Gigaclear, the renowned rural broadband services provider, has officially launched its Community Hub Scheme, which aims to provide free broadband to critical community services. 137 of Gigaclear’s Community Hubs are already connected to its ultrafast network, but all areas in which Gigaclear is building are encouraged to apply for the initiative. Ultrafast, full-fibre network The company, which has continued to expand its ultrafast, full-fibre network to reach more people across rural Br...
ComNet, Communication Networks of Danbury, Connecticut, a USA-based manufacturer of fibre optic transmission and networking equipment and an ACRE brand, announced that ACRE has acquired Razberi Technologies and the product line will be added to and sold under the ComNet brand and portfolio of products. ComNet will now be selling Razberi products through its established channels. Intelligent video appliances The Razberi product line of intelligent video appliances, automated security software,...
Panasonic's PTZ camera range is the renowned remote production solution. They have been designed to deliver high-quality images with natural colour reproduction, offer ease of use, and provide accurate and smooth camera movements. Panasonic continuously incorporates new features into its PTZ range to meet the changing production requirements - from the FreeD protocol to support AR/VR applications, to IP transmission protocols like high-bandwidth NDI, SRT and RTMP/RTMPS for stable video transmis...
All Siqura activities will continue under the banner of TKH Security. These renowned companies in video security solutions were both already members of TKH Group NV. The Siqura video security solutions are often sold in combination with the developed security solutions of TKH Security and this complete solution is highly appreciated by their customers worldwide. Therefore, the time has come to group all activities in TKH Security. “By combining all activities, we give our customers more t...
Antaira Technologies, a globally renowned developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications, is proud to announce the expansion of its industrial wireless family with the introduction of the ARS-7235 series, ARX-7235-AC-PD-T, ARY-7235-AC-PT. ARS-7235 series Antaira Technologies’ ARS-7235 series is an industrial IEEE 802.11a/b/g/n/ac wireless LAN access point with added router capabilities. It is designed for e...
GJD, a manufacturer and designer of smart electronic perimeter detection and high-performance LED illumination equipment, is pleased to announce the launch of its Clarius® Hybrid IP IR/WL LED illuminator. The Clarius® Hybrid IP is a high-performance combined infra-red and white light illuminator; which incorporates the latest surface mount LED technology with enhanced optical output and outstanding reliability, delivering excellent night-time images. Minimising light wastage GJD&rsquo...
Pinnacle Imaging Systems, a globally renowned developer of Image Signal Processors (ISP) and High Dynamic Range (HDR) video solutions, has launched its new Denali 3.0 Programmable Image Signal Processor IP. Pinnacle Imaging’s camera-ready, end-to-end HDR ISP leverages its proprietary advanced algorithms to accurately tone map high contrast scenes for mission critical applications requiring data-rich, real-time imaging. Denali 3.0 Programmable Image Signal Processor IP With Denali 3.0, Pinnacle Imaging has redesigned its ISP for more efficient power consumption With Denali 3.0, Pinnacle Imaging has redesigned its ISP for more efficient power consumption, boosted performance with an expanded 20-bit image processing pipeline and limited latency to less than 20 lines, all with no external DRAM or frame buffers required. These improvements ensure Denali 3.0 delivers best-in-class image quality for applications demanding native support of real-time high dynamic range video for automotive, security and surveillance, robotics, medical, industrial, machine vision and automated sensory applications. Sensor-based safety mechanisms for ADAS “As designers continue to expand sensor-based safety mechanisms for ADAS and autonomous robotic applications, the need for ultra-low latency, and high-quality visual data advances at every stage; with Denali 3.0, we are providing the building blocks for the future of these technologies,” said Alfred Zee, Chief Executive Officer (CEO) of Pinnacle Imaging Systems. Alfred adds, “The opportunity to collaborate with industry renowned companies like Xilinx, Inc. and ON Semiconductor has afforded us a unique opportunity to build on our high dynamic range ISP and meet the demands of next generation platforms that will service applications of the future.” Sensor Agnostic Real-Time HDR Video Output The Denali 3.0 ISP cores are adapted from Pinnacle Imaging’s patented HDR technology. Modeled on true human vision, this proprietary technology enables retention of local image contrast as well as details in highlights and shadows, all without producing halos or colour shifts. The fully programmable ISP provides designers with an incredible amount of flexibility to customise the processing to meet the unique challenges of their specific projects. Denali 3.0 is also uniquely adaptable to support sensors of any resolution, non-traditional colour filter arrays (CFAs) and diverse HDR capture methods. Because Denali 3.0 runs exclusively in the FPGA fabric, designers are able to free up on-chip CPU and GPU resources for advanced artificial intelligence functionality. High-performance HDR ISP A high-performance HDR ISP is critical in today's numerous AI vision applications" “A high-performance HDR ISP is critical in today's numerous AI vision applications,” said Chetan Khona, Director, Industrial, Vision, Healthcare & Sciences at Xilinx, adding “The quality of any computer vision system’s results are only as good as the input data provided. We are thrilled that Pinnacle has successfully ported their Denali 3.0 ISP to our Zynq UltraScale+ family of MPSoCs, providing an adaptive ISP to meet our customers' needs for mission-critical applications.” Denali 3.0 can now be configured to support the complete line of Xilinx Zynq 7000 series and Zynq UltraScale+ programmable SoCs. It also offers native support for the ON Semiconductor AR0233 with a 20-bit image processing pipeline in Super Exposure Mode producing 120dB (20EV) of dynamic range with LED flicker mitigation. Automotive sensor solutions “Achieving world-class dynamic range is a key focus for ON Semiconductor automotive sensor solutions. Our Hayabusa family of sensors is designed to achieve maximum dynamic range with LED flicker mitigation (LFM). Pinnacle Imaging Systems is on the-cutting edge of HDR processing technology, adapting its flexible ISP to support our new sensor innovations.” said Stephen Harris Director of Automotive Solutions Architecture for ON Semiconductor’s Automotive Sensing Division. Stephan adds, “Their programmable Denali 3.0 ISP expands their data processing pipe to support the Hayabusa family’s native super-exposure 20-bit output achieving highest possible dynamic range with LFM.” As the demands on video analytics become more complex, whether by end users or integrated autonomous systems, Pinnacle Imaging is able to customise its Denali 3.0 IP cores to just about any image sensor, making it a unique platform for automotive ADAS cameras, automotive vision systems, robotics, autonomous vehicles, as well as intelligent traffic systems. Denali 3.0 is an ideal ISP solution for security and surveillance, as well as commercial UAV applications. Key features of the Denali 3.0TM IP Core Denali 3.0 delivers a real-time 20-bit data path capable of producing 120 dB or 20-EV steps of dynamic range For engineers and camera designers developing mission critical applications requiring the highest-quality video signal and ultra-fast response times together with the ON Semiconductor AR0233 CMOS sensor, Denali 3.0 delivers a real-time 20-bit data path capable of producing 120 dB or 20-EV steps of dynamic range (with LED flicker mitigation), while ensuring extremely low latency (less than 20 lines). Its unique HDR IP completely eliminates halo artifacts and colour shifts. This allows Denali 3.0 to capture up to 1080p HDR video in real-time that is fully tone-mapped at 60 fps. Denali 3.0 is also able to accommodate automated or full-user control modes. HDR-Specific Features: 2 to 4 frame multiple exposure merge Auto de-ghosting & motion compensation Auto halo removal Transition noise suppression Auto EV bracketing Auto & manual brightness adaptation (gamma) Ability to capture separate HDR and Tone Mapped output video streams concurrently for ADAS Application Standard ISP Features: Black level and gain compensation Auto/Manual exposure Auto/Manual white balance Auto Gain Veiling glare correction Noise reduction Local contrast adjustment Bad pixel correction Automatic and manual Region of Interest (ROI) selection Signal to noise measurements Histogram calculation 50/60 Hz ambient artificial lighting sync Available configurations & integration partnerships Pinnacle has already developed several configurations of Denali 3.0 for deployment on Xilinx Zynq 7000 and Xilinx Zynq UltraScale + Programmable SOC platforms, as well as ON Semiconductor AR0233 and AR0239 configurations, and all are available immediately. Additionally, Pinnacle is offering fully-customisable IP blocks for ASIC or system-level implementations with additional sensors to be supported soon.
