"
“We’re proud to be among the initial vendors evaluated by MITRE and we’re extremely proud of these results. We attribute our very strong showing to our philosophy of building products the right way for the long haul,” said Scott Lundgren, Carbon Black’s Chief Technology Officer.
“Objective, transparent and open testing is critical as a means of driving the industry forward, and the MITRE ATT&CK framework offers a critical look at how real-world attacks play out. We believe MITRE has set an excellent standard for how testing should be conducted in an open, rigorous, and sophisticated way. We thank MITRE for its leadership.” “We’re very pleased with the participation in our first round of ATT&CK-based evaluations,” said Frank Duff, MITRE lead engineer for the evaluations program.
Endpoint data collection
“Effective cybersecurity can’t be done alone. We look forward to continued collaboration with the industry to help vendors understand their capabilities against known adversary behaviours and empower customers to more effectively buy and deploy these security solutions.”
Carbon Black’s MITRE ATT&CK feeds combine the power of Carbon Black’s unfiltered endpoint data collection and a robust collection of adversary techniques
In conjunction with the assessment results, Carbon Black announced it has added MITRE ATT&CK threat intelligence feeds to CB Response and CB ThreatHunter to deliver new behavior-based threat intelligence to customers. Carbon Black’s MITRE ATT&CK feeds combine the power of Carbon Black’s unfiltered endpoint data collection and a robust collection of adversary techniques to simplify threat detection and threat hunting.
The new threat feeds map directly to the various attack tactics outlined by MITRE. “By adding ATT&CK threat intelligence feeds to Cb Response and Cb ThreatHunter, organisations now have an unfiltered view into all endpoint activity viewed through the lens of attack building blocks and behaviours noted by MITRE. We believe this results in more comprehensive and advanced threat hunting capabilities for security professionals,” said Lundgren.
“The ATT&CK threat intelligence feeds directly integrate detection of ATT&CK tactics and techniques into the CB Response and CB ThreatHunter products, underscoring Carbon Black’s commitment to ATT&CK and other open standards and frameworks.”
ADT Inc., global provider of monitored security and interactive home and business automation solutions in the United States and Canada, has announced that it has completed its acquisition of Red Hawk Fire & Security, provider of commercial fire, life safety and security services and portfolio company of Comvest Partners.
Commercial security and fire safety
“We are pleased to complete this transaction, which strengthens ADT’s growth in the commercial security market and meaningfully expands the company’s product portfolio with the introduction of commercial fire safety related solutions,” said Jim DeVries, ADT’s President and Chief Executive Officer.
He further added, “With the added robust portfolio of fire and life safety solutions, as well as additional scale through commercially-focused sales professionals and technicians, we enhanced our position as a leader in commercial security, just as we are today in the residential market. ADT has a strong track record of successfully integrating acquisitions and we look forward to welcoming the talented Red Hawk team to the company.”
Moving forward, Red Hawk’s ability to showcase its products and services to a wider range of National Account and enterprise-level customers will be significantly accelerated with ADT, while also increasing ADT’s technician workforce dedicated to the commercial customer.
Maxxess Systems introduces new enterprise software that combines security, communications, business intelligence and data integration into a single, easy-to-use platform called Maxxess InSite.
Maxxess InSite, unified interface platform Maxxess InSite sets a new benchmark for security and business intelligence software platforms by every standard of measure"
Nothing operates, functions or looks like Maxxess InSite. It combines systems intelligence and human intelligence to detect and respond to unfolding events in real-time – all of which is queued, organised and displayed on a highly-intuitive user interface. In doing so, Maxxess InSite truly enables early action, allowing IT, Operational Technology and Physical Security departments within organisations to correlate data, improve response coordination, and deal with issues when they’re small – before they become large and costly. This new system is uniquely categorised as an Awareness and Response Coordination System.
“Maxxess InSite sets a new benchmark for security and business intelligence software platforms by every standard of measure,” said Nancy Islas, President of Maxxess Systems. “It goes beyond basic detection and control. It empowers total awareness and provides users with unprecedented capabilities to help prevent incidents from happening. It also coordinates the activities of first responders and the people they are assisting from the moment a threatening event is detected. And best of all, is the simplicity of Maxxess InSite’s operation.”
Security and business intelligence software
Maxxess Insite is a single system that harnesses the power of myriad system technologies
Maxxess InSite features an open-architecture framework to accommodate virtually any security or business intelligence application with comprehensive functionality – from automated responses with database integration to mobile alert notifications with two-way communications. Hardware and software solutions from more than 50 different leading manufacturers are already integrated into Maxxess InSite, providing more combined capabilities and functionality than any other cross-platform solution available.
This allows Maxxess InSite to be configured for virtually all applications, employing any combination of software modules and hardware to deliver each user with a highly customised solution and unparalleled efficiency.
Myriad system technologies
Maxxess Insite is a single system that harnesses the power of myriad system technologies, effectively expanding their collective capabilities while also making human interaction more intuitive. It meshes the capabilities of the following systems and technologies, and more: video surveillance, access control, GPS/IPS location technologies, intrusion detection, fire safety systems, perimeter detection/protection, HVAC/building management, smart phones and tablets, ID/credential badging, two-way communications, guard tour, visitor management, time and attendance, license plate recognition, hotkey emergency notification, reporting/forensics, wireless sensors, elevator/escalator control and database integration.
Kevin Daly, CEO of Maxxess Systems, added, “The beauty of the product is that even with these diverse integrations and functions, the system is very user friendly. Simplicity of use is truly the system’s ultimate sophistication.”
There’s growing noise around smart homes and smarter security. You’ve probably heard it. But there is a place where access control and more have been smart for decades: the workplace. Home automation and IoT are still playing catch-up with the commercial sector. A new insights report from ASSA ABLOY and IFSEC Global — “The Smart Door Locks Report 2018” — measures just how fast consumer smart technology is running.
According to a survey conducted for the report, 61% of households now claim to own at least one smart home device or system. Energy monitors, home CCTV cameras, intruder alarms and smart door locks are the most popular, according to the report. All these functions, of course, have been available to businesses for years.61% of households now claim to own at least one smart home device or system
Educating the smart home consumer
Paradoxically, report data also questions how much consumers really know about their smarter home. A surprising 42% of those surveyed, for example, were unaware they could control a smart door lock from their phone. In fact, many leading smart door lock models offer this feature, delivered by Wi-Fi or Bluetooth and an app.
Despite a wealth of features offered by the latest smart door locks — remote and location-based locking/unlocking; voice activation; timed access; emailed entry alerts; and integration with smart camera and lighting systems — most people still have limited knowledge of their capabilities.
Smart technology is increasingly becoming the new norm in terms of home security
Only 14% of survey respondents described themselves as “very familiar” with what a smart lock can do. Even though most of them probably use smart access control solutions at their workplace.