BCD International has announced the hiring of Kelly Carlberg to the newly created position of Strategic Alliances Manager - Dell Technologies. Carlberg brings with him, more than 20 years of surveillance and IoT expertise, and specialises in developing relationships and accelerating the use of appropriate indirect channels. Cloud computing expert Carlberg’s industry expertise includes cloud computing, virtualisation, information security, identity and access management, policy management and compliance, network infrastructure (routers, switches), as well as secure mobility and enterprise video. He also brings an extensive background in partner recruitment, channel marketing, demand generation, optimising routes-to-market, influencing and consulting partners, and emerging technology channels. OEM surveillance partner “While at Dell, I admired BCD’s innovation and go-to-market strategies as an OEM surveillance partner. I am looking forward to leading with these industry-renowned innovative solutions going forward among all Dell channels,” stated Kelly Carlberg. As one of Dell’s larger OEM customers, BCD International delivers purpose-built, maximum performance, and guaranteed video infrastructure solutions to customers all over the world. Carlberg’s mission will be to deliver BCD’s message within the Dell sales community, while working together to bring the proper video surveillance solution to both Dell and non-Dell customers globally.
BCD International has announced the hiring of Jonathan Benedick, a military veteran with an active top secret/SCI security clearance and eight years of proven experience in the United States Air Force, as National Sales Engineer for the REVOLV Product Portfolio Platform. All REVOLV opportunities will flow through Benedick from the BCD sales teams. Network infrastructure expert Benedick possesses a well-rounded comprehensive background in server installation and maintenance, network infrastructure administration, Microsoft applications and software support, and desktop hardware/software support, derived from conducting domestic and global operations spanning five countries, including Osan AFB in South Korea and Ramstein AFB in Germany. “Jonathan is a unique talent with the ability to design it, position it, sell it, as well as install it, along with the network,” stated BCD International’s Chief Executive Officer (CEO), Jeff Burgess. Most recently, Benedick served as a Windows server engineer, completing server and network global operation projects and VMWare core application support, working at an American multinational oil and gas corporation. Benedick’s hiring follows the recent addition of Chris Walters as Project Manager to the REVOLV team at BCD International. Security implementation plans consultant Walters spent 14 years as a decorated officer of two California Police Departments Walters spent 14 years as a decorated officer of two California Police Departments. Since that time, Walters has been responsible for the independent consulting and design of both short- and long-range security implementation plans. He has designed, implemented, and guided installation contractors for multi-million dollar projects, ensuring they followed proper procedures and operational guidelines, while establishing high-level infrastructure layouts for client security systems. Managing and maintaining licence and warranty records “Bringing Chris Walters to the team has really helped solidify our processes as an organisation and allowed us to take a detailed approach to each project. Having someone being involved from the start to the finish of a project ensures all quality standards are met and the customer is receiving the best possible products and services,” said Josh Glover, BCD International’s Director of Technical Services. Walters’ responsibilities include all coordination and all communication during the project, managing and maintaining licencing and warranty records, as well as providing complete customer satisfaction.
Detection Technology, a globally renowned company in X-ray detector solutions, has announced the launch of the X-Panel 1412 X-ray flat panel detector (FPD), designed to enhance advanced industrial and dental X-ray imaging applications. CMOS technology-based X-ray FPD The X-Panel 1412 is a CMOS (Complementary Metal Oxide Semiconductor) technology-based X-ray flat panel detector (FPD) series that provides high scanning speeds yet razor-sharp images, and covers a wide energy range. The series is built on a proven, simplified, and robust digital platform to accelerate detector integration into X-ray systems and time-to-market, to extend system lifespan, and to bring greater total cost savings for X-ray OEMs (original equipment manufacturers) and system integrators. X-Panel 1412 X-ray flat panel detectors X-Panel 1412 X-ray flat panel detector is available in two models, X-Panel 1412i and X-Panel 1412d The X-Panel 1412 X-ray flat panel detector is available in two models, X-Panel 1412i and X-Panel 1412d that are optimised to application-specific requirements, and offer use-case-driven add-on features. The X-Panel 1412i is a perfect fit for industrial CT (Computed Tomography) and DR (Digital Radiography) applications, such as high-resolution quality inspection of critical components and valuable goods, in a wide range of applications in the automotive, electronics, food, and battery industries. In turn, the X-Panel 1412d is designed to meet the requirements of dental CBCT (Cone Beam Computed Tomography) and panoramic X-ray imaging applications. Accurate static and dynamic X-ray imaging “We are proud to expand our offering to high-resolution industrial applications with the unique X-Panel product family, which is already well-known in the medical market. The X-Panel 1412i enables accurate static and dynamic X-ray imaging in a variety of applications in the industrial field, ranging from conventional NDT (non-destructive testing) of critical parts to quality inspection of products and packages,” said Tomi Fält, Manager of Product Management at Security and Industrial Business Unit of Detection Technology. Tomi adds, “In addition to superior imaging-performance, our industrialised DDA (digital detector array) solution features high X-ray penetration for the inspection of dense objects, and extended sensor lifespan under X-ray, which are highly valued in industrial imaging.” Scalable, cost-effective solution “Our platform is easily scalable to various market needs. We have paid special attention to cost competitiveness in the dental-specific 1412d model. With its cost-saving features, the X-Panel 1412d sets an attractive price point in its class for performance-driven, high-tier dental modalities,” said Jyri Tolonen, Product Manager at Detection Technology. Jyri adds, “Such features include the enhanced CMOS sensor and the simplified platform designs that improve manufacturability and streamline the supply chain, for example. Furthermore, the mature and well-proven platform accelerates detector integration into X-ray systems and time-to-market.” Reliable CMOS imaging sensor Both models utilise a reliable CMOS imaging sensor (CIS) design for high scanning speeds and image quality Both models utilise a reliable CMOS imaging sensor (CIS) design for high scanning speeds and image quality, even at low-dose operation modes. The X-Panel 1412 features a frame rate of up to 30 fps in full size and full resolution. In certain application-specific ROI (region of interest) modes, it is also capable of acquiring images at 300 fps. As an example of its key parameters measuring imaging quality, the X-Panel 1412 provides a dynamic range of up to 76 dB. The X-Panel 1412 X-ray flat panel detector has an active area of 140.1-by-120 mm. The 1412i model is equipped with screen scintillators optimised for industrial imaging, and the 1412d with medical-grade, structured cesium iodide scintillator. Equipped with durable and compact mechanics The models are powered by a 100-micrometer dual range pixel and a 14-bit ADC. The X-Panel 1412 supports both continuous and synchronous triggering modes. The 1412i model is targeted for an X-ray energy range of 20-225 kVp, and the 1412d for 60-100 kVp. The detector is equipped with durable and compact mechanics for reliability and ease of X-ray imaging system design. It can be easily integrated into small X-ray system form factors like NDT cabinets. In addition, the narrow frames around the active area shrink the shoulder edge distance that is critical in dental applications. The X-Panel 1412 X-ray flat panel detector comes with an application-fitted and reliable control unit The X-Panel 1412 X-ray flat panel detector comes with an application-fitted and reliable control unit, and a Gigabit Ethernet interface. For speeding up design and system integration, a complete developer aid kit is available. The kit includes an application programming interface (API), panel demonstration application software, necessary cabling, and developer guides. Industrialising detector solutions Jyri adds, “The X-Panel 1412 demonstrates our capability to industrialise detector solutions for a variety of applications and to expand our portfolio determinedly. Our flat panel portfolio is constantly evolving with the market. For example, we have larger panel sizes in the pipeline to address specific medical and industrial imaging needs in the near future.” The dental-specific X-Panel 1412d is available immediately, and shipments of the 1412i for industrial applications will kick off at the beginning of 2021. Inquiries about availability and the developer aid kit can be directed to the company.
Powercast Corporation, the globally renowned company in radio-frequency (RF)-based, over-the-air wireless power technology and solutions, has announced the launch of a new wirelessly-powered RFID Temperature Scanning System that enables businesses to easily and safely monitor employees' temperatures, as they work to re-open offices and get back to normal. RFID Temperature Scanning System The new system is comprised of a wirelessly-powered temperature-scanning fob for each employee, an RFID reader, and a TV monitor. Employees receive a fob small enough to fit onto their keychain that is specially personalised to them. The fob quickly charges when held near an RFID reader using Powercast's power harvesting technology The fob quickly charges when held near an RFID reader, at the entrance to the enterprise’s office, using Powercast's patented power harvesting technology. Employees scan their own forehead using the fob to read their temperature and are permitted to enter or are denied entry, based on the temperature reading, which appears on the monitor. Effective employee screening For larger organisations and those on corporate campuses, multiple readers can be used to keep a record for contact tracing, if issues arise. Once employees take their temperature when entering the building, they can return the fob to their pocket and do not need to remove it again for location tracking. In the case of COVID-19 exposure, time-stamped information can be automatically gathered from the readers to ensure that all potentially exposed employees are notified. ‘COVID-19 Return to Work Survey’ According to a recent ‘COVID-19 Return to Work Survey’ report from Littler, an employment law practice, more than half (58%) of employers surveyed plan to conduct testing or health screenings on employees, with most referring to temperature checks (89%) and symptom screenings (72%). Powercast's Temperature Scanning System is already in use at Powercast's headquarters in Pittsburgh's RIDC Park. The RFID reader antenna is integrated into the company's check-in counter, enabling fast, hands-free screening. During the first 12 days, the system took a total of 300 readings, which were as accurate as a traditional handheld thermometer. Powercast Scanning System The new Powercast Scanning System has a distinct advantage over handheld devices The new Powercast Scanning System has a distinct advantage over handheld devices that are shared and hard to maintain germ-free or other modes that require employees to stop and write down their information, potentially sharing pens and creating a blockage at entry points. In the wake of COVID-19, businesses are eager to get back to normal as quickly as possible, while ensuring the safety and welfare of their employees. A ‘COVID-19 Returning to Work Survey’ of 1,000 U.S. employees by Eagle Hill Consulting found that 54 percent of employees are worried about exposure to COVID-19 at their job. Most employees (71 percent), however, felt their employers will be prepared to safely bring employees back to the workplace. Quick and easy implementation "We designed this new Temperature Scanning System to take advantage of proven technologies that can be quickly and easily implemented by companies of all sizes so that they can get back to work, safely and without a huge imposition to workers," said Charles Greene, Ph.D., Chief Operating Officer and Chief Technical Officer of Powercast. Charles adds, "This is one of many ways we are applying wireless power to solve real-world problems and eliminate some of the limits of other alternatives." Powercaster RF wireless power transmitters The RFID Temperature Scanning System uses RAIN RFID readers as its source of RF wireless power. The System's over-the-air RF harvesting technology can harness RF energy from Powercast's own PowerSpot or Powercaster RF wireless power transmitters, or from industry standard UHF RFID readers. The enabling technology behind the system is Powercast's tiny, embeddable Powerharvester receiver chip, which harvests RF automatically when it's within range of an RF power source, and then converts it to direct current (DC) to power the application. The chip is highly efficient and effective in deriving power from even very small amounts of RF and is currently being used in a number of consumer and business applications where wireless power provides a distinct advantage. How the RFID Temperature Scanning System Works After recording the temperature, the data is sent to the RFID reader to read Each battery-less fob contains an RFID chip, which identifies its owner, a Powercast Powerharvester receiver chip, a Microchip Technology PIC24F04KA201 microcontroller (MCU) and a temperature sensor. The employee simply holds their fob device in a designated power area equipped with an RFID reader antenna and a TV screen. The fob harvests the RF to power up the temperature sensor. After recording the temperature, the data is sent to the RFID reader to read. The TV screen then displays the employee's name, temperature, and either a green or red light to indicate if they may enter. Microchip's PIC24F04KA201 MCU Powercast chose Microchip's PIC24F04KA201 MCU because of its minimal power consumption and ability to incorporate I2C and an analogue-to-digital converter into a very small package, enabling a car fob-like size. In addition, Microchip's MPLAB Code Configurator sped up the concept-to-prototype process, resulting in a commercially-available system in less than 2 months. "The PIC24F microcontroller family is a perfect fit for the Powercast temperature scanning fob due to the extreme low power consumption, flexible peripheral set and small form factor. Microchip's tool chain enables rapid development and commercialisation as demonstrated by this product," said Joe Thomsen, Vice President of Microchip's MCU16 business unit. Joe adds, "Creative designers are able to quickly develop low-power solutions like this temperature scanning key fob, ensuring employees return to work in a safe environment."
Honeywell is launching a new 60 Series line of 5MP IP cameras that offer greater detail than traditional camera and recorder solutions; and are well suited for users who want fast notification and verification of potential threats and responses. The 5MP video delivers a clearer picture and can be zoomed in from greater distances, allowing for fewer cameras to cover a larger area of view. The Honeywell 60 Series IP cameras are designed for use as part of video systems which comply with the John S. McCain National Defense Authorization Act 2019 (NDAA), Section 889. NDAA Section 889 prohibits the U.S. government from procuring video and telecommunication equipment from certain companies and their subsidiaries. The 60 Series cameras easily integrate with the Honeywell MAXPRO VMS/NVR range and ADPRO iFT/iFT-E IP NVRs which also do not contain components from any of the companies highlighted in NDAA Section 889. Key benefits and features Meets stringent requirements with cybersecurity protection - The 60 Series cameras undergo strict quality testing and regulatory compliance and are compliant with security product test and certification. The 60 Series cameras feature TLS1.2 (HTTPS) encrypted streaming, adhere to the Payment Card Industry Data Security Standard (PCI-DSS) and include a built-in NIST FIPS encryption chipset. Together, these elements help meet the increasingly stringent requirements being set by IT Departments to shield businesses against unauthorised access and unsanctioned distribution of data and video. It features secured onboard storage with local encryption on micro SDCard. Delivers high quality images day or night - Features built-in six video analytics that integrates with MAXPRO NVRs/VMS and OpenVA to support third party applications. It offers improved images using lenses with Precise-Iris (P-Iris) and clear night images with Smart IR LEDs. It features telephoto zoom options for clearer human face images. The 60 Series provides excellent picture clarity at minimal bandwidth while offering maximum protection against dust and water. Reduces cost of ownership - Saves up to 50% of storage space with H.265 HEVC Smart codec and WiFi setup capabilities allow for setup via a mobile phone. Its saves on installation with the unified tool that optimises device discovery time and minimises IP configuration time using Automatic Private Internet Protocol Addressing (APIPA) protocol. The 60 Series cameras offer exceptional picture clarity, flexible system integration, secure data transmission and easy installation. The 60 Series IP cameras include 5MP indoor and outdoor dome, bullet and outdoor speed dome and a 2MP outdoor speed dome. The 60 Series is part of the Honeywell connected security portfolio which can provide customers a complete solution with video, access control, intrusion and integrated security products.
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile credentials are not secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organisation more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organisation deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All smartcards are equally secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organisation vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organisation if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic locks are more vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorised access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be prepared to unlock future benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.