Secure homes through smart technology
Monitoring and security are not the only drivers for smart home adoption. We humans also love convenience, and modern living presents us with problems that smart home technology can solve. Ironically, given the report’s findings, it takes a smartphone to really unlock the convenient possibilities of smarter living. The device that’s “always to hand” is central to the newest generation of smart door locks.A smart door lock is a convenient way for a landlord or agency to offer round-the-clock check-in and check-out
If homeowners wish to remotely manage property access for friends and family, many smart door locks oblige. You let in guests remotely, send them a virtual digital key, or provide a temporary or single-use PIN to unlock the door.
It is just as easy to revoke a digital key, if you don’t want its owner to come around anymore. This is a significant improvement over sharing physical keys — or hiding one under the doormat. We cannot be totally sure where a metal key ends up and have no way to track or cancel it once it’s “out in the wild”. Commercial access control offers such functionality as standard, of course.
In addition, smart door locks offer more than just stand-alone operation and clever functions. In a domestic setting, magic happens when locks work in harmony with a home automation system, connected by protocols like Z-Wave, ZigBee or Wi-Fi.
"Smart" security on the move
The smartphone is becoming a remote control for managing a connected life beyond just home (and even workplace) security. According to Accenture, the parcel delivery services market will grow by $343 billion by 2020. Just like home security, convenience is a major driver of change.
Homeowners can send guests a virtual digital key to their phones, or provide a temporary or single-use PIN to unlock the door
A recent PostNord pilot in Sweden aimed to remove the inconvenience of waiting home for a postal delivery. Selected customers of some major Scandinavian e-retailers could choose to have parcels delivered inside their front door, if it was equipped with a Yale smart door lock.
Home delivery is among potential smart services covered in “The Smart Door Locks Report 2018 ”. When asked whether the ability to receive parcels securely in a porch or lobby would make them more likely to invest in a smart door lock, 79% said it would.It is easy to revoke a digital key, if you don’t want its owner to come around anymore
Holiday rentals and smart home tech
ASSA ABLOY research published in 2017 forecasts continued growth in the European holiday rentals sector (at 5.8% CAGR). Smart door locks are also making an impact here, at both ends of the market: for service providers — agents and homeowners — and for travellers.
A smart door lock is a convenient way for a landlord or agency to offer round-the-clock check-in and check-out, without creating extra work or staff costs. Both Intersoft, in Croatia, and Hoomvip in Spain have built holiday rentals management systems around an app and the ENTR® smart door lock. Agents issue, revoke, track and manage virtual keys for all their guests, saving everyone time and hassle. Travellers use their phones and an app to unlock their apartment.
For these visitors the smartphone is already an essential travel accessory. It is a boarding pass, a credit card, a travel guide, and a postcard home... why not a door key, too? And if this key is backed by a trusted home security brand — and a company with vast experience in the mature market for commercial “smart” security — better still.
There are many aspects to consider when developing a retail security strategy, including loss prevention, physical security, asset protection, risk management, and IT. All these areas could be the responsibility of just a few people working to secure a handful of stores or each of these areas could be entirely separate departments, as is often the case for major retailers with locations throughout the country.
Regardless of the size of the retailer, there are many different technologies that can be used within a retail store to improve security and loss prevention, yet none should be used in a silo. There are tremendous benefits to integrating security technologies and communications systems together, including enhancing overall safety and security, reducing shrink, and improving operations. There are many different technologies that can be used within a retail store to improve security and loss prevention
As the existing security infrastructure is evaluated and plans for the future are developed, the team responsible should consider some of the following questions. Are there areas of the store that require greater security? Are there notifications or other technologies that could improve the efficiency of personnel and the safety of shoppers?
Are there other departments within the organisation that could benefit from the data gathered by the security technology? Understanding current pain points within the stores and how integrated security solutions can address these is the key to implementing the best solution. Here are a few “hot spots” within a typical retail store that easily demonstrate the power of integrated solutions.
Point of sale terminals
Whether it’s loss through sweet hearting or other fraud, point of sale terminals present a significant shrink risk for retailers. Integrated systems enhance security at these locations. Video recording of HD or megapixel cameras integrated with point of sale data makes it easy to locate video associated with transactions and exception reporting. This allows for visual verification of each transaction when needed.There are tremendous benefits to integrating security technologies and communications systems together
Other risks like robbery not only result in loss, but also impact the safety of employees and shoppers alike. Panic buttons or bill trap sensors connected to the intrusion detection system ensure silent alarms are issued when employees are at risk.
When the intrusion detection system is integrated with the video system, pressing a panic button or pulling the bill from the sensor can automatically trigger a video snapshot to be sent to the monitoring station to provide verification of the alarm and more information for law enforcement when they are dispatched.
Adding audio integration to the intrusion system can also result in a message sent to the store security personnel’s two-way radio when a panic button is pushed, or a bill trap sensor is activated. If no security guard is onsite, video monitoring services can allow the monitoring centre to intervene through audio, alerting the perpetrator that his or her actions are being monitored and that the authorities have been contacted. This may cause the offender to flee the area, helping to mitigate the safety risk as well as the potential for loss.
Panic buttons or bill trap sensors connected to the intrusion detection system ensure silent alarms are issued when employees are at risk
High value displays
Protect high-value or frequently-stolen items such as electronics, using video analytics integrated with audio communication Protect high-value or frequently-stolen items such as electronics, using video analytics integrated with audio communications. For example, a person standing at a display for longer than a pre-defined time or touching items on display can trigger a video snapshot to be sent to the store manager and an audio message to play through a nearby loudspeaker, such as: “Thank you for your interest in our smartphone selection; an associate will be there soon to assist you.”
This not only alerts potential offenders that their actions are being watched, it also serves to improve customer service for legitimate shoppers – as a retail floor associate is notified that a customer may need assistance.
An access control reader at the door to the cash office restricts access to only authorised individuals. Integrating video can automatically capture an image of the person requesting access for verifying an employee’s identification prior to granting access or for retrospective analysis in the event of a theft.
If an employee props open a back door – either for easy re-entry after a break or to allow access to another person with intentions of theft – integration of the intrusion detection system to the video and audio system can significantly reduce risk of loss. For example, the intrusion detection system can monitor doors for abnormal conditions, even when the system is disarmed.Loss can also occur when a cooler or freezer malfunctions or when the door is accidentally left open
A door left open for longer than a pre-defined time can cause an alarm on the intrusion panel, which can trigger a nearby camera to send a snapshot of the open door to the store manager and trigger the public address system to play a pre-recorded message through a nearby speaker. This prompts the employee to close the door, reducing risk of theft.
Coolers and freezers
Loss isn’t just about theft. Loss can also occur when a cooler or freezer malfunctions or when the door of one of these units is accidentally left open. The same concept for monitoring exit doors can also apply to doors for coolers and freezers to prevent spoilage. A cooler or freezer door monitored by the intrusion detection system can trigger an alert or chime to play in the area to remind an employee to close the door or to alert the store manager to the issue.