For the past several years, there has been a focus by integrators and customers to assure that their card-based access control systems are secure. To give businesses an extra incentive to meet their cybersecurity threats, the Federal Trade Commission (FTC) has decided to hold the business community responsible for failing to implement good cybersecurity practices and is now filing lawsuits against those that don't. For instance, the FTC filed a lawsuit against D-Link and its U.S. subsidiary, alleging that it used inadequate safeguards on its wireless routers and IP cameras that left them vulnerable to hackers.Many companies perceive that they are safer with a card but, if done correctly, the mobile can be a far more secure option Now, as companies are learning how to protect card-based systems, such as their access control solutions, along comes mobile access credentials and their readers which use smart phones instead of cards as the vehicle for carrying identification information. Many companies perceive that they are safer with a card but, if done correctly, the mobile can be a far more secure option with many more features to be leveraged. Handsets deliver biometric capture and comparison as well as an array of communication capabilities from cellular and Wi-Fi to Bluetooth LE and NFC. As far as security goes, the soft credential, by definition, is already a multi-factor solution. Types of access control authentication Access control authenticates you by following three things: Recognises something you have (RFID tag/card/key), Recognises something you know (PIN) or Recognises something you are (biometrics). Your smart phone has all three authentication parameters. This soft credential, by definition, is already a multi-factor solution. Your mobile credentials remain protected behind a smart phone's security parameters, such as biometrics and PINs. Organisations want to use smart phones in their upcoming access control implementations Once a biometric, PIN or password is entered to access the phone, the user automatically has set up 2-factor access control verification - what you know and what you have or what you have and a second form of what you have. To emphasise, one cannot have access to the credential without having access to the phone. If the phone doesn’t work, the credential doesn’t work. The credential operates just like any other app on the phone. The phone must be “on and unlocked.” These two factors – availability and built-in multi-factor verification – are why organisations want to use smart phones in their upcoming access control implementations. Smart phone access control is secure Plus, once a mobile credential is installed on a smart phone, it cannot be re-installed on another smart phone. You can think of a soft credential as being securely linked to a specific smart phone. Similar to a card, if a smart phone is lost, damaged or stolen, the process should be the same as with a traditional physical access credential. It should be immediately deactivated in the access control management software - with a new credential issued as a replacement. Your mobile credentials remain protected behind a smart phone's security parameters, such as biometrics and PINs Leading readers additionally use AES encryption when transferring data. Since the Certified Common Criteria EAS5+ Computer Interface Standard provides increased hardware cybersecurity, these readers resist skimming, eavesdropping and replay attacks. When the new mobile system leverages the Security Industry Association's (SIA) Open Supervised Device Protocol (OSDP), it also will interface easily with control panels or other security management systems, fostering interoperability among security devices.All that should be needed to activate newer systems is simply the phone number of the smart phone Likewise, new soft systems do not require the disclosure of any sensitive end-user personal data. All that should be needed to activate newer systems is simply the phone number of the smart phone. Bluetooth and NFC the safer options Bottom line - both Bluetooth and NFC credentials are safer than hard credentials. Read range difference yields a very practical result from a security aspect. First of all, when it comes to cybersecurity, there are advantages to a closer read range. NFC eliminates any chances of having the smart phone unknowingly getting read such as can happen with a longer read range. There are also those applications where multiple access readers are installed very near to one-another due to many doors being close. One reader could open multiple doors simultaneously. The shorter read range or tap of an NFC enabled device would stop such problems. However, with this said in defence of NFC, it must also be understood that Bluetooth-enabled readers can provide various read ranges, including those of no longer than a tap as well. One needs to understand that there are also advantages to a longer reader range capability. Since NFC readers have such a short and limited read range, they must be mounted on the unsecure side of the door and encounter all the problems such exposure can breed. Conversely, Bluetooth readers mount on the secure sides of doors and can be kept protected out of sight. Aging systems could cause problems Research shows that Bluetooth enabled smart phones are continuing to expand in use to the point where those not having them are already the exceptions With that said, be aware. Some older Bluetooth-enabled systems force the user to register themselves and their integrators for every application. Door access – register. Parking access – register again. Data access – register again, etc. Newer solutions provide an easier way to distribute credentials with features that allow the user to register only once and need no other portal accounts or activation features. By removing these additional information disclosures, vendors have eliminated privacy concerns that have been slowing down acceptance of mobile access systems. In addition, you don’t want hackers listening to your Bluetooth transmissions, replaying them and getting into your building, so make very sure that the system is immunised against such replays. That’s simple to do. Your manufacturer will show you which system will be best for each application. Research shows that Bluetooth enabled smart phones are continuing to expand in use to the point where those not having them are already the exceptions. They are unquestionably going to be a major component in physical and logical access control. Gartner suggests that, by 2020, 20 percent of organisations will use mobile credentials for physical access in place of traditional ID cards. Let’s rephrase that last sentence. In less than 18 months, one-fifth of all organisations will use the smart phone as the focal point of their electronic access control systems. Not proximity. Not smart cards. Phones!
In the state of the residential security market today, we see many who are offering home security packages that rely on numerous sensors and multiple devices to provide a comprehensive coverage of the home and provide peace of mind. Each individual sensor or device within the package provides a specific functionality, and the user finds himself burdened by an overwhelming amount of sensors and devices. This overload is intensified by the penetration of additional IoT and smart devices into the home, such as pet-cams or smart speakers that add to the burden of installation and maintenance. In addition, we are witnessing the rise in popularity of DIY security devices, indicating that users are looking for models and technologies that provide both contract flexibility and simplicity of use. The past years have seen major advancements in radar technology, which have brought the formerly military technology into the consumer space. Radars provide interesting prospects for home security and smart homes due to several inherent characteristics which give it an advantage over existing technologies. The resolution of an advanced radar sensor enables not only presence detection, but also provides advanced features for security, automation and well-being Advanced security and automation features Of primary importance, a consumer designed radar sensor provides the user with full privacy, but the use of radar is also beneficial because it is indifferent to environmental, temperature and lighting conditions. In addition, radar signals (at certain frequencies) are capable of penetrating through almost any type of material, enabling concealed installation, robust monitoring in cluttered spaces and even the coverage of several separate rooms with only one device. In terms of capabilities, simple time of flight 2-antenna radar sensors, which have been around for a while, do not provide much additional value in comparison to existing solutions and are not necessarily competitive in terms of pricing. However, the new generation of radar sensors are also opening up new capabilities previously achieved with optics only. Today, the resolution of an advanced radar sensor is high enough to enable not only presence detection, but also to provide advanced features for security, automation and well-being, all in one. Imagine for example, that the security sensor installed in your elderly parent’s home could also detect a fall having occurred, monitor the breathing of a baby or even leaks in your wall. Due to the unique field of view that radar provides as well as the multi-functional potential, this technology will be the key to the awaited convergence of smart home functionalities and minimisation of home devices. The security sensor installed in your elderly parent’s home could also detect a fall having occurred Secret of the consumer radar A radar sensor’s accuracy and its ability to support wide functionality and applications is determined initially by its resolution, which is based on two key factors: bandwidth and number of channels. The wider the bandwidth and the more channels the radar supports, the more accurate the data received. Imagine the difference between a 1990s television model and a 4K 2018 television model - As the resolution is ever improving, the sharper and more detailed is the image. When looking at the short-range radar sensor market, prominent companies such as Texas Instruments and NXP are offering radar-on-chip solutions supporting 2\3 transmitters (Tx) and 3\4 receivers (Rx), mainly utilising frequency bands of 77-81GHz, as they target mostly automotive and autonomous driving applications. Another company that develops such radar-on-chip solution is Vayyar Imaging, an Israeli start-up, founded in 2011, that developed a radar sensor for 3D imaging. Vayyar Imaging directly targets the smart home and security markets with its radar-on-chip, developing modules and products for intruder detection, automation and elderly care (fall detection). Providing not only chips, but complete systems, the new model makes radar technology highly available and accessible. The radar-on-chip technology opens the door to installation of security and well-being devices in locations where privacy or environmental conditions pose an issue Radar-on-chip solution The radar-on-chip solution supports 72 full transceivers, an integrated DSP and radar bands between 3-81GHz. The resolution provided by this type of specification is high enough to provide subtle information about people’s real time location posture (lying down\falling\sitting\walking), and breathing, and enables to classify pets from humans, but it is low enough as to not compromise privacy. This type of technology opens the door to installation of security and well-being devices in locations where privacy or environmental conditions pose an issue, such as in bathrooms or heavily lit environments. Moreover, utilisation of this technology allows to dramatically minimise the numbers of sensors installed in the home, as it provides full home coverage with just one or two sensors and enables using the same HW to support additional capabilities such as breath monitoring, fall detection and highly accurate automation. Using AI and machine learning, the data derived by these sensors can be leveraged to provide smarter, verified alerts on the one hand and whole new insights on the on the other. The sensor can be tuned to learn the location of the house entrances or boundaries, where the inhabitants are expected to be at night, or where they should be expected to enter from into the home, adding new logics to the traditional yes\no decision making. Home security is widely regarded as a necessity, provides peace of mind to people and is integral to people's day to day lives Additional smart home services Among the evolving home technology verticals, security is by far the most relevant and integral to people’s day to day lives. Home security is widely regarded as a necessity and provides peace of mind to people. Being a legacy industry with many well-known and well-trusted brands, security players are well positioned to introduce new technology into the home and have the ability and credibility to expand their offerings to additional smart home services by utilising existing infrastructure and channels. With technology giants entering the security arena through the smart home door the DIY security solution market expected to explode with a CAGR of 22.4% (according to a report by Persistence Market Research). Now that new pricing and service models offer minimal commitment, traditional security players will need to step up. Security companies will need to explore new technologies and expand their offering if they intend to stay relevant and competitive in a market trending on functionality converge and minimisation of maintenance and installation costs.
The next chapter of the Pelco saga began in May when Pelco Inc. was acquired by Transom Capital Group, a private equity firm, from Schneider Electric. Since the acquisition, Transom Capital has been working with Pelco’s management and employees to define and direct that next chapter. “The more time we spend with the company, the more excited we are about the opportunity,” says Brendan Hart, Vice President, Operations, Transom Capital Group. In addition to his position with Transom, Hart has taken on an interim line role at Pelco as Vice President of Product and Strategy. After helping to oversee Pelco’s rebuilding phase, he expects to step away from daily involvement over time. “We have gained an appreciation for nuance [since the acquisition closed],” he said. “The channels, the relations, how people buy in this industry are very nuanced. Who’s gone where and who’s done what? The interplay of hardware and software. We have gained appreciation for the nuance. And we need to be surrounding ourselves with people who know the industry, who know the multi-dimensional areas.” Transition from analog to IP systems We have to focus on who our customers are specifically and understand their needs” It’s a “transformative moment in the industry,” says Hart, given industry changes such as price erosion and the transition from analogue to IP systems. “We are about to go into the world of added intelligence. It’s an interesting time to buy a security company.” Hart says the Pelco brand still has value: “The market is rooting for us.” There is also a strong portfolio of people and products to build from. Pelco maintains its headquarters in Fresno, Calif., and has a presence in Fort Collins, Colo., near Denver, and a sales office in the New York area, not to mention many global employees who work remotely. A new CEO is being recruited; otherwise, “we have a great executive team” in place, including Brian McClain, COO and President, says Hart. “In defining the new company, we have to decide first and foremost what we want to be,” says Hart. “What can we provide customers? We have to focus on who our customers are specifically and understand their needs and use cases.” Part of defining the new company is to become more aligned with a specific set of verticals that fit with Pelco’s capabilities (although they are not saying which verticals those are yet). However, “we can’t ignore what we are today as we make the transition,” says Hart. Innovation in products We want customers to see innovation in products to a point when people will say ‘this is Pelco’" “We have to let the products and experience speak for themselves. We’re focused on getting our ducks in a row and going in a new direction, but actions speak louder than words,” he says. The changes will be “more organic;” don’t expect to see a big announcement. “We want customers to see innovation in products and customer support and get those things to a point when people will say ‘this is Pelco,’” says Hart. Although not exhibiting at GSX, I found Pelco occupying a meeting room near the show floor. The room gave the company a chance to respond to integrators and consultants at GSX who had questions about what was going on with the acquisition. “Everybody is rooting for us, and we wanted the ability to get out and say ‘we’re here, we’re doing things, and we’re excited about the future,’” said Stuart Rawling, Pelco’s Vice President, Market Strategy. “This is a time for people to come and see us who maybe haven’t seen us in a while.” By ISC West in the spring, Pelco expects to have a clear message of who they are and where they’re going, he says. Aligning needs of end user “We are excited about the work we are seeing internally,” which includes “aligning resources in the right way,” says Rawling. “The fruits of the labour are being seen internally now. We will be launching new products in the next eight months, although there will not be a defined moment in time when we say ‘this is it.’ It will just be happening. Next year will be an exciting time industry-wide, and product-wise, and Pelco will have a strong voice. Brendan and team have kept us extremely busy,” says Rawling, who also was part of Pelco in the “glory days” before the acquisition by Schneider Electric. We’re so optimistic, when you combine the people and the brand and what’s happening the market” “The work product has been so transformative mindset-wise for the employees. Everybody has had the opportunity to talk to the [new] owners about what type of company we are. We can set our own vision and get reenergised and get back to the core belief of what Pelco was and what it should be. We are the master of our own destiny, aligning needs of end user with the products we can deliver. We are putting the right processes in place that work for this market. It is an exciting prospect.” In the new era, Rawling expects to target marketing more toward end-users, because they have more influence on product selection than ever before, he says. End users often learn about new products online, so Pelco will be looking to target its marketing toward educating various vertical markets about available technologies and their use cases. “We’re so optimistic, when you combine the people and the brand and what’s happening the market,” says Hart. “We have to do the work. We’re excited about what we are seeing internally.”
Choosing the right server for a video surveillance application comes down to one question: What does the customer expect from the system? Is it a retail location with two cameras that only needs video stored for 24 hours? Does the system need failover protection? What are the ramifications if a system goes down? Does business have to stop? How fast does the customer need to have access to video? Is it a regulated industry where immediate access is a requirement? How mission-critical is the video system to operations? Mission critical video surveillance solutions Such questions can point video system designers to the right technology for an application, and a manufacturer and reseller with a wide product offering ensure that the perfect solution is available and can be shipped quickly. It’s important to remember that this is not a “one size fits all” marketplace. Data capture form to appear here! Questions need to be asked on what an appropriate server solution will provide for the customer 1) JBOD - It stands for "just a bunch of disks" and refers to a collection of hard disks that have not been configured to work together. This approach is typical of stand-alone systems such as a retailer who has one or two cameras recording locally at a remote location, and who have a tolerance for occasionally losing video footage. 2) RAID 5/6 is a redundant array of independent disks in which data is stored across all the disks. The configuration provides more redundancy and reliability, better balance of disk usage, and more throughput and performance. RAID 5/6 is a redundant array of independent disks in which data is stored across all the disks 3) SAN or storage area network is a type of centralised storage providing enhanced accessibility to disk arrays. SAN provides high performance but is not as easy to expand. It is also less expensive than NAS systems. 4) NAS or network-attached storage is another type of centralised data storage. NAS systems are networked appliances containing storage drives. Benefits include faster data access, easier administration and simple configuration. NAS systems are easier to expand than SAN but provide less performance. NAS systems fit well in situations where customers have massive storage needs (or expect to in the future.) These are applications with lots of cameras and a need to retain high-frame-rate video for 180 days or longer. Typical uses include sports arenas, large cities, universities, corporate campuses and airports. Immediate access to video Highly available systems, such as SAN or NAS, are needed in any regulated industry. For example, in the cannabis grower market, an end user might need immediate access to video to show a compliance regulator. Gaming is another market in which immediate access to video is critical, and, for example, if a video system goes down at a table game, the gaming has to shut down, which is an expensive prospect to the casino. Therefore, reliability is critical. Video’s benefits beyond safety and security can also help to justify the costs of more expensive system Importance of video in risk mitigation In some instances, video is used primarily to manage risk, for example in litigation (or to avoid litigation) in a slip-and-fall claim or other court action. This is referred to as Loss Prevention. The ability to save thousands of dollars (or millions) by averting an expensive legal verdict can go a long way toward justifying the costs of systems. Video’s benefits beyond safety and security, such as for marketing and business analytics, can also help to justify the costs of more expensive systems. Identifying the right video server equipment Offering a variety of choices, and adapting those systems to specific applications, ensures customer satisfaction “A tradeoff of cost and needed functionality is at the center of decisions when buying server systems for video applications,” says Tom Larson, Chief Technology Officer, BCDVideo. “Identifying specifically what the customer needs from the system, and how important it is to meet those needs, points to the right choice in video server equipment. "Various technologies have advantages and some downsides, and it is the customer’s need for those advantages (and tolerance for the downsides) that determines which server equipment is right for the job.” Offering a variety of choices, and adapting those systems to specific applications, ensures customer satisfaction. The systems builder can help integrators analyse the site and project requirements and translate those into the right equipment and networking choices. What does the customer need and how much are they willing to pay for it? The real determination is “how important is the video?”