While providing surveillance of the cash register area, the camera's video analytics can be used to trigger an alert in case the queue exceeds the pre-defined threshold
Serving a dual purpose
Retailers can use the metadata from the cameras to gather business statistics like counts of people entering the store While the technology solutions described above positively impact loss prevention in a retail store, they can also extend beyond security to improve health and safety and enhance customer service as well as customer engagement and sales.
For example, while securing a store’s main entrance with IP cameras featuring on-board video analytics, retailers can use the metadata from the cameras to gather business statistics like counts of people entering the store. This data can help them understand peak days and times when making decisions about staffing.
Or while providing surveillance of the cash register area, the camera's video analytics can also be used to trigger an alert in case the number of people in a queue exceeds the pre-defined threshold. At this point, the same public address system and loudspeakers used to play background music to enhance the shopping experience could be activated to broadcast a message to request another cash register to be opened, improving store operations.
For security and loss prevention purposes, video analytics can also be used to ensure that no one enters or leaves the retail shop using the emergency exit. To address health and safety issues, these same cameras can also trigger an alarm if that emergency exit is blocked by an object – improving the safety of customers and employees.
When systems are used to deliver data for purposes beyond security, other departments may be willing to contribute toward the cost Metadata generated by the cameras can also be used to gather information that when processed with sophisticated algorithms in the cloud can show trajectories of the paths that shoppers take as they travel throughout a store as well as heat maps indicating where they walk, stop and dwell – all while protecting the privacy of individual shoppers. This information can be used by merchandisers to evaluate the success of displays and store layouts, which directly impacts customer engagement and sales.
When systems are used for and deliver data for purposes beyond security, other departments may be willing to contribute toward the cost of the system. This provides an added benefit by relieving some of the cost burden from security or other operational budgets.
Integration is becoming easier using standards and expanding industry partnerships. However, in some cases, choosing systems from a single vendor that are designed to work together can help to speed and simplify installation, while also reducing system costs for both the integrator and the user.
Regardless of the products chosen, it will be important for a retailer with many locations to have consistency in the type of equipment installed at each site. This makes support easier and enables a more uniform response to incidents that happen at various stores.
As many retailers already understand, there is no silver bullet to reducing loss. However, a combination of the right technologies working together to prevent shrink and improve investigative capabilities can result in smarter and more effective loss prevention.
By now your organisation should know the drill. To keep your enterprise safe from unauthorised access you take the basic precautions: create strong passwords that are not re-used and are updated frequently, use updated anti-virus software, employ host and network-based intrusion detection and prevention, data encryption, etc. etc.
However, complacency has no place in cybersecurity. Hackers are working round-the-clock to outwit your most ardent security professionals. Here are a few specific vulnerabilities that require immediate and constant attention to stay safe in a hostile security world.
Protect against burst attacks
You may be aware of DDoS, or distributed denial of service attacks. In fact, Cisco writes that these online attacks — where high-volume traffic floods a system’s servers, making web traffic extremely slow — grew 172% in 2016. But in the last few years, Cisco documents how "burst attacks", a type of DDoS attack that floods traffic in short bursts at random times over a prolonged period, has skyrocketed. They claim that in one study, 42% of the companies faced a burst attack in 2017.
Burst attacks change vectors throughout an attack, making it difficult to create a signature to block the attack
According to Radware, on-premises DDoS protection needs to adapt to counter these often less than one-minute attacks. While the majority of these solutions detect burst attacks, they write that "most of them limit the rate of bad (and legitimate) traffic to a certain threshold, resulting in a high level of false positives." One big challenge is burst attacks change vectors throughout an attack, making it difficult to create a signature to block the attack.
They recommend adopting two key solutions: 1) a behavioural DDoS protection system that utilises machine learning algorithms to identify the patterns of burst attacks, and 2) measuring the degree-of-attack (DoA) surface, which looks at the bandwidth or rate of a specific type of traffic and the percentage of a given type of traffic out of the entire distribution of traffic. If an attack rates high in both the bandwidth and percentage parameters, then it gets a high DoA surface score, showing that a burst attack likely occurred.
Prioritise network infrastructure
Nefarious actors have been exploiting both enterprise level and small/home office and residential routers For companies with in-house information technology staff, network infrastructure usually gets plenty of attention. Proper configuration, maintenance and security are often key considerations for infrastructure due to its importance to the business. What about smaller entities? Do you have a small switch or router you either purchased or leased from your internet service provider? If so, when was the last time you updated it?
In Alert TA18-106A, the United States Computer Emergency Response Team (US-CERT) shares information dating all the way back to 2015 on how nefarious actors have been exploiting both enterprise level and small office/home office and residential routers and switches. If you haven’t changed passwords and updated the software/firmware on these devices yet it should be near the top of your priority list.
Hide sensitive web pages from search engines
Search engines are an easy first step for someone looking to exploit your environment. They can conduct searches of your known web presence, looking for pages which might not have been meant for the general public but are still accessible.
Using robots.txt pages can be excluded from search engine crawlers. Entrepreneur.com suggests checking out a tutorial from SEObook.com to learn more about how you can do this. Keep in mind this will only deter the most basic attackers as more sophisticated attackers will conduct manual searches.
Update passwords on your IoT devices
Data at rest is important, but data in transit is just as important to encrypt, particularly sensitive information
It is shocking how many IoT devices are used in our daily lives, such as security and video conference cameras, cars, and smart sensors, but also contraptions you probably forgot are now connected to the internet, such as garage doors, appliances, etc. Tom’s Guide gives a good list of the many things you should remember to update.
Use encryption to protect data in transit
Encryption your data at rest – when it is stored somewhere – is incredibly important. However, your encryption efforts should not stop there. Data in transit is just as important to encrypt, particularly sensitive information.
This could include communication between your websites and applications or even just communications within your company. Unencrypted information is at risk to an eavesdropper on your network. To prevent the data from being usable to potential eavesdroppers, ensure you are using encrypted connections such as HTTPS, SSL, TLS, FTPS, etc.
ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., is the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so.
Here’s a quick rundown of integrator companies acquired by ADT:
Protec, a Pacific Northwest commercial integrator (Aug. 2017);
MSE Security, the USA’s 27th largest commercial integrator (Sept 2017);
Gaston Security, founded in 1994 as a video surveillance integration company and whose services have since expanded to include intrusion, access control, and perimeter protection (Oct. 2017);
Aronson Security Group (ASG), which delivers risk and security program consultants and offers advanced integration services, consulting and design engineers and a National Program Management team (March 2018);
Acme Security Systems, among the largest privately held security systems integrators in the Bay Area, focusing on electronic security systems, access control, video networks and more (March 2018);
Access Security Integration, a regional systems integrator specialising in design, delivery, installation and servicing of electronic security systems including enterprise-level access control, video and visitor management solutions, perimeter security and security operation command centers (Aug. 2018);
In addition to their moves in the commercial integrator space, ADT has also sought to expand their presence in cybersecurity with the following two acquisitions:
Datashield, specialising in Managed Detection and Response Services (Nov 2017);
Secure Designs, Inc., specialising in design, implementation, monitoring, and managing network defense systems, including firewall services and intrusion prevention, to protect small business networks from a diverse and challenging set of global cyber threats (Aug. 2018).
ADT has acquired more than a half-dozen security system integration firms in the last year or so
For additional insights into ADT’s game plan and the strategy behind these acquisitions, we presented the following questions to Chris BenVau, ADT’s Senior Vice President of Enterprise Solutions.
Q: ADT has been actively acquiring regional integrators this year – more than a half a dozen to date. Please describe the history of how ADT came to embrace a strategy of acquiring regional integrators as a route to growth? ADT's acquisition of Red Hawk is set to close in December, and brings premiere fire and life/safety solutions
BenVau: Our acquisition strategy started at Protection 1 when we embarked on our journey to build out our commercial and national account business and add enhanced integration capabilities to our portfolio. The merger of Protection 1 and ADT brought that foundation to ADT which up to that point was primarily a residentially and SMB-focused company. After the merger, we set out to identify and acquire additional regional integrators that would continue to build on that foundation and deliver enhanced technical solutions, advanced technologies and an expanded service, install and support footprint. Through our acquisitions we now operate two Network Operations Centers and three Centers of Excellence. We are also unique in the industry with the number and variety of certifications, like Cisco and Meraki, our engineers hold which ultimately allows us to offer Managed Security as a Service. They have also enhanced our operational capabilities.
Q: What criteria do you use to evaluate whether an integrator is a good “fit” for ADT?
BenVau: First and foremost, we look at the culture of the companies. The companies that we target for acquisition must be metrics- and customer service-driven. Secondly, we look at the leadership teams. ADT view their acquisitions more like mergers and take a patient approach to integrating them into their business We have been fortunate in the fact the leadership of the companies we acquired remain with us today in key management and executive positions helping to drive continued growth within their organisations. We also evaluate their current customer base, unique solutions and their ability to complement and enhance our portfolio with the goal of becoming a leading full-service, enterprise commercial provider. Our acquisitions have bolstered our network capabilities, brought enterprise risk management services, and a broader solution set in high-end video and access control solutions. Our most recent acquisition – Red Hawk, set to close in December – brings us premiere fire and life/safety solutions.
Q: What changes are typically needed after an integrator is acquired in order to adapt it to the ADT corporate model?
BenVau: We view our acquisitions more like mergers and take a patient approach to integrating them into ADT while taking into account their culture. We want to ensure that we find the right positions for their people, embrace the right messaging and put the right processes in place. We acquire these companies because they are the best in their respective businesses and geographies and bring their knowledge and experience in markets or with solutions that we may not have had previous access to.
ADT can support clients with their own in-house technicians which helps to ensure a consistent security program
Q: How can regional integrators benefit from the ADT brand? Have your newly acquired integrators realised additional growth?
BenVau: The companies we have acquired, generally, have exceeded expectations and surpassed initial goals. ADT brings expanded opportunities for these companies as well with our national footprint. Our National Account Sales Team has seen impressive growth over the years and are only limited by our ability to deliver. These integrators help to deliver on that. In the past, the regional players may have had to rely on sub-contractors to service their larger clients. With ADT, we can now support those clients with our own in-house technicians which helps to ensure a consistent security program across multiple locations.Our National Account Sales Team has seen impressive growth over the years and are only limited by our ability to deliver"
Q: Are additional integrator acquisitions planned this year and into 2019? How much is enough and when will it end (or slow down significantly)?
BenVau: We expect to close on our latest acquisition, Red Hawk, before the end of 2018. Red Hawk brings a national footprint focused on fire/life safety and security to ADT. While ADT already had a robust security offering, Red Hawk will contribute significantly to the fire side of the business. In addition, we will continue to evaluate the companies in the industry to determine if additional acquisitions make sense.
Q: Do you expect greater consolidation of the integrator channel in the industry as a whole? Why is this a good time for consolidation? Is it a good M&A market for buyers like ADT?
BenVau: We will continue to evaluate companies in the industry to determine if further acquisitions make sense. As for the industry, we can only speak for ourselves. Our focus is on investing in our field organisation, in particular our service technicians, engineers and project management teams"
Q: What other trend(s) do you see in the industry that will impact ADT (on the commercial side) in the next year or so, and how?
BenVau: In addition to their moves in the commercial integrator space, ADT has also sought to expand their presence in cybersecurity Networking is a big one. As we continue to drive integration of devices and services, from AI, “the cloud,” machine learning and even analytics, there will be more focus on the network they ride on. A deeper knowledge of network design, bandwidth impact, and system integration will be critical. As part of our acquisition strategy, we focused on talent to add to the team and have been able to add to our bench strength in this area.
Q: Any other comments/insights you wish to share about ADT’s strategy, future, and role in the larger physical security marketplace?
BenVau: Our focus is on investing in our field organisation, in particular our service technicians, engineers and project management teams. The cornerstone of our success lies in our ability to deliver outstanding customer support and service. It starts with sales and the ability to deliver security and life safety technologies, but it ends with a delighted customer who partners with us to help secure the things that matter most to them. Our recent acquisitions have more than doubled our commercial field operations teams and are key to establishing the ADT Commercial brand as a leading full-service provider of enterprise solutions to the marketplace.
The last day of Global Security Exchange (GSX) in Las Vegas proved to be the calm after the storm. But a slower third day could not undermine a largely successful 2018 show for exhibitors and attendees. Sometimes the success of a trade show isn’t measured by numbers of attendees (which were reportedly down again this year). Sometimes it’s the individual successes that make an impression.
“Just learning about this made the whole trip worthwhile,” said one GSX attendee at the Johnson Controls booth, referring to the company’s new PowerSeries Pro intrusion devices. It’s the kind of feedback that makes the expense of exhibiting at a big trade show worthwhile. The new PowerSeries Pro is an extension of Johnson Controls’ existing line that is expressly designed for the commercial security market.
The ‘hybrid’ (wired or wireless) device offers ease of installation and full cybersecurity including 128bit AES encryption with spread spectrum for no jamming or interference. It employs frequency hopping technology first developed for the Israeli defence force.
Wireless technology for cybersecurity
PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product
PowerSeries Pro uses PowerG wireless technology and expands the portfolio of PowerG devices from residential through commercial. For use in a wired solution, the main advantage is ease of installation; terminal blocks ‘pop out’ easily and can be wired and plugged back in. Alternatively, PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product – wireless at the same level of cybersecurity as wired.
Johnson Controls addresses three big factors with the product line: cybersecurity, user control, and easy installation and dependability. It’s part of Johnson Controls’ broader approach to provide ‘one-stop shopping’, enabling an end user to control their environments, video and access, and protect their contents, according to the company.
Need for more security in K-12 schools
In addition to reaching end users, lock company Allegion sees the show as an opportunity to meet with technology partners. “It’s great to bring together a concentration of people in the industry,” said Brad Aikin, Channel Led Business Leader, Integrator Channel. “We have had good conversations with technology companies here at the show in terms of partnering, both physical access control and OEM partners. We have also had good conversations with the integrator channel.”
From speaking with education end users at GSX, Aikin sees a large unmet need for security in K-12 schools, more so than in colleges and universities. “K-12 is underserved,” he says. “They need to identify their priority of needs, and now they can serve needs they couldn’t before, both layering levels of security and phasing in implementation over time. Now things can be applied and tried out without disrupting the environment.”
An example is the Von Duprin RU RM (Remote Undogging and Remote Monitoring) door exit devices, which are being integrated by access control partners Sielox, IDenticard and Vanderbilt. Intelligence is added to the door exit device to enable inexpensive monitoring of secondary, previously unconnected doors. The doors can be monitored and locked or unlocked at various points in the day.
Lock company Allegion sees the show as an opportunity to meet with technology partners
Bridging the gap between IT and physical security
One exhibitor – ADT – noticed more information technology (IT) professionals accompanying their physical security counterparts at this year’s GSX exhibition. “They come along to kill dreams on the spot,” said Morgan Harris, Senior Director Enterprise Solutions, noting the IT department’s frequent hesitancy to add untrustworthy elements to the network.
ADT is looking to transform and expand its 144-year-old brand in the commercial security space and has completed eight acquisitions in the last year to accomplish the goal. Some of the acquisitions build on ADT’s expanding cybersecurity initiative, which is both a fully-functioning stand-alone business and an effort to bridge the divide between IT and physical security. ADT is positioning itself to manage enterprise risk in the broadest sense.
Combining IT and cybersecurity
The Internet of Things (IoT) is fuelling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?"
“The Internet of Things (IoT) is fuelling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?” asked Harris. “Projects have failed because information was lost in translation.” ADT seeks to have skillsets, experience and certifications on both sides of the issue.
“It enables us to be the in-between,” says Harris. “We can blend the two together and be the translator. It’s great for both sides, advocating for security counterparts and for the network simplifies deployment and processes.”
Harris sees a trade-off between cybersecurity and convenience in the industry. For example, if a manufacturer says they have a simplified process and only offers firmware updates once a year, cybersecurity suffers, he said. Lack of third-party testing is another way that manufacturers sometimes trade cybersecurity for convenience, at heightened risk to integrators and end users.
Training courses for integrators and partners
Milestone Systems is expanding its level of involvement with integrator partners, and now provides Partner Business Reviews (PBR) to assess an integrator’s activities, sales and training, pipeline and marketing initiatives.
The partner reviews often uncover issues that can be easily rectified through additional training, says Megan McHugh, Milestone’s Training Marketing Manager, Learning and Performance. Milestone uses a dashboard to track each integrator’s completed training courses and can point out additional courses needed to ensure an integrator partner’s success.
Milestone offers a variety of in-person, e-learning and YouTube video courses to train installing partners, systems integrators and self-integrators on best practices
Milestone offers a variety of in-person, e-learning and YouTube video courses (in 12 different languages) to train installing partners, systems integrators and self-integrators on best practices. ‘Cloud Labs’ are instructor-led online classes.
All courses are linked to a variety of support resources. Sometimes a simple checklist accessed on a smart phone can ensure that every aspect of an install is performed and can instil added confidence in customers.
The open platform company’s new agile development cycle – releasing multiple versions of XProtect software throughout the year – creates extra challenges to keep learning initiatives up to date. Along with each new release, various existing courses are updated.
The concepts of “training and certification” are being replaced at Milestone with “learning and performance,” says McHugh. Milestone is also looking to hire 170 new R&D staff and open a new centre in Barcelona (in addition to current R&D centres in Copenhagen and Sofia, Bulgaria).
Making camera installation easy
Hanwha Techwin is another company that is seeing more interest in cybersecurity, as well as concern about whether a product is supported professionally. They have doubled-up production in South Korea and added capacity in Vietnam to avoid manufacturing in China.
Thinking about their integrators, Hanwha Techwin is putting more emphasis on making installation easy. Installation costs may be up to 50 percent of a job, so easier installation frees up money to buy more or better cameras. With a new design of their cameras, an electrical contractor can now install the camera base and conduit, and then the integrator can easily plug in the camera later.
Camera bases are common across multiple models, so a customer could switch out a 5-megapixel for a 2-megapixel camera later on if they want to (same housing plate). ‘Skins’ allow the colour of cameras to be changed to match surrounding décor. “We are changing the idea of how people approach selling a camera, and it’s a whole new idea of how to install cameras,” said Tom Cook, Senior Vice President, North American Sales, Hanwha Techwin.
Hanwha cameras can include a sound classification analytic to detect sounds such as gunshots
Cameras with sound detection technology
Hanwha offers more flexibility in the field – interchangeable parts are packed together to enable configuration on site. And there is no need to stand on a ladder to position cameras; stepper motors help with remote camera positioning. Multi-sensor cameras have modules (combining lenses and sensors) that can be switched out at installation. Hanwha Techwin cameras can also include a sound classification analytic to detect sounds such as gunshots, screams or glass breaks, especially useful in K-12 education environments.
Unification and the customer journey were a key emphasis for Genetec at GSX 2018. Unification for Genetec means combining multiple functions on one platform, from one vendor and using one source code. The company approaches the market by analysing each customer’s journey as it relates to Genetec products.
A typical customer journey involves (1) a company looking for standalone systems; (2) the need to centralise systems through integration and unification; (3) increasing automation and workflow; and (4) adding intelligence for more informed decision-making.
“Genetec wants to get more in-depth with customers, be more comfortable with their business, and understand their challenges,” said Derek Arcuri, Product Marketing Manager. “We want to get naked with our customers.”
Machine learning engine for crime prevention
In the city of Chicago, Citigraf detects patterns in crime behaviour and determines where a crime is likely to occur
There was a big crowd at the Genetec booth, and not because the comment was applied literally. Genetec has divided itself into multiple parts, each focussed on a vertical market such as retail or transportation.
The approach is to operate as a ‘federation of startups’, with each market sector accountable to fill in the gaps in the portfolio to meet the specific needs of each vertical. For example, Genetec’s Citigraf is an unsupervised machine learning engine with an algorithm to detect anomalies and trends from a large pool of data in a municipal environment.
In the city of Chicago, Citigraf detects patterns in crime behaviour and determines where a crime is likely to occur. The system alerts operators in a bureau or area that has a higher risk level and should beef up the number of first responders.
Chicago has seen a 39 percent decrease in average response time of first responders as a result. In the retail market, Genetec leverages the security infrastructure to analyse shopping trends and provide data for merchandising and operations. “Each customer is getting a portfolio of products tailored to the industry they are in,” says Arcuri.
Demonstrating IoT devices
Axis Communications displayed its range of products at GSX, demonstrating its almost total transformation from an IP camera company to a supplier of a full range of Internet of Things (IoT) devices. “Axis is broadening its portfolio to include more solutions,” said Scott Dunn, Senior Director, Business Development Systems and Solutions. “Our success is driven by continuing to innovate our portfolio. The market is continuing to grow, and Axis is continuing to expand its market share.” Eight ‘Axis Customer Experience Centers’ around the United States help Axis stay close to their integrators, customers, partners and prospects.
IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security
Axis has offered access control IP edge devices since 2013, and now has a new A1601 door controller being sold with partner-only software (no embedded Axis software like previous A1001 devices). In audio products, Axis has a portfolio of speakers, intercoms, and public address systems.
Acquisition of IP door intercom company
Enhancing the audio line was acquisition in 2016 of 2N, an IP door intercom company headquartered in Prague, Czech Republic. In North America, the 2N team is now fully part of Axis. The line emphasises simple architecture, programmability, and the ability to integrate widely. The products use Session Initiation Protocol (SIP) to integrate through the cloud or peer-to-peer.
IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security. Retail, education and enterprise customers are gravitating to IP audio. An IP bridge can tie existing analogue components into the IP system. For perimeter security, Axis offers a radar device to help eliminate false alarms, as well as thermal cameras.
IFSEC International 2018 kicked off last week at London’s ExCel Centre. Visitors were lucky enough to experience a rare three days of British sunshine as they came together to discuss the latest trends and technologies in the physical security industry.
Many exhibitors commented on how the show seemed smaller than previous years, with stands more spread out, and fewer ‘double-decker’ offerings than earlier shows. Although exhibitors represented all aspects of physical security, including access control and intrusion detection, the show was largely dominated by video surveillance. Video manufacturers Avigilon and Dahua were key sponsors, while the largest stand by far was occupied by Hikvision. Rather than hosting large product portfolios, exhibitors chose to demonstrate how integrated solutions could provide a more holistic solution
If stands seemed more modest than in previous years, this may be a reflection of the industry shifting away from its long-standing product focus. Displaying large product portfolios takes more exhibit space. In an increasingly commoditised market, security integrators are combatting price erosion by emphasising holistic solutions rather than products and features.
While some manufacturers have responded by collaborating with partners to offer a broader portfolio of solutions, others have invested in building end-to-end systems. Both these trends were reflected at the show; rather than hosting large product portfolios with a wide range of features, exhibitors chose to demonstrate how integrated solutions could provide a more holistic solution to end users’ challenges.
Integrated systems approach
One manufacturer opting for a solutions focus was security, access control and door entry systems provider STANLEY Product and Technology. The stand was represented by a range of STANLEY brands including PACOM and PAC GDX, as well as technology from recent acquisition 3xLOGIC. The PACOM team was on hand to demonstrate integrations of PACOM’s Graphical Management System (GMS) with workflow management software from RightCrowd, and biometric authentication products from EyeLock.
PACOM Systems’ Commercial Director Gary Rowden explained that the stand was designed specifically to showcase all of STANLEY’s brands and partners in one place, encouraging customers to buy into the STANLEY solutions approach, rather than focusing on specific products.
The show was largely dominated by video surveillance, with video manufacturer Avigilon a key sponsor
Connecting with partners
Another company emphasising partner solutions was Milestone Systems. Milestone’s Vice President for EMEA, Malou Mousten Dyhr Toft, who joined the company in March, explained how IFSEC International continues to be a key show. It was an opportunity to meet with Milestone’s expansive community of existing partners, as well as connecting with new partners and end users.
Milestone hopes to enable community customers to process more video data with fewer servers, increasing scalabilityIn February this year, the company launched the Milestone System Builder initiative, allowing partners to optimise their hardware to pre-load Milestone’s XProtect VMS software. Several system builder partners were present at the Milestone stand.
By collaborating with NVIDIA, Milestone hopes to enable community customers to process more video data with fewer servers, increasing scalability and reducing the total cost of ownership of its partner solutions. The stand showcased Milestone’s latest XProtect 2018 R2 VMS that leverages NVIDIA’s high-powered graphics processing units (GPUs), which can handle up to 2,000 video streams on one single server.
Commitment to open systems
MOBOTIX took this year’s IFSEC International as an opportunity to spread the word about its increased commitment to open systems. Since the company’s majority acquisition by Konica Minolta in 2016, and the subsequent addition of CEO Thomas Lausten last year, the company has undergone a significant change in approach, all-the-while guarding its core decentralised IP video product offering and made-in-Germany DNA.
Lausten was previously a key figure at Milestone Systems and has brought to MOBOTIX a new approach focused on collaboration. Partners present at the MOBOTIX stand included Milestone, Kentix and Wavestore. The company also demonstrated its commitment to open systems by unveiling MOBOTIX MOVE, the manufacturer’s first line of ONVIF G compliant cameras.
Visitors were lucky enough to experience a rare three days of British sunshine at IFSEC International this year
Security system provider Vanderbilt had many new developments on show, including integrations both within Vanderbilt systems and with partner systems. The company’s SPC intrusion detection system now integrates with Milestone software, allowing SPC users to trigger events and control alarm systems from within the Milestone platform.
A further highlight was Vanderbilt’s ACTEnterprise access control system, which now integrates with ASSA ABLOY’s Aperio wireless locking solution. Vanderbilt hopes that the integration will provide customers with faster, more cost-effective access control installations.Vanderbilt hopes that the integration will provide customers with faster, more cost-effective access control installations
Reducing costs, increasing ease-of-use
Many exhibitors were keen to demonstrate how integrated solutions could reduce costs for integrators by unifying systems on one easy-to-use platform. Arecont Vision unveiled its new Contera cloud-based video management solution at ISC West in April, making IFSEC the technology’s first outing in the European market.
Contera is Arecont’s first video management offering and will allow customers to benefit from end-to-end solutions from the US-based company. Since the Contera system is designed to be web-based from the start, integrators will not be faced with the additional cost of adapting a legacy VMS system to the cloud.
IDIS was another manufacturer highlighting their enhanced user experience and reduced cost offered by end-to-end systems. Visitors experienced demonstrations of the IDIS Center video management software, which is designed to offer smart user experience controls, and a user-friendly interface. Also on display were the company’s latest ranges of analogue and IP cameras.
The IDIS system allows users to ‘mix-and-match’ HD analogue and IP video depending on the requirements of the project, with all surveillance operated from the same IDIS software interface. The mix-and-match approach avoids the additional cost of unnecessarily ripping and replacing legacy analogue systems.
IFSEC 2018 presented a snapshot of how manufacturers from across video, access control and intrusion detection are continuing to innovate and collaborate to stay competitive in an increasingly challenging market, without losing sight of the most pressing needs of end users and integrators.