Data was always bound to be a hot topic at this year's IFSEC International event. Artificial Intelligence (AI) has been a buzzword since last year's show. This year, manufacturers are ready to demonstrate solutions capable of processing and analysing large volumes of information to bolster security and provide business intelligence. Organisers deliberately positioned IFSEC as a converged security event, highlighting the inherent link between the security of physical assets and the security of data. In the wake of the recent passing of the European General Data Protection Regulation (GDPR), visitors to the London-based show sought reassurance that physical security systems could help them comply to stricter rules regarding the collection and protection of personal information. Analysing Big Data Seagate Technology, known for providing the surveillance industry with hard disk drives and storage solutions, showcased its Skyhawk AI hard disk drive, its first drive created specifically to enable artificial intelligence (AI) applications for video surveillance. Seagate's drive is designed for data-intensive workloads associated with recording large volumes of footage The drive is designed for data-intensive workloads associated with recording and analysing large volumes of video surveillance footage. According to Seagate's Sales Manager Andy Palmer, AI-enabled analytics at the edge can avoid the latency associated with cloud-based systems. This makes the solution suitable for smart city applications requiring 24/7 intelligence from multiple cameras. The company also highlighted its strategic partnership with video surveillance provider Dahua Technology, with the latter seeking to leverage Seagate's technology to boost its own AI solutions. The Digital Barriers solution allows organisations to optimise how video data is transmitted depending on their particular needs Video transmission and privacy One manufacturer addressing the challenges of data transmission was Digital Barriers. The company demonstrated the integration of its EdgeVis Live platform with Milestone's XProtect video management system (VMS). The platform is designed for safe city applications, in which law enforcement and security professionals may need to stream incidents and events in real time over a limited bandwidth. The Digital Barriers solution allows organisations to optimise how video data is transmitted depending on their particular needs. For example, while some applications may favour a high clarity of video, others necessitate low data usage or a quick turnover of frames. The full, high quality video can then be downloaded later, meaning no intelligence is lost.While some applications may favour a high clarity of video, others necessitate low data usage or a quick turnover of frames The company also demonstrated its deep-learning facial recognition software, which can be used to identify suspects or vulnerable persons. To maximise accuracy, the deep learning system is trained on a wide range of images with varying angles and lighting. The solution is designed around data protection and privacy, explained Product Manager Fernande van Schelle, as all information is encrypted, and the system only identifies faces of known individuals on a pre-defined watch-list. Daniel Chau, Overseas Marketing Director at Dahua; Adam Brown, security Solutions Manager at Synopsys; Udo Scalla, Global Head Centre of Excellence - IOT Privacy, TÜV Rheinland Group GDPR for physical security professionals Dahua Technology addressed data protection concerns with an expert panel dedicated to the cybersecurity questions posed by the new European General Data Protection Regulation (GDPR). Speakers included Daniel Chau, Overseas Marketing Director at Dahua; and Adam Brown, security Solutions Manager at Synopsys. Chau explained that Dahua encourages customers to address cybersecurity by undertaking independent audits and penetration tests. Brown elaborated that for any organisation, cybersecurity must be a boardroom issue. Stakeholders must avoid a 'tick box' methodology for assessing cybersecurity, and instead integrate the concept into the company's overall strategy so that best practices can cascade through the organisation.Stakeholders must avoid a 'tick box' methodology for assessing cybersecurity The panel also included insights from Udo Scalla, who specialises in data protection for IoT and smart home devices at TÜV Rhineland Group. Scalla proposed that manufacturers must avoid focusing on how best to capture data, and instead ask why the data is being collected, and whether it should even be collected in the first place. Integrators must ask why the customer intends to install the system, and what they want to do with the data – only then can they begin to assess the GDPR requirements. While the possibilities for collecting data are now endless, explained Scalla, not everything that is technologically possible ought to be made into a business reality. MOBOTIX highlighted its Cactus Concept cybersecurity campaign with a large blue cactus Protecting video surveillance systems Video surveillance manufacturer VIVOTEK also tackled cybersecurity, with a presentation on 'Security within Security.' The company showcased its partnership with cybersecurity software provider Trend Micro, which enables VIVOTEK to provide cybersecurity-enhanced cameras. The cameras include embedded anti-intrusion software to prevent and mitigate cyber-attacks by detecting hacking attempts and blocking the source IP address. Should a camera be compromised, explained Shengfu Cheng, VIVOTEK's Director of Marketing and Product Planning, it can be quarantined to stop the spread of the attack, thus controlling the damage and reducing the cost of the infection. The Cactus Concept campaign aims to educate partners and customers on how to build a cyber-secure video surveillance system Cybersecurity was also a key theme at the MOBOTIX stand. The stand played host to a large blue cactus, a very literal representation of the German manufacturer's Cactus Concept. The campaign, launched earlier this year, aims to educate partners and customers on how to build a cyber-secure video surveillance system. According to the concept, every element of the system, from image capture through to video management, must be encrypted. These are the digital "thorns" which prevent the entire system –the cactus – being compromised. Exhibitors at IFSEC 2018 made a conscious effort to address customers' challenges around the collection, transmission and protection of security system data. As solutions become more powerful, with increasing numbers of connected sensors, this is a theme which is unlikely to go away anytime soon.
One of the key problems in airport security is the sheer size of the perimeter and a large number of incidents are in fact linked to unauthorised access onto the airfield, either runways or where aircrafts are being loaded or refuelled posing an extremely high risk. Most airports will combine multiple sensors and technologies to protect the actual perimeter fence and even beyond the perimeter fence, to warn of potential threats. OPTEX LiDAR sensor integration with RSA module Some airports have found the level of information generated by the perimeter security systems quite challenging to deal with and they wanted to decrease the number of events so operators could focus on what was critical. The Airport development team at Genetec integrated the OPTEX LiDAR sensor into their Restricted Security Area (RSA) Surveillance module, an extension of the Genetec Security Center platform with the purpose to unify data from the sensor and camera to present more meaningful information to the operators. Restricted Security Area Surveillance module The RSA module has been designed specifically with a view to providing wide area protection The RSA module has been designed specifically with a view to providing wide area protection and integrating with wide area surveillance technology, including radar, fibre optic and laser detection devices. The solution allows security staff to determine the level of threat for each area, map them, and utilise OPTEX technologies to identify and locate quickly and precisely the point of intrusion. For instance, with Fibre optic fence sensor, zones can be 100m-200m long and will identify people cutting through a fence, crawling under or climbing over. Newer fibre technologies provide point location. Another way to pin-point exact intruder location is with OPTEX LiDAR technologies or with Radar. ‘Fuse’ data into a single event A particularly intelligent feature of the system is its ability to ‘fuse’ data (known as ‘target fusion’) coming from multiple sources and confirm an event as a single (i.e. the same) activity rather than a multiple threat. For instance, using the X&Y coordinates provided by OPTEX REDSCAN sensors, RSA allows to map exactly the path of the intruders or moving vehicles, fuses the path from one camera to the other and considers it as one event, one target and tracks it precisely on the map. Intelligent tracking and event categorisation This gives a more meaningful picture to the operator and presents events in a unified and intelligent way. This helps support the security team in making the right decisions. The deeper integration of OPTEX’s technologies into Genetec’s RSA platform enables intelligent tracking and event categorisation, making it a very precise security system for airports.
ARST is a public transportation company in Cagliari, Italy. The company operates a massive fleet of about 800 public buses throughout the island of Sardinia. During the vehicle modernisation process, the company decided to deploy new centralised CCTV systems to enhance the security level of passengers and drivers. First of all, the low-definition images captured by the original surveillance equipment cannot meet the company’s advanced monitoring needs. Second, the bus driver could not achieve point-to-point communication with the command centre in real time. In addition, in case of an accident, there was no emergency button on the bus before to report the emergency to the command centre. Customised mobile solution To help ARST revamp its bus security system, a customised Dahua mobile solution consisting of more than 3,000 cameras and 750 MXVRs, Panic Buttons, DSS integrated platform as well as other accessories was employed. The data collected from the front-end cameras is integrated in the control room via DSS4004, where emergency calls, geo-localisation of vehicles and statistics can be managed. Each bus is equipped with a penta-hybrid video recorder MXVR6212, 4, 6 or 8 HAC-HDBW2241F cameras Each bus is equipped with a penta-hybrid video recorder MXVR6212, 4, 6 or 8 HAC-HDBW2241F cameras and panic buttons. The main features of the systems are: data encryption, people counting, hot spot, router 3G/4G, dynamic management of the LCD monitor on board and geo-localisation via DSS app. As the first mobile XVR adopting HDCVI/AHD/TVI/CVBS/IP signals, MXVR6212 can achieve 1080P high-definition real-time recording. High performance sensor It supports real-time vehicle location tracking and monitoring, and all information such as GPS and video can be uploaded via wireless network - 3G/4G/WIFI. In addition, the device can also support connection of various accessories, such as card readers, fuel sensors, and emergency buttons. Furthermore, it has passed EN50155/ISO16750 to meet the requirements for mobile use. Other than city bus, this device can be used in various applications, such as school bus, taxi, police car, train, truck, etc. The 2MP HAC-HDBW2241F-M-A mobile camera is designed with a shock-proof compact case, which makes it convenient to be installed and adaptable to various applications. Boasting the strengths of the Dahua self-developed HDCVI technology, the camera offers high quality images and ensures real-time transmission. Also, it adopts a high performance sensor to provide incomparable performance even under extreme lowlight environment. Manage mobile devices The Dahua mobile solution with high-definition monitoring performance reduces theft and robbery on buses The Starlight feature allows capturing of more details and recognising accurate colours at night or in scenes with limited illumination. At the control room, Dahua DSS platform was utilised to control and manage the mobile devices deployed on the bus. It displays real-time location, speed, direction of mobile device, playback device’s history location, and supports alarm for over-speeding, entering and leaving the E-FENCE. Aside from central management, the Business Intelligence feature of Dahua DSS platform also allows the user to export Heat Map reports and people counting statistics, helping operator companies to optimise driving route to generate more profit. High-definition monitoring With upgraded Dahua system, the command centre can communicate with every single vehicle of ARST Bus Company in real time, enabling them to deliver instructions to the driver, allowing the driver to report immediately to the command centre in case of an emergency through the panic button, and ensuring the safety of passengers and drivers. The Dahua mobile solution with high-definition monitoring performance reduces theft and robbery on buses, and enables bus companies to collect accurate information about traffic flows and automatically download data to assist efficient and profitable operation. The Dahua mobile solution mounted on board has been proven to be highly efficient and reliable, which were also applied in two other Italian bus companies: AMAT Bus Company in Taranto and AMTAB Bus Company in Bari.