Apstec Systems announces that its Human Security Radar (HSR), the first fully automatic real-time mass people screening solution, has been selected by Esenboga Airport, Ankara, to significantly boost security in land side areas.
Chosen following a rigorous selection process, including a pilot installation, HSR will be installed at the terminal entrances as part of ongoing security enhancement measures by the Turkish State Airports Authority. It will enable people screening without slowing down the flow of traffic, with each system capable of scanning up to 10,000 individuals per hour. The technology was deployed in partnership with local distributer AKBA.
The devastating attacks on Ataturk Airport in Istanbul and Brussels Airport highlighted the vulnerability of the land side of airports to terrorism
The devastating attacks on Ataturk Airport in Istanbul and Brussels Airport highlighted the vulnerability of the land side of airports to terrorism. Since these events there has been global interest in securing the land side of airports, but traditional aviation style security checkpoints or manual searches, which scan one individual at a time, are not suited to purpose and result in large queues of passengers, which are vulnerable to attack in their own right.
With existing approaches to security screening providing impractical, inconvenient and expensive to operate, terminals have remained susceptible to attack, or are subject to intrusive and disruptive security screening regimes. HSR was designed to address this challenge, and offers a practical and cost-effective solution to security screening in such high footfall scenarios.
Enhanced security measures
The first fully automated, real-time mass screening solution, HSR provides seamless security to protect public places from terrorist attacks. The walkthrough system uniquely combines unparalleled high throughput, speed and accuracy, simultaneously screening multiple subjects in real-time for threats, without the need for an operator to inspect suspect materials. With 40,000 passengers traveling through Esenboga Airport every day, the deployment of HSR will be instrumental in improving security for millions of people.
Through deploying HSR as part of its commitment to terminal safety and enhanced security measures"
“HSR constitutes a major breakthrough in the way airports protect the land side of terminals,” commented Osman Aksoy & Sirzat Balin,Co-Founders, AKBA. “Through deploying HSR as part of its commitment to terminal safety and enhanced security measures, the Turkish Airport Authority has taken a major step to prevent the reoccurrence of terrorist attacks.”
Mass transport hubs
Esenboga Airport’s uptake of HSR is the latest major deployment of the technology, which is currently utilised by some of the world’s largest airports, as well as sports stadiums, entertainment venues, mass transport hubs and networks, places of worship, hotels and high-end retail and entertainment centres.
“HSR is proven to dramatically improve safety in crowded public spaces, and enables venue owners to close a critical security capability gap,” added Gregory Labzovsky, CEO, Apstec. “We’re therefore delighted to be working with Esenboga Airport to enhance safety for millions of travellers. AKBA, our distributor in Turkey, were instrumental in helping the Turkish Authorities understand the potential of HSR.”
With a century-long tradition for trade and commerce, the Hala Koszyki market hall was opened in 1908 on Koszykowa Street in Warsaw, Poland. Known as the ‘People’s Bazaar’, the Art Noveau-style building endured numerous social and political changes throughout its storied history. Between 2009 and 2016, Hala Koszyki was remodeled entirely according to a design by Polish star architects JEMS Architekci.
Since its grand reopening in autumn 2016, Hala Koszyki has emerged as a major attraction for food connoisseurs in the Polish capital. The remodeled building retains some of the architectural layout of the historic original while offering international flavors in a variety of restaurants, bars, and food shops, plus several office spaces in a premium ambiance.
Bosch received the contract as a one-stop supplier with a strong track record in large-scale retail solutions
Providing integrated security for Hala Koszyki called for a vendor that could solve three key challenges: First, the security system needed to blend in with the market’s stylish interior without attracting attention. Second, shop and restaurant personnel as well as office workers required specific access privileges to otherwise restricted areas. And third, building operators wanted a customisable system to meet the specific demands of Hala Koszyki’s shops, cafes, offices, parking spaces and other areas.
Bosch received the contract as a one-stop supplier with a strong track record in large-scale retail solutions, also including the high-profile New Union Square shopping center and office tower in Downtown Warsaw. The experts equipped Hala Koszyki with video security, intrusion alarm, and access control systems.
Intelligent video analytics
The market hall’s video security system features moving and fixed IP-based cameras from Bosch throughout the premises. Integrated on the Bosch Video Management System (BVMS), the cameras are monitored by security staff in an on-site control room. For added security, cameras in critical areas feature Intelligent Video Analytics to recognise threats, unauthorised access, and suspicious behaviors automatically.
In order to keep areas such as storage rooms and office facilities ‘off limits’ to unauthorised visitors, Bosch installed access control readers
Aside from greatly reducing the manpower needed to monitor video screens, the system also offers forensic search functionality for evidence in a user-friendly interface. In order to keep areas such as storage rooms and office facilities ‘off limits’ to unauthorised visitors, Bosch installed access control readers. Answering a key requirement, the access control system also logs the entry and exit times of employees, while keeping track of the current number of employees in the building.
Complete security solution
Safeguarding the Hala Koszyki against intruders, the integrated security solution features Professional Series intrusion detectors equipped with PIR (passive infrared) sensors. Combining these detectors with the intrusion panel Modular Alarm Platform MAP 5000 ensures continued operation in events such as short circuits or interruption of the power supply in a scalable system that can grow with customer requirements.
The complete security solution for Hala Koszyki is managed by the Building Integration System (BIS). Overall, the integrated Bosch solution achieves the feat of accommodating Hala Koszyki’s various security and access requirements ‘under one roof’ while blending into the architecture, so end consumers are free to enjoy their shopping and dining experience undisturbed.
The Hong Kong-Zhuhai-Macao Bridge relies on customised security solutions from Bosch to ensure safe operations. The world’s largest sea-crossing bridge was opened by Chinese officials late October 2018. Spanning 55 kilometres in length, the Hong Kong-Zhuhai-Macao Bridge directly connects Hong Kong to Macao and then to the Chinese city of Zhuhai for the first time.
At a total cost of USD 20 billion, it is a major boost for China’s Greater Bay Area, an emerging industrial and technological hotbed that is home to 68 million people and a showcase project for Bosch Building Technologies.
Equipping critical infrastructures
The large-scale project was built over the course of eight years using 400,000 tons of steel and includes underwater tunnels and two artificial islands that serve as customs ports. Ensuring the security of these two islands, where drivers need to present special permits to use the new bridge and pass customs checkpoints, was a priority from the start.
Bosch Building Technologies won the contract to provide the artificial islands with video surveillance, intrusion alarms
With a proven track record of equipping critical infrastructures such as airports, hotels, commercial buildings and underground metros, Bosch Building Technologies won the contract to provide the artificial islands with video surveillance, intrusion alarms, as well as public address and voice evacuation systems. On the island between Zhuhai and Macao, the Bosch partner Shanghai SAGA Electronic Technology Co., Ltd. installed more than 5,700 Bosch loudspeakers and over 260 amplifiers which are all managed via the PRAESIDEO Digital Public Address and Emergency Sound system.
Fulfilling a key customer request, the installation incorporates 15 different models of ceiling, wall mount, and line array speakers to blend in with the facility’s modern interior. Furthermore, Bosch was able to match Macao’s local standards by custom-ordering solutions with British power cord, programmed with graphic interfaces in traditional Chinese lettering.
On the island outside of Hong Kong, which is home to a customs clearance port, Bosch partner Pro-United Co., Ltd. installed 2,200 public address speakers of various models, including outdoor speakers for the travel inspection building. Experts also adjusted 200 vari-directional array loudspeakers to balance sound variations from different building materials.
Live voice announcements
“The Bosch technical team and partners used professional software to simulate the sound pressure level of a specific area and comprehensively simulate the entire project to ensure that the selected products can meet the requirements of different areas in the actual application,” said Lin Lizhi, Bosch Building Technologies. Bosch also covered the island with more than 2,000 HD cameras including the FLEXIDOME, DINION, and AUTODOME series.
The PRAESIDEO systems on both islands enable security staff to broadcast live voice announcements via security call points
Monitored from a security control center on the Hong Kong-side of the island, these cameras support 24/7 surveillance of the customs clearance port, travel inspection building, Immigration Department and Hong Kong Customs Office. The PRAESIDEO systems on both islands enable security staff to broadcast live voice announcements via security call points, while multiple sets of intrusion alarm systems protect personnel and property.
Broad customisation options
“We added the supporting intelligent call station PRAESIDEO, which is usually used for airport projects, in order to ensure that the staff can directly perform voice broadcasts throughout the call station during operation, thus making the security management more convenient,” said Wang Yiping, Deputy General Manager of Shanghai SAGA Electronic Technology Co., Ltd.
The high-profile infrastructure project highlights the flexibility and broad customisation options offered by Bosch Building Technologies as a one-stop solutions provider.
Now that it is fully operational, the Hong Kong-Zhuhai-Macao Bridge is already considered a key asset in the Greater Bay Area, also known as ‘China’s Silicon Valley’. The bridge reduces the travel time between Zhuhai and Hong Kong from four hours to a mere 30 minutes. It also creates a new gateway for travellers between vital transportation hubs such as Shenzhen and Hong Kong airports with the integrated Bosch security solutions ensuring a safe passage.
A concierge orders a taxi for an employee or takes his shirts to be cleaned, then greets a visitor and escorts her to an elevator. And these are just a few of countless possible examples of the NOVE office complex’s unique, multifaceted service culture. It attains the standard of security, efficiency and comfort of a five-star international hotel in a state-of-the-art facility where 1,300 people work for no fewer than eight different companies in the heart of Munich.
The NOVE has even been honoured with platinum certification from LEED (‘Leadership in Energy and Environmental Design’, a program developed by the U.S. Green Building Council to encourage the construction of energy- and resource-efficient, healthy buildings).
Completely integrated solution
Tim Wiesener therefore went looking for a reliable and experienced partner, and found it in Bosch’s building experts
“We wanted an office building that felt like a five-star designer hotel,” says Tim Wiesener, the CEO of Salvis Consulting AG. The company envisaged a high standard of security backed by smart networked solutions that blended smoothly and esthetically with the architecture and interior decorating. “We certainly didn’t want employees and other users of the building to feel bothered or overwhelmed by its technology.” Tim Wiesener therefore went looking for a reliable and experienced partner, and found it in Bosch’s building experts. “Bosch applies both experience and foresight to its projects, and its specialists immediately grasped our vision.”
Video surveillance, access control and intrusion alarm systems, fire protection, visitor management: Bosch planned and implemented a completely integrated solution that harmonised with NOVE’s character and personality. Its leading-edge technology and software are distributed and networked across six stories, a 23-meter-high atrium, and a nine-floor tower.
Manage video surveillance
The concierges working shifts at the 24-hour reception play an important role in the overall concept, since they are also trained security experts. Among other things, monitors behind the counter let them keep a watchful eye on images from over a hundred surveillance cameras that can be remotely controlled, zoomed and pointed as required, all courtesy of the Bosch Building Integration System. The software lets them efficiently manage video surveillance as well as fire and intrusion alarms.
Around-the-clock assistance is also available to the 300 or so visitors that enter the NOVE each day, aided by the dedicated BoVisit visitor management system. The software’s functionality includes announcing guests, printing name tags for them, and assigning them to employees. Thanks to a centralised solution, the concierges always know who is where inside the building.
This is especially important in case a critical situation ever arises. At the press of a button, the system generates a vitally important overview of how many people need to be evacuated from each area. Not everything the concierges do is high-tech, of course; they are devoted to helping both tenants and visitors with a smile. “Our receptionists are efficient but not nameless. We combine security with personal service,” says Tim Wiesener.
Tenants can naturally access the NOVE any time of the day or night
Italian star architect Antonio Citterio designed the complex, which spans roughly 27,500 square meters of gross floor space. He paid especially great attention to visually integrating the security equipment so it wouldn’t stand out. “This called for a certain finesse,” explains Tim Wiesener.
Tim Kosok, a sales representative with Bosch Energy and Building Solutions in Munich, worked hard to find out exactly what the customer wanted, explaining that “we painted installations the same color as the ceilings or walls and positioned them just right so they would be practically invisible. Even the door intercoms are designed to be inconspicuous.”
Tenants can naturally access the NOVE any time of the day or night. Tim Wiesener is confident that everyone consistently feels safe there, thanks to the networked solutions. “Our collaboration for implementing the complex was excellent and collegial. We worked closely with the Bosch experts to create a solution that’s geared to people and their needs.”
We are living in the age of Big Data, and businesses are inundated with large volumes of data every day. Success depends on capturing, analysing and ultimately transforming that data into information and intelligence that can be used to improve the business. So, it is with today's physical access control and video systems, too, which also generate unprecedented levels of data. But how can we make the data useful to end users and how can they realise its full value? We asked this week's Expert Panel Roundtable: Relating to physical security systems, what is the value of data and how can that value be measured?
The end of the year is a great time to take stock of one’s accomplishments during the year, and to reflect on successes and failures, where we are and where we’re going. 2017 brought a lot of change to the physical security market, but were the changes positive or negative? Our Expert Panelists tend to be a thoughtful and reflective group, so we wanted to get their thoughts and insights at year-end about 2017 in the security market. We asked this week’s Expert Panel Roundtable: Was 2017 a good year or bad year for the physical security industry -and why?
Video systems today offer more capabilities than ever. Consequently, the systems can be used in new ways. For a variety of reasons, however, many customers don’t take full advantage of the capabilities of their video systems and therefore are leaving value on the table. Education and training are tools to alleviate the situation, but the first step is to identify the new ways that video can be used. We asked this week’s Expert Panel Roundtable: How do customers under-utilise their video systems, and what should they do differently?