A private residence and its grounds comprises a variety of different perimeters including fences, bushes and walls with large areas of vegetation and pets roaming around freely. The home-owner sought to protect his property from intrusion using a discreet early-warning detection technology linked to a networked CCTV system. The system had to provide 100% ground coverage in a precise detection pattern and be immune to false activations by the home-owner’s pets and vegetation. Precise intrusion detection Other solutions were deemed unsuitable for the task: it was difficult to set the detection areas of a PIR or a microwave detector precisely enough; Video Analysis is expensive and could be affected by environmental conditions, such as light and shadows; and a buried cable sensor would have been costly and disruptive to install. Redscan was chosen because it was easy and quick to install and possible to set up a precise detection area easily, which would not be affected by the type of the boundary or the environment with very low false alarms. Optex made an installation of 17 Redscan RLS-3060SH Class-1 Laser Detectors to protect perimeter and integrate with cameras.
In the emirate of Ajman, the real-estate developer is AQAAR. AQAAR’s construction projects represent 90% of all developments in the region, and include more than 200 towers and buildings, over 18,000 apartments, five hotels, two schools and a university. More buildings are still under construction. This burgeoning portfolio of buildings provides housing, work and recreation for some 120,000 people and counting. And AQAAR recognises its duty to keep these locations safe. “Our aim is to become the safest community in the UAE,” says Ghaleb Jaber, Executive Director, AQAAR. Networked video security solution “We want to prevent crime, and to help people to continue to live and work peacefully in the buildings that we construct. To support this, we needed a specialised provider that was capable of delivering a cutting-edge, 24 hour networked video security solution featuring tens of thousands of cameras.” Hikvision products are excellent: the intelligent AI-based technology was exactly what we were looking for" During AQAAR’s search for an ideal video technology supplier, Hikvision stood out from all the rest. “Hikvision products are excellent: the intelligent AI-based technology was exactly what we were looking for,” says Ghaleb Jaber. “But just as importantly, Hikvision demonstrated excellent credibility in deploying large-scale video security projects of this type.” AI-based video security solution Working with the AQAAR team, Hikvision and its partners designed a comprehensive AI-based video security solution comprising different types of cameras. The majority of these are Hikvision 2MP IP cameras. These AI-enabled cameras offer a wealth of intelligent functionality, such as perimeter protection, and are being installed throughout all public areas and buildings. They are also installed at construction sites to help prevent theft of expensive building materials. The AQAAR solution also features Hikvision ANPR IP Cameras installed at the entrances to the parking lots of Ajman’s hotels. These use Automatic Number Plate Recognition to ‘read’ a car’s license plate, and will only lift the barrier to authorised vehicles. Centralised management system For added peace of mind, AQAAR chose to install a network of Hikvision Under Vehicle Surveillance Systems, for automatic security checks at key locations. Furthermore, the AQAAR team chose the Hikvision 16 Channel NVR for video recording, coupled with the Hikvision iVMS-5200E Centralised Management System in the control center. “For public security installations such as this, we always adopt a multi-phase approach," explains Mohammed Barakat, Account Manager for Hikvision MENA. This will unlock their intelligent features such as intrusion detection and facial recognition" “The first phase is the hardware installation. Phase two involves setting up the Centralised Management System, and creating one main control room that unites all video feeds. Then at phase three, we will switch on the AI capabilities of the cameras. This will unlock their intelligent features such as intrusion detection and facial recognition.” Intelligent parking management “Some of this, such as the intelligent parking management, has already been enabled. But which other capabilities AQAAR chooses has yet to be decided; it will depend on the needs of the urban planning and its residents as the project unfolds,” Mohammed explains. With the end of the installation now in sight, Ghaleb Jaber at AQAAR is eager to test the full potential of Hikvision’s proactive, comprehensive security solution. “We look forward to exploring how all elements can work in harmony together, to help AQAAR ensure the safety of residents and workers as our development continues to grow.”
Combining radio detection and ranging (RADAR) with thermal imaging technologies produces unparalleled monitoring coverage and perimeter protection for power plants and electrical substations. By integrating SpotterRF Compact Surveillance Radars (CSR) with FLIR PT-Series cameras, end users gain exceptional situational awareness, both inside the substation and beyond the fence line. This cost-effective solution requires substantially less infrastructure than other fence line detection systems and yields higher accuracy. Video surveillance of electrical substations There are over 55,000 electrical substations in the United States. These substations, along with power plants and transmission lines, provide power for millions of people. It is imperative that these locations remain secure from intrusion and sabotage. If just a handful of these substations were rendered inoperable, the U.S. could face a serious blackout. The 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, which knocked out several transformers and totaled over US$ 15 million in damages, was considered to be a catalyst for the Federal Energy Regulation Commission (FERC) establishing new security standards for utilities. Critical Infrastructure Protection Standard 014 One of the most notable policies introduced was the Critical Infrastructure Protection Standard 014 (CIP014) One of the most notable policies introduced was the Critical Infrastructure Protection Standard 014 (CIP014). This statute requires utilities to identify ‘mission critical’ facilities and assets, conduct a security inspection to identify threat, and implement a security system to address those risks. In response to security incidents such as Metcalf and other FERC activities, a large electrical utility with hundreds of substations across the country, looked to expand security beyond its fence line. Enhanced perimeter protection solutions The end user wanted to enhance and possibly replace traditional fence protection systems, including fibre optics, microwave barriers, and video analytics as these systems all proved to be costly, as well as time and labour intensive. In the end, the utility company relied on VTI Security for a recommendation. VTI Security, based in Burnsville, Minnesota, is an industry-renowned integrator that has been servicing security needs in the commercial, utility and oil and gas sectors for over 35 years. To determine the best system for its end user, VTI reviewed six different technologies, including some with multiple vendors of various solutions. Cost-effective total surveillance solution VTI also tested systems in in field deployments and conducted a cost analysis. The integrator concluded that SpotterRF’s product was superior to all others and selected it as its sole radar standard for perimeter solutions. “Our findings were that SpotterRF not only provided the most comprehensive detection in a substation environment, but SpotterRF was also by far the most cost-effective total solution based on the ability to mount equipment on existing structures,” said Jerry Klapak, Senior Account Manager for VTI Security. SpotterRF Compact Surveillance Radar system CSRs enable security monitors to never be blind, providing 100% coverage, 24/7, in all weather conditions SpotterRF, based in Orem-Utah, provides perimeter protection through its patented Compact Surveillance Radar (CSR) systems, which provide up to 300 acres of radar tracking power in a hand held, four-pound device. The CSRs enable security monitors to never be blind, providing 100 percent coverage, 24 hours a day, in all weather conditions. They are designed to detect threats up to 3300 feet beyond the fence line and provide early warnings to staff before situations escalate. FLIR PT-Series cameras Upon selecting a radar system, VTI needed a video manufacturer to supply cameras to deploy with the radar. In 2015, the integrator approached the globally renowned thermal imaging and perimeter security solutions expert, FLIR Systems, for a solution. FLIR’s PT-Series was selected for the project. “The ability for FLIR’s products to perform beyond published performance specifications was a surprise we don’t often see,” said Klapak, added “Each product exceeded published performance metrics on our field testing and actual deployments.” The PT-Series is FLIR’s offering of high performance, multi-sensor pan/tilt dual cameras that feature both thermal and visible-light imaging. The system is known for providing the highest precision. The pan/tilt mechanism gives end users accurate pointing control, while providing fully programmable scan patterns, as well as radar slew-to-cue and slew-to-alarm functions. Seamless integration With the radar and thermal technologies selected, VTI worked to ensure seamless integration and performance between the systems. “We worked with each company’s support and development teams as well as the VMS manufacturer to ensure the technologies not only worked with one another, but also met the client’s needs for bandwidth consumption and VMS interface and display,” said Klapak. Maximum coverage and perimeter security SpotterRF C20 and C40 radars and FLIR PT-Series cameras deliver maximum coverage and perimeter protection Together, SpotterRF C20 and C40 radars and FLIR PT-Series cameras deliver maximum coverage and perimeter protection. “The FLIR PT-Series, when deployed with SpotterRF, can cover a wide area of substation footprint. It is a cost-effective solution for substations needing to monitor the perimeter as well as inside the yard,” said Michael Chaffee, Director of Business Development at FLIR Systems, adding “The speed at which the FLIR PT-Series slews to the cue of the SpotterRF detection is impressive.” Effective intrusion detection solution When someone walks into the field of view of SpotterRF’s C20 or C40 radar, the radio waves bounce off the person and back to the radar, which then calculates the precise GPS location of the target and target size. The radars then tell the FLIR PT-Series camera to zoom to that location. The camera automatically stays on the target, moving with and tracking it. Because the radars control the cameras, the cameras only move upon detection, which significantly extends the shelf life of the cameras and allows them to last for years without replacement. Technology impact This FLIR and SpotterRF solution addresses an important pain point for the perimeter security and intrusion detection market. “In the past, utilities tried to use video analytics to find targets. Because these systems were outdoors, a number of environmental factors affected performance, including weather, lighting and moving trees,” said Logan Harris, CEO of SpotterRF, adding “However, by combining our radar with FLIR’s pan tilt thermal cameras, you will be able to solve this problem.” Radar technology and thermal imaging integration Logan adds, “Together, SpotterRF’s radar technology and FLIR’s thermal imaging are able to locate a person in a 15 or 100 acre space, see hundreds of yards beyond the fence line, cue the camera, and alert the personnel all without the help of an operator.” In the past, only military organisations could access this level of advanced technology. Now, the FLIR and SpotterRF solution makes this security capability accessible and affordable for critical infrastructure, power distribution and commercial applications. High-level security for critical sites Our client is very pleased with the ability of the technologies to provide security for their critical sites" “Our client is very pleased with the ability of the technologies to provide security for their critical sites. One surprising benefit was the ability to use both the thermal cameras and radars for additional security and production uses.” said Klapak. He adds, “They now use the radars to activate security lighting based on motion within and outside the fences. This provides not only a green approach to security by lowering energy costs but also improves customer relations by reducing light pollution in residential neighbourhoods.” Minimal installation time The entire team was also impressed by the solution’s minimal installation time. Unlike deploying fibre optic cables on fence lines, which requires months for digging trenches, the FLIR and SpotterRF solution allows one to mount the radars and cameras on control shacks and lattice poles. This process only requires a week for installation. “The deployment occurred 4x faster than was anticipated,” said Harris, adding “VTI installed the systems at 25-30 sites in just three months.” Phased deployment VTI began installation in 2016 with plans to roll out the solution in a phased approach as part of a multi-year plan. Approximately 50- 75 sites will deploy the solution. On average, each substation has two FLIR PT-Series cameras and four SpotterRF radars (two per camera). Some of VTI’s other clients are also expected to deploy the same solution at 10-20 sites over the next few years based on the success VTI has proven in the utility environment.
The Supreme Court is the highest and final court of appeal for all United Kingdom civil cases, and criminal cases from England, Wales and Northern Ireland. Formed in October 2009, it replaced the Appellate Committee of the House of Lords as the highest court in the UK. At the time of writing, it has heard over 835 appeals and hears cases of the greatest public or constitutional importance. The building is located on Parliament Square, just opposite Big Ben and the Houses of Parliament. The judges of the Supreme Court, known as Justices, have the final say on the biggest legal issues. For example, the Court recently heard the high-profile Brexit prorogation-related judicial review case of R (Miller) v The Prime Minister which sought to investigate the legality of the prorogation of parliament in Summer 2019. Live streaming and media coverage Westminster location were each equipped with four Panasonic HN130s, a RP150 camera controller "As the highest court in the land, any decision here is binding and final," explains Brian Shek, Senior System Administrator & Commercial Officer at the Supreme Court. The policy of the court is to record and broadcast hearings, in keeping with their commitment to transparency. Since its creation, all cases have been archived on their website ensuring fair and open access to all. "The reason we added live streaming and media coverage is because the justices wanted the court to be fully accessible to all members of the public," adds Brian. Shots of high production value Three court rooms at the Westminster location were each equipped with four Panasonic HN130s, a RP150 camera controller and NewTek Tricaster to efficiently record the high-profile cases. “We need PTZs because it’s not practical in a court room to have an operator manually controlling the cameras,” explains Dan Money, a technical architect and IT Manager at the Supreme Court. “You need a constant shot of the Justices bench, a back and front shot, and both a wide and close up shot to gain an understanding of what is going on in the court. PTZs are the least intrusive option that guarantees transparency in the courtroom but they also give the camera operator the right level of control and ensure shots of high production value,” highlights Dan. Panasonic PTZ camera The Supreme Court installed PTZ cameras as part of their initial set up in 2009 but were in need of an upgrade that could enable them to achieve better quality recordings. “Our first requirement was updating the camera output from SD to HD,” explains Dan. “The IT team wanted to implement a system that could do everything the original system could, but make the overall image quality look better with an intuitive system that we could understand.” For the upgrade, the IT team at the court required NDI-based PTZ camera technology. They wanted to use their own technical networking expertise to maintain the system themselves. The team were able to take the NDI IP connection from the Panasonic PTZ camera and convert it to fiber using existing runs in the building. From there, the stream was converted back to IP and into a NewTek Tricaster. Professional video output Being IP-based has made camera technology far more straightforward for individuals" “We are also planning to have the audio from all court rooms also over NDI in the future so that we can have networked video and audio over the existing building infrastructure. Being IP-based has made camera technology far more straightforward for individuals like ourselves to get to grips with providing a professional video output,” explains Dan. The communications team also wanted a HD output to enable the hosting of any events. The Supreme Courts broadcast contractor were engaged to support the Supreme Court with their broadcast operation needs and provide audio/visual engineers to operate the equipment. The first big test of the system was the high-profile Brexit prorogation-related judicial review. The case of R (Miller) v The Prime Minister investigated the decision to prorogue parliament in September 2019. 1080p network-based stream “We had originally planned to sign off the system during the recess period over the summer months – however, the case was scheduled two weeks before the system was scheduled to be implemented meaning that we had to push the project forward and deliver early to stream this case,” explains Dan. To deliver the streaming services, the team used Microsoft’s Azure Media Services platform. “This is what prompted us to implement the NDI architecture in the first place as the NewTek Tricaster is on their recommended equipment list. We had to work with the lead developer of Azure Media Services to tailor the platform to our requirements to run a 1080p network-based stream on the platform," says Dan. Two access points The R (Miller) v The Prime Minister case attracted widespread media interest and news agencies including both the BBC and Sky used the court’s live stream as part of their reporting. Two access points were installed at both the front and rear of the Supreme Court to take the camera streams accessed in the control room back to the broadcasters via an OB truck. PTZ cameras provided the correct combination of cost-efficiency, quality and service “This meant that if anything was to happen to the live stream on Azure, we had the redundancy in place so broadcasters would still be able to output video from the court room themselves,” explains Dan. This proved to be beneficial as the stream did get momentarily overloaded with an audience of four and a half million at its peak and ten million for the day. Cost-efficiency, quality and service Panasonic PTZ cameras provided the correct combination of cost-efficiency, quality and service that tended to the court’s needs. “From a feature perspective, we needed a system that was cost-effective in terms of an initial outlay but also to maintain and receive support as and when we need it. We wanted a long-term relationship, and with Panasonic we know that we’d get that. "We were very pleased with the feedback we have received on the picture quality, not only from those around the courts but also from feedback on the stream and the broadcasters too!" concludes Dan